Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 393-394.

Previous Articles     Next Articles

File Encrypting Method on Kernel Level for Specific Application

XU Guo-chun and YIN Hong-wu   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Encryption file system such as eCryptfs and dm-crypt can avoid information leakage by storage lost.But they do not distinguish processes accessing the file,so they can not prevent information leakage by the trojan program.This paper introduced a method which puts the cryptograph in the kernel page cache,and only the specific application can access the plain text.This method eliminates the way by which the trojan program accesses the plain text,improves the security of information system.

Key words: Kernel,Encryption file system,Transparent encrypt,Trojan horse,Security

[1] Wolfgang Mauerer.深入Linux内核架构[M].北京:人民邮电出版社,2010
[2] Halcrow M A.ecryptfs:An enterprise-class encrypted filesystem for linux[C]∥In Proceedings of the Linux Symposium.Ottawa,Canada,July 2005:201-218
[3] 唐晓东,付松齡,何连跃.基于eCryptfs的多用户加密文件系统设计和实现[J].计算机应用,2010,30(5):1236-1238
[4] 陈忠贵,舒远仲,吴文俊.加密文件系统中缓冲技术的研究[J].南昌航空大学学报,2010,24(2):67-71
[5] Peters M.Encrypting partitions using dm-crypt and the 2.6 series kernel[2004-6-6] http://archive09.linux.com/feature/36596
[6] Red hat.Logical Volume Manager Administration.Appendix A.The Device Mapper.[2013-09-29]https://access.redhat.com/documenation/en-US/Red_Hat_Enterprise_Linux/6/html/Logical_Volume_Manager_Administration/device_mapper.html/
[7] Symantec.Linux.Backdoor.Kaiten.http://symantec.com/security_response/writeup.jsp?docid=2006-021417-0144-99&tabid=2
[8] Symantec.Linux.Backdoor.Rexob..http://symantec.com/security_response/writeup.jsp?docid=2007-072612-1704-99&tabid=2

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!