Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices

被引:0
作者
Alomari, Mohammad Ahmed [1 ]
Yusoff, M. Hafiz [1 ]
Samsudin, Khairulmizam [2 ]
Ahmad, R. Badlishah [1 ]
机构
[1] Univ Sultan Zainal Abidin UniSZA, Fac Informat & Comp, Kuala Terengganu, Malaysia
[2] Univ Putra Malaysia, Fac Engn, Serdang, Malaysia
来源
2019 IEEE 15TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2019) | 2019年
关键词
storage security; embedded devices; SQLite RDBMS; performance; multicore CPU; XTS encryption; SECURITY;
D O I
10.1109/cspa.2019.8696084
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The confidentiality of data stored in embedded and handheld devices has become an urgent necessity more than ever before. Encryption of sensitive data is a well-known technique to preserve their confidentiality, however it comes with certain costs that can heavily impact the device processing resources. Utilizing multicore processors, which are equipped with current embedded devices, has brought a new era to enhance data confidentiality while maintaining suitable device performance. Encrypting the complete storage area, also known as Full Disk Encryption (FDE) can still be challenging, especially with newly emerging massive storage systems. Alternatively, since the most user sensitive data are residing inside persisting databases, it will be more efficient to focus on securing SQLite databases, through encryption, where SQLite is the most common RDBMS in handheld and embedded systems. This paper addresses the problem of ensuring data protection in embedded and mobile devices while maintaining suitable device performance by mitigating the impact of encryption. We presented here a proposed design for a parallel database encryption system, called SQLite-XTS. The proposed system encrypts data stored in databases transparently on-the-fly without the need for any user intervention. To maintain a proper device performance, the system takes advantage of the commodity multicore processors available with most embedded and mobile devices.
引用
收藏
页码:254 / 259
页数:6
相关论文
共 30 条
  • [1] Advanced Encryption Standard-XTS implementation in field programmable gate array hardware
    Ahmed, Shakil
    Samsudin, Khairulmizam
    Ramli, Abdul Rahman
    Rokhani, Fakhrul Zaman
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 516 - 522
  • [2] Allen Grant., 2010, DEFINITIVE GUIDE SQL
  • [3] [Anonymous], 2008, IEEE STD 1561 2007
  • [4] [Anonymous], 2001, FIPS-197
  • [5] Botansqlite, BOTANSQLITE3 SQLITE
  • [6] AN EFFICIENT SORTING ALGORITHM WITH CUDA
    Chen, Shifu
    Qin, Jing
    Xie, Yongming
    Zhao, Junping
    Heng, Pheng-Ann
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2009, 32 (07) : 915 - 921
  • [7] A New Narrow Block Mode of Operations for Disk Encryption
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 126 - 131
  • [8] Fahl S., 2013, Financial Cryptography and Data Security, V7859, P144, DOI 10.1007/978-3-642-39884-112
  • [9] Portable Personal Identity Provider in Mobile Phones
    Ferdous, Md Sadek
    Poet, Ron
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 736 - 745
  • [10] Gepner P., 2006, INT S PAR COMP EL EN