Full Disk Encryption: A Comparison on Data Management Attributes

被引:2
|
作者
Hasan, Shiza [1 ]
Awais, Muhammad [1 ]
Shah, Munam Ali [1 ]
机构
[1] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
关键词
Full disk encryption; data engineering; security; performance enhancement;
D O I
10.1145/3206098.3206118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to secure personally identifiable and confidential information stored on portable devices such as laptops, and smartphones. Data is more appealing for thieves than the hardware itself. Encryption is the paramount protection measure to secure the confidential data. Full disk encryption (FDE) is a technique used when there is need to encrypt the hole hard drive. There are different tools available which can perform the FDE through software or hardware. This paper investigates different issues of FDE and its impact on system's performance. An insight of FDE on different data presentation issues, security attacks, performance degradation, key management, energy consumption and cost effectiveness form part of this paper. With this comparison, an easy and concise view of the different performance enhancement attributes for the FDE is provided.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [1] DATA STORAGE SECURITY AND FULL DISK ENCRYPTION
    Alekseev, E. K.
    Akhmetzyanova, L. R.
    Babueva, A. A.
    Smyshlyaev, S., V
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (49): : 78 - 97
  • [2] Extending Full Disk Encryption for the Future
    Broz, Milan
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 109 - 115
  • [3] A Systematic Assessment of the Security of Full Disk Encryption
    Mueller, Tilo
    Freiling, Felix C.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 491 - 503
  • [4] Full Disk Encryption: Bridging Theory and Practice
    Khati, Louiza
    Mouha, Nicky
    Vergnaud, Damien
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 241 - 257
  • [5] Comparing the Power of Full Disk Encryption Alternatives
    Fujimoto, Aaron
    Peterson, Peter
    Reiher, Peter
    [J]. 2012 INTERNATIONAL GREEN COMPUTING CONFERENCE (IGCC), 2012,
  • [6] Extending Full Disk Encryption for the Future (Transcript of Discussion)
    Broz, Milan
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 116 - 122
  • [7] The growing impact of full disk encryption on digital forensics
    Casey, Eoghan
    Fellows, Geoff
    Geiger, Matthew
    Stellatos, Gerasimos
    [J]. DIGITAL INVESTIGATION, 2011, 8 (02) : 129 - 134
  • [8] Bypassing Full Disk Encryption with Virtual Machine Introspection
    Hebbal, Yacine
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [9] Research and Design of Full Disk Encryption Based on Virtual Machine
    Liang, Min
    Chang, Chao-wen
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 642 - 646
  • [10] BitLocker Full-Disk Encryption: Four Years Later
    Lewis, Stephen G.
    Palumbo, Timothy
    [J]. PROCEEDINGS OF THE 2018 ACM SIGUCCS ANNUAL CONFERENCE (SIGUCCS '18), 2018, : 147 - 150