Abstract
Trusted Computing Platform (TCP) using Trusted Platform Module (TPM) cryptographic microcontroller system was introduced by the Trusted Computing Group (TCG). It can produce, store and manage the keys used for cryptographic purpose on the hardware itself. A number of companies, including HP, IBM, Apple, Dell, etc. now release their systems with an inbuilt TPM component. This paper elucidates the method of using TPM chip for efficient management of cryptographic keys in Enterprise-class Cryptographic File System (ECFS) through Linux operating systems. It provides an extra layer of superior quality security when it comes to security based on hardware devices. The proposed security architecture is deployed using TPM tools version 1.3.8 packages and TrouSerS, a Public Key Infrastructure (PKI) API with version number 0.3.9. A comparison analysis in terms of performance using TPM based ECFS with the state-of-art ECFS is presented in this paper. The results of the proposed scheme outperforms the existing systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ball, M.V., Guyot, C., Hughes, J.P., Martin, L., Noll, L.C.: The XTS-AES disk encryption algorithm and the security of ciphertext stealing. Cryptologia 36(1), 70–79 (2012)
Fruhwirth, C.: LUKS on-disk format specification version 1.1. Changes 1, 22-01 (2005)
Halcrow, M.A.: eCryptfs: an enterprise-class encrypted filesystem for Linux. In: Proceedings of the 2005 Linux Symposium, vol. 1, pp. 201–218 (2005)
Jeong, W.S., Jeong, J., Jeong, I.R.: The vulnerability improvement research using pseudo-random number generator scheme in EncFS. J. Korea Inst. Inf. Secur. Cryptol. 26(6), 1539–1550 (2016)
Miller, K.: The Cartographer Tries to Map a Way to Zion. Carcanet, Manchester (2014)
Nepal, S., Zic, J., Hwang, H., Moreland, D.: Trust extension device: providing mobility and portability of trust in cooperative information systems. In: Meersman, R., Tari, Z. (eds.) OTM 2007. LNCS, vol. 4803, pp. 253–271. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76848-7_17
Pirker, M., Toegl, R., Gissing, M.: Dynamic enforcement of platform integrity. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 265–272. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13869-0_18
Rawat, U., Roy, S., Acharya, S., Kumar, K.: An efficient technique to access cryptographic file system over network file system. In: Sharma, M.K., Dhaka, V.S., Perumal, T., Dey, N., Tavares, J.M.R.S. (eds.) Innovations in Computational Intelligence and Computer Vision. AISC, vol. 1189, pp. 463–471. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-6067-5_52
Rawat, U., Kumar, S.: ECFS: an enterprise-class cryptographic file system for Linux. Int. J. Inf. Secur. Privacy (IJISP) 6(2), 53–63 (2012)
Roghanian, P., Rasli, A., Kazemi, M., Gheysari, H.: Productivity tools: TPM and TQM. Int. J. Fundam. Psychol. Soc. Sci. 2(4), 65–69 (2012)
Roy, S., Rawat, U., Sareen, H.A., Nayak, S.K.: IECA: an efficient IoT friendly image encryption technique using programmable cellular automata. J. Ambient Intell. Humaniz. Comput. 11(11), 5083–5102 (2020)
Roy, S., Shrivastava, M., Pandey, C.V., Nayak, S.K., Rawat, U.: IEVCA: an efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimedia Tools Appl. 80(21), 31529–31567 (2021)
Roy, S., Shrivastava, M., Rawat, U., Pandey, C.V., Nayak, S.K.: IESCA: an efficient image encryption scheme using 2-D cellular automata. J. Inf. Secur. Appl. 61, 102919 (2021)
Ryan, M.: Introduction to the TPM 1.2. Draft of March 24 (2009)
Shrivastava, M., Roy, S., Kumar, K., Pandey, C.V., Grover, J.: LICCA: a lightweight image cipher using 3-d cellular automata. Nonlinear Dyn. 106(3), 2679–2702 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Rawat, U., Roy, S., Acharya, S., Kumar, R., Kumar, K. (2022). Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing. In: Joshi, S., Bairwa, A.K., Nandal, A., Radenkovic, M., Avsar, C. (eds) Cyber Warfare, Security and Space Research. SpacSec 2021. Communications in Computer and Information Science, vol 1599. Springer, Cham. https://doi.org/10.1007/978-3-031-15784-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-15784-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15783-7
Online ISBN: 978-3-031-15784-4
eBook Packages: Computer ScienceComputer Science (R0)