Research and Design of Full Disk Encryption Based on Virtual Machine

被引:0
|
作者
Liang, Min [1 ]
Chang, Chao-wen [1 ]
机构
[1] Informat Engn Univ, Inst Elect Technol, Zhengzhou 450004, Henan, Peoples R China
来源
ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2 | 2010年
关键词
full disk encryption; XEN virtual machine; key management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is an effective method to protect private information. But the operating system and the temporary file of privacy are usually ignored. There are not adequate mechanisms to protect temporary files, page files and system files. The privacy is not security only by encrypting itself. The full disk encryption (FDE) is the preferred mechanism to address this problem because, as the name implies, it encrypts the entire hard disk so that confidence is protected, no matter where it resides. In this paper, we describe a full disk encryption scheme based on XEN virtual machine which is stored in a security flash disk. XEN is used to encrypt ( decrypt) all the data in hard disk and manage the whole system.
引用
收藏
页码:642 / 646
页数:5
相关论文
共 50 条
  • [1] Bypassing Full Disk Encryption with Virtual Machine Introspection
    Hebbal, Yacine
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [2] Extending Full Disk Encryption for the Future
    Broz, Milan
    SECURITY PROTOCOLS XXV, 2017, 10476 : 109 - 115
  • [3] A Systematic Assessment of the Security of Full Disk Encryption
    Mueller, Tilo
    Freiling, Felix C.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 491 - 503
  • [4] Full Disk Encryption: Bridging Theory and Practice
    Khati, Louiza
    Mouha, Nicky
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 241 - 257
  • [5] Comparing the Power of Full Disk Encryption Alternatives
    Fujimoto, Aaron
    Peterson, Peter
    Reiher, Peter
    2012 INTERNATIONAL GREEN COMPUTING CONFERENCE (IGCC), 2012,
  • [6] DATA STORAGE SECURITY AND FULL DISK ENCRYPTION
    Alekseev, E. K.
    Akhmetzyanova, L. R.
    Babueva, A. A.
    Smyshlyaev, S., V
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (49): : 78 - 97
  • [7] Research and Design of Virtual Machine Based on User Trusted Security Strategy
    Yang, Qichao
    He, Rongyu
    Shi, Lichen
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT 2017), 2017, 70 : 408 - 415
  • [8] What Users Should Know About Full Disk Encryption Based on LUKS
    Bossi, Simone
    Visconti, Andrea
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 225 - 237
  • [9] Design and Research of Virtual Assembly System for Machine Tool based on Maxscript Language
    Li, Fuping
    Zhang, Chuangjian
    2015 International Conference on Computer Science and Mechanical Automation (CSMA), 2015, : 263 - 266
  • [10] Full Disk Encryption: A Comparison on Data Management Attributes
    Hasan, Shiza
    Awais, Muhammad
    Shah, Munam Ali
    2ND INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2018), 2018, : 39 - 43