Full Disk Encryption: A Comparison on Data Management Attributes

被引:2
|
作者
Hasan, Shiza [1 ]
Awais, Muhammad [1 ]
Shah, Munam Ali [1 ]
机构
[1] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
关键词
Full disk encryption; data engineering; security; performance enhancement;
D O I
10.1145/3206098.3206118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to secure personally identifiable and confidential information stored on portable devices such as laptops, and smartphones. Data is more appealing for thieves than the hardware itself. Encryption is the paramount protection measure to secure the confidential data. Full disk encryption (FDE) is a technique used when there is need to encrypt the hole hard drive. There are different tools available which can perform the FDE through software or hardware. This paper investigates different issues of FDE and its impact on system's performance. An insight of FDE on different data presentation issues, security attacks, performance degradation, key management, energy consumption and cost effectiveness form part of this paper. With this comparison, an easy and concise view of the different performance enhancement attributes for the FDE is provided.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 50 条
  • [41] Attribute-Based Encryption for Range Attributes
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Ogawa, Kazuto
    Ohtake, Go
    Watanabe, Hajime
    Yamada, Shota
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 42 - 61
  • [42] CRYPTOGRAPHIC KEY MANAGEMENT SCHEME FOR IMPLEMENTING DATA ENCRYPTION STANDARD
    EHRSAM, WF
    MATYAS, SM
    MEYER, CH
    TUCHMAN, WL
    [J]. IBM SYSTEMS JOURNAL, 1978, 17 (02) : 106 - 125
  • [43] Data Management and Packet Transmission Method based on Receivers' Attributes
    Demizu, Tatsuya
    Noguchi, Hirofumi
    Hoshikawa, Naoto
    Kataoka, Misao
    Yamato, Yoji
    [J]. 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 186 - 190
  • [44] SOHO EIT Carrington maps from synoptic full-disk data
    Thompson, BJ
    Newmark, JS
    Gurman, JB
    Delaboudiniere, JP
    Clette, F
    Gibson, SE
    [J]. CORONA AND SOLAR WIND NEAR MINIMUM ACTIVITY - FIFTH SOHO WORKSHOP, 1997, 404 : 779 - 783
  • [45] Quantum Searchable Encryption for Cloud Data Based on Full-Blind Quantum Computation
    Liu, Wenjie
    Xu, Yinsong
    Liu, Wen
    Wang, Haibin
    Lei, Zhibin
    [J]. IEEE ACCESS, 2019, 7 : 186284 - 186295
  • [46] Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
    Liu, Ruoshui
    Liu, Jianghui
    Zhang, Jingjie
    Zhang, Moli
    [J]. INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2018, 2018
  • [47] Inside the windows vista disk encryption algorithm
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    [J]. DR DOBBS JOURNAL, 2007, 32 (10): : 30 - 33
  • [48] The analysis of Windows Vista disk encryption algorithm
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 113 - 126
  • [49] Fast Disk Encryption Through GPGPU Acceleration
    Agosta, Giovanni
    Barenghi, Alessandro
    De Santis, Fabrizio
    Di Biagio, Andrea
    Pelosi, Gerardo
    [J]. 2009 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT 2009), 2009, : 102 - +
  • [50] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44