Secure storage—Confidentiality and authentication - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Computer Science Review Année : 2022

Secure storage—Confidentiality and authentication

Résumé

Secure disk storage is a rich and complex topic and its study is challenging in theory as well as in practice. In case of loss or theft of mobile devices (such as laptops and smartphones), the threat of data exposure is important and a natural security objective is to guarantee the confidentiality of the data-at-rest stored in such devices (e.g. on disks or solid-state drives). Classical approaches to encrypt data may have a severe impact on performance if the underlying architectural specificities are not considered. In particular, it is usually assumed that an encryption scheme suitable for the application of disk encryption must be length preserving. This so-called "full disk encryption" method provides confidentiality but does not provide cryptographic data integrity protection. It indeed rules out the use of authenticated encryption where an authentication tag is concatenated to the ciphertext. Moreover, authenticated encryption requires storing tags, and latency is added due to extra read/write accesses and tag computations. We present a comprehensive study of full disk encryption solutions and compare their features from a security perspective. We additionally present threat models for authenticated disk encryption and present a systematized analysis of the techniques usable in these settings (which has, up to now, received little attention from the research community). We finally review the current state-of-the-art of incremental cryptography and provide new insights for its use in secure disk storage contexts.
Fichier principal
Vignette du fichier
final.pdf (569.6 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03626423 , version 1 (31-03-2022)

Identifiants

Citer

Ryad Benadjila, Louiza Khati, Damien Vergnaud. Secure storage—Confidentiality and authentication. Computer Science Review, 2022, 44, pp.100465. ⟨10.1016/j.cosrev.2022.100465⟩. ⟨hal-03626423⟩
66 Consultations
139 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More