Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23078
|View full text |Cite
|
Sign up to set email alerts
|

DEFY: A Deniable, Encrypted File System for Log-Structured Storage

Abstract: Abstract-While solutions for file system encryption can prevent an adversary from determining the contents of files, in situations where a user wishes to hide the existence of data, encryption alone is not sufficient. Indeed, encryption may draw attention to those files, as they may likely contain information the user wishes to keep secret. Consequently, adversarial coercion may motivate the owner to surrender their encryption keys, under duress. This paper presents DEFY, a deniable file system following a log… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(36 citation statements)
references
References 26 publications
0
36
0
Order By: Relevance
“…We cannot use a public bitmap since it would simply leak without additional precautions, which necessarily introduce inefficiencies. Examples of such inefficient bitmaps include the in-memory bitmap used by Peters [27] and the fuzzy bitmap used by Pang [26] which introduced "dummy blocks" to explain blocks which were marked as in-use but unreadable by the filesystem.…”
Section: Get/set_statusmentioning
confidence: 99%
See 2 more Smart Citations
“…We cannot use a public bitmap since it would simply leak without additional precautions, which necessarily introduce inefficiencies. Examples of such inefficient bitmaps include the in-memory bitmap used by Peters [27] and the fuzzy bitmap used by Pang [26] which introduced "dummy blocks" to explain blocks which were marked as in-use but unreadable by the filesystem.…”
Section: Get/set_statusmentioning
confidence: 99%
“…DEFY [27] is a plausibly-deniable file system for flash devices targeting on multi-snapshot adversaries. It is based on WhisperYAFFS [30], a log structured filesystem which provides full disk encryption for flash devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…HIVE [4] provides security even against a multiple-snapshot adversary. DEFY [22] is the deniable log-structured file system specifically designed for flash-based, solidstate drives; although it is secure against a multiple-snapshot adversary, it doesn't scale well.…”
Section: Related Workmentioning
confidence: 99%
“…Plausible deniability ultimately aims to enable users to deny the very existence of sensitive information on storage media when confronted by coercive adversaries e.g., border officers in oppressive regimes. This is essential in the fight against increasing censorship and intrusion into personal privacy [7,20] Unfortunately, it is impractical to deploy existing ORAM mechanisms in such systems due to prohibitively-high access latencies deriving from high asymptotic overheads for accessing items and ORAMinherent randomized access patterns. Also, a full ORAM protocol protecting access patterns of all operations in real time may be unnecessary for plausible-deniability.…”
Section: Introductionmentioning
confidence: 99%