Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing

  • Conference paper
  • First Online:
Cyber Warfare, Security and Space Research (SpacSec 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1599))

Included in the following conference series:

  • 344 Accesses

Abstract

Trusted Computing Platform (TCP) using Trusted Platform Module (TPM) cryptographic microcontroller system was introduced by the Trusted Computing Group (TCG). It can produce, store and manage the keys used for cryptographic purpose on the hardware itself. A number of companies, including HP, IBM, Apple, Dell, etc. now release their systems with an inbuilt TPM component. This paper elucidates the method of using TPM chip for efficient management of cryptographic keys in Enterprise-class Cryptographic File System (ECFS) through Linux operating systems. It provides an extra layer of superior quality security when it comes to security based on hardware devices. The proposed security architecture is deployed using TPM tools version 1.3.8 packages and TrouSerS, a Public Key Infrastructure (PKI) API with version number 0.3.9. A comparison analysis in terms of performance using TPM based ECFS with the state-of-art ECFS is presented in this paper. The results of the proposed scheme outperforms the existing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 55.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 69.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://trustedcomputinggroup.org/resource/tcg-software-stack-tss-specification.

  2. 2.

    http://sourceforge.net/projects/trousers/files/trousers.

  3. 3.

    http://trustedjava.sourceforge.net.

  4. 4.

    http://trustedjava.sourceforge.net.

  5. 5.

    www.iozone.org.

References

  1. Ball, M.V., Guyot, C., Hughes, J.P., Martin, L., Noll, L.C.: The XTS-AES disk encryption algorithm and the security of ciphertext stealing. Cryptologia 36(1), 70–79 (2012)

    Article  Google Scholar 

  2. Fruhwirth, C.: LUKS on-disk format specification version 1.1. Changes 1, 22-01 (2005)

    Google Scholar 

  3. Halcrow, M.A.: eCryptfs: an enterprise-class encrypted filesystem for Linux. In: Proceedings of the 2005 Linux Symposium, vol. 1, pp. 201–218 (2005)

    Google Scholar 

  4. Jeong, W.S., Jeong, J., Jeong, I.R.: The vulnerability improvement research using pseudo-random number generator scheme in EncFS. J. Korea Inst. Inf. Secur. Cryptol. 26(6), 1539–1550 (2016)

    Google Scholar 

  5. Miller, K.: The Cartographer Tries to Map a Way to Zion. Carcanet, Manchester (2014)

    Google Scholar 

  6. Nepal, S., Zic, J., Hwang, H., Moreland, D.: Trust extension device: providing mobility and portability of trust in cooperative information systems. In: Meersman, R., Tari, Z. (eds.) OTM 2007. LNCS, vol. 4803, pp. 253–271. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76848-7_17

    Chapter  Google Scholar 

  7. Pirker, M., Toegl, R., Gissing, M.: Dynamic enforcement of platform integrity. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 265–272. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13869-0_18

    Chapter  Google Scholar 

  8. Rawat, U., Roy, S., Acharya, S., Kumar, K.: An efficient technique to access cryptographic file system over network file system. In: Sharma, M.K., Dhaka, V.S., Perumal, T., Dey, N., Tavares, J.M.R.S. (eds.) Innovations in Computational Intelligence and Computer Vision. AISC, vol. 1189, pp. 463–471. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-6067-5_52

    Chapter  Google Scholar 

  9. Rawat, U., Kumar, S.: ECFS: an enterprise-class cryptographic file system for Linux. Int. J. Inf. Secur. Privacy (IJISP) 6(2), 53–63 (2012)

    Article  Google Scholar 

  10. Roghanian, P., Rasli, A., Kazemi, M., Gheysari, H.: Productivity tools: TPM and TQM. Int. J. Fundam. Psychol. Soc. Sci. 2(4), 65–69 (2012)

    Google Scholar 

  11. Roy, S., Rawat, U., Sareen, H.A., Nayak, S.K.: IECA: an efficient IoT friendly image encryption technique using programmable cellular automata. J. Ambient Intell. Humaniz. Comput. 11(11), 5083–5102 (2020)

    Article  Google Scholar 

  12. Roy, S., Shrivastava, M., Pandey, C.V., Nayak, S.K., Rawat, U.: IEVCA: an efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimedia Tools Appl. 80(21), 31529–31567 (2021)

    Article  Google Scholar 

  13. Roy, S., Shrivastava, M., Rawat, U., Pandey, C.V., Nayak, S.K.: IESCA: an efficient image encryption scheme using 2-D cellular automata. J. Inf. Secur. Appl. 61, 102919 (2021)

    Google Scholar 

  14. Ryan, M.: Introduction to the TPM 1.2. Draft of March 24 (2009)

    Google Scholar 

  15. Shrivastava, M., Roy, S., Kumar, K., Pandey, C.V., Grover, J.: LICCA: a lightweight image cipher using 3-d cellular automata. Nonlinear Dyn. 106(3), 2679–2702 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satyabrata Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rawat, U., Roy, S., Acharya, S., Kumar, R., Kumar, K. (2022). Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing. In: Joshi, S., Bairwa, A.K., Nandal, A., Radenkovic, M., Avsar, C. (eds) Cyber Warfare, Security and Space Research. SpacSec 2021. Communications in Computer and Information Science, vol 1599. Springer, Cham. https://doi.org/10.1007/978-3-031-15784-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15784-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15783-7

  • Online ISBN: 978-3-031-15784-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation