Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Title | Mobiflage: Deniable Storage Encryptionfor Mobile Devices |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Skillen, A., Mannan, M. |
Journal | Dependable and Secure Computing, IEEE Transactions on |
Volume | 11 |
Pagination | 224-237 |
Date Published | May |
ISSN | 1545-5971 |
Keywords | Android (operating system), Android OS, Androids, cryptography, data confidentiality, data-block allocator, decryption keys, deniable encryption, deniable storage encryption, desktop environment, desktop OS, Encryption, Ext4 file system mechanisms, FAT32 removable SD cards, File system security, Humanoid robots, Law, MF-MTP variant, MF-SD, Mobiflage, Mobile communication, mobile computing, mobile devices, mobile environment, Mobile handsets, Mobile Platform Security, PDE, plausibly deniable encryption, steganographic techniques, steganography, storage encryption |
Abstract | Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for soring hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms. |
DOI | 10.1109/TDSC.2013.56 |
Citation Key | 6682886 |
- Humanoid robots
- storage encryption
- Steganography
- steganographic techniques
- plausibly deniable encryption
- PDE
- Mobile Platform Security
- Mobile handsets
- mobile environment
- mobile devices
- mobile computing
- Mobile communication
- Mobiflage
- MF-SD
- MF-MTP variant
- Law
- Android (operating system)
- File system security
- FAT32 removable SD cards
- Ext4 file system mechanisms
- encryption
- desktop OS
- desktop environment
- deniable storage encryption
- deniable encryption
- decryption keys
- data-block allocator
- data confidentiality
- Cryptography
- Androids
- Android OS