Font Size: a A A

Research And Implementation Of Minimally Invasive Concealment Based On EXT2

Posted on:2011-11-03Degree:MasterType:Thesis
Country:ChinaCandidate:J GongFull Text:PDF
GTID:2178360308452664Subject:Software engineering
Abstract/Summary:PDF Full Text Request
While user access control and encryption can protect confidential data from unauthorized accesses, they leave evidence of the existence of valuable data, which may be attacked by virus and hackers or prompt an adversary to adopt unconventional tactics to circumvent the protection such as coercing an authorized user into disclosing his access key. People proposed the tactics of hiding data's existence to overcome the potential problem of safe storage. Without knowing the existence of data, virus and hackers cannot attack a file which is not present, adversaries would not be motivated to perform attacks and many security threats could thus be eliminated.Steganography and steganographic file system are two standard methods for hiding data's existence. But steganography techniques usually utilize the host files to hide secret information, such as the least significant bits of an image and video. The resulting would be impractical to use them for securing large volumes of data. Steganographic file system can hide data with any size, but due to the large performance/space overhead and the risks of data corruption, it is unlikely that these steganographic file system could be massively put on commercial market. Minimally Invasive Concealment (MIC) system can be superimposed on native file systems to provide concealment of user-selected files/folders with minimal changes to the underlying storage structure[1]. Unlike current steganographic schemes, MIC requires just bare minimum modification to the file system, and is much more efficient and cost-effective .We proposes a Minimally Invasive Concealment based on ext2 (ext2-MIC) that can be superimposed on ext2 file systems to provide concealment of user-selected files/folders with minimal changes to the underlying storage structure. Under ext2-MIC, we can hide file/folders concealment, unhide file/folders and look up the hidden file/folders information.
Keywords/Search Tags:safety storage, steganography, steganographic file system, Minimally Invasive Concealment, ext2
PDF Full Text Request
Related items