Title :
Data privacy and integrity appropriate for disk protection
Author :
Hou, Fangyong ; Gu, Dawu ; Xiao, Nong ; Tang, Yuhua
Author_Institution :
Sch. of Comput., Nat. Univ. of Defense Technol., Changsha
Abstract :
To protect data privacy and integrity, it encrypts each protected disk sector and creates hash tree upon all the protected sectors to resist against any possible attacks. To make it an appropriate way for disk protection, it designs the required solutions of disk layout, performance optimizing and consistency maintaining. Disk layout uses a fixed disk region to preserve hash tree nodes; performance optimizing utilizes system memory to buffer those frequently used hash tree nodes to offload the big working cost; and consistency maintaining logs disk modifications to recovery the valid result after unexpected failures. The implementation cost is low and running performance is satisfiable. Analysis and experimental simulations show that it is a practical and available way to build secure disk.
Keywords :
data privacy; hard discs; tree data structures; data integrity; data privacy; disk layout; disk sector protection; hard disks; hash tree; Appropriate technology; Authentication; Computer science; Cryptography; Data engineering; Data privacy; File systems; Protection; Resists; Solids;
Conference_Titel :
Computer and Information Technology, 2008. CIT 2008. 8th IEEE International Conference on
Conference_Location :
Sydney, NSW
Print_ISBN :
978-1-4244-2357-6
Electronic_ISBN :
978-1-4244-2358-3
DOI :
10.1109/CIT.2008.4594711