2001
DOI: 10.1145/506084.506092
|View full text |Cite
|
Sign up to set email alerts
|

File system encryption with integrated user management

Abstract: Existing cryptographic file systems for Unix do not take into account that sensitive data must often be shared with other users, but still kept secret. By design, the only one who has access to the secret data is the person who encrypted it and therefore knows the encryption key or password. This paper presents a kernel driver for a new encrypted file system, called Fairly Secure File System (FSFS), which provides mechanisms for user management and access control for encrypted files. The driver has been specif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2004
2004
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…FSFS [12] is designed to deal with the complexities of access control in a cryptographic file system. While the primary concern of CamouflageFS is the speedup of data file encryption, file system access control mechanisms are another related area that benefits from applied cryptography.…”
Section: Cryptographic File Systemsmentioning
confidence: 99%
“…FSFS [12] is designed to deal with the complexities of access control in a cryptographic file system. While the primary concern of CamouflageFS is the speedup of data file encryption, file system access control mechanisms are another related area that benefits from applied cryptography.…”
Section: Cryptographic File Systemsmentioning
confidence: 99%
“…There are significant efforts to improve the efficiency of the GGH Scheme, such as the application of Hermite Normal Form (HNF) or Jensen-Based cryptographic scheme as the public key [14,15]. The GGH Scheme survives against Nguyen's attack when being implemented in lattice dimensions above 400 [16]. However, the implementation of the scheme in lattice dimensions beyond 400 immediately makes the GGH Scheme inefficient, impractical, and uncompetitive compared to other existing encryption schemes.…”
Section: Introductionmentioning
confidence: 99%