skip to main content
10.1145/3102980.3102989acmconferencesArticle/Chapter ViewAbstractPublication PageshotosConference Proceedingsconference-collections
research-article

Preserving Hidden Data with an Ever-Changing Disk

Published: 07 May 2017 Publication History

Abstract

This paper presents a storage system that can hide the presence of hidden data alongside a larger volume of public data. Encryption allows a user to hide the contents of data, but not the fact that sensitive data is present. Under duress, the owner of high-value data can be coerced by a powerful adversary to disclose decryption keys. Thus, private users and corporations have an interest in hiding the very presence of some sensitive data, alongside a larger body of less sensitive data (e.g., the operating system and other benign files); this property is called plausible deniability. Existing plausible deniability systems do not fulfill all of the following requirements: (1) resistance to multiple snapshot attacks where an attacker compares the state of the device over time; (2) ensuring that hidden data won't be destroyed when the public volume is modified by a user unaware of the hidden data; and (3) disguising writes to secret data as normal system operations on public data.
We explain why existing solutions do not meet all these requirements and present the Ever-Changing Disk (ECD), a generic scheme for plausible deniability storage systems that meets all of these requirements. An ECD stores hidden data inside a large volume of pseudorandom data. Portions of this volume are periodically migrated in a log-structured manner. Hidden writes can then be interchanged with normal firmware operations. The expected access patterns and time until hidden data is overwritten are completely predictable, and insensitive to whether data is hidden. Users control the rate of internal data migration (R), trading write bandwidth to hidden data for longevity of the hidden data. For a typical 2TB disk and setting of R, a user preserves hidden data by entering her secret key every few days or weeks.

References

[1]
2010. Youth jailed for not handing over encryption password. The Register http://www.theregister.co.uk/2010/10/06/jail_password_ripa/. (2010).
[2]
Nitin Agrawal, Vijayan Prabhakaran, Ted Wobber, John D. Davis, Mark Manasse, and Rina Panigrahy. 2008. Design Tradeoffs for SSD Performance. In USENIX Annual Technical Conference (ATC).
[3]
Ross Anderson, Roger Needham, and Adi Shamir. 1998. The Steganographic File System. In Information Hiding. Lecture Notes in Computer Science, Vol. 1525. Springer Berlin Heidelberg, 73--82.
[4]
Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, and Kaan Onarlioglu. 2014. Toward Robust Hidden Volumes Using Write-Only Oblivious RAM. In Proceedings of the SIGSAC Conference on Computer and Communications Security (CCS). ACM. https://doi.org/10.1145/2660267.2660313
[5]
Evgeny Budilovsky, Sivan Toledo, and Aviad Zuck. 2011. Prototyping a High-performance Low-cost Solid-state Disk. In Proceedings of the Annual International Conference on Systems and Storage (SYSTOR).
[6]
Anrin Chakraborti, Chen Chen, and Radu Sion. 2017. DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
[7]
Seokhei Cho, Changhyun Park, Youjip Won, Sooyong Kang, Jaehyuk Cha, Sungroh Yoon, and Jongmoo Choi. 2015. Design Tradeoffs of SSDs: From Energy Consumption's Perspective. Transactions on Storage 11, 2, Article 8 (2015), 24 pages. https://doi.org/10.1145/2644818
[8]
Microsoft Corporation. 2009. Windows BitLocker drive encryption frequently asked auestions. http://technet.microsoft.com/en-us/library/cc766200%28WS.10%29.aspx. (2009).
[9]
Niv Dayan and Philippe Bonnet. 2015. Garbage Collection Techniques for Flash-Resident Page-Mapping FTLs. CoRR abs/1504.01666 (2015). http://arxiv.org/abs/1504.01666
[10]
Disk 2017. Disk encryption in Arch Linux. (2017). http://wiki.archlinux.org/index.php/disk_encryption.
[11]
Eran Gal and Sivan Toledo. 2005. Algorithms and Data Structures for Flash Memories. Computing Surveys 37, 2 (June 2005), 138--163. https://doi.org/10.1145/1089733.1089735
[12]
Garth Gibson and Milo Polte. 2009. Directions for shingled-write and twodimensional magnetic recording system architectures: Synergies with solid-state disks. CMU-PDL-09-014 (2009).
[13]
Laura M. Grupp, John D. Davis, and Steven Swanson. 2012. The Bleak Future of NAND Flash Memory. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST).
[14]
Key 2017. Key disclosure law. Wikipedia http://en.wikipedia.org/wiki/Key_disclosure_law. (2017).
[15]
Open 2017. Open Crypto Audit Project. http://opencryptoaudit.org/. (2017).
[16]
OS 2015. OS X Mavericks: Encrypt the information on your disk with FileVault. http://support.apple.com/kb/PH13729. (2015).
[17]
Password 2012. Password case reframes Fifth Amendment rights in context of digital world. Denver Post http://www.denverpost.com/news/ci_19669803. (2012).
[18]
Timothy M Peters. 2014. DEFY: A Deniable File System for Flash Memory. Master's thesis. California Polytechnic State University.
[19]
Bianca Schroeder, Raghav Lagisetty, and Arif Merchant. 2016. Flash Reliability in Production: The Expected and the Unexpected. In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST).
[20]
Adam Skillen and Mohammad Mannan. 2013. On Implementing Deniable Storage Encryption for Mobile Devices. In The Network and Distributed System Security Symposium (NDSS).
[21]
Chengen Yang, Hsing-Min Chen, TrevorN. Mudge, and Chaitali Chakrabarti. 2014. Improving the Reliability of MLC NAND Flash Memories Through Adaptive Data Refresh and Error Control Coding. Journal of Signal Processing Systems 76, 3 (2014), 225--234. https://doi.org/10.1007/s11265-014-0880-5

Cited By

View all
  • (2024)INVISILINE: Invisible Plausibly-Deniable Storage2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00018(2722-2739)Online publication date: 19-May-2024
  • (2022)SoK: Plausibly Deniable StorageProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00392022:2(132-151)Online publication date: 3-Mar-2022
  • (2018)Stash in a flashProceedings of the 16th USENIX Conference on File and Storage Technologies10.5555/3189759.3189775(169-185)Online publication date: 12-Feb-2018

Index Terms

  1. Preserving Hidden Data with an Ever-Changing Disk

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      HotOS '17: Proceedings of the 16th Workshop on Hot Topics in Operating Systems
      May 2017
      185 pages
      ISBN:9781450350686
      DOI:10.1145/3102980
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 May 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      • United States National Science Foundation
      • 2014621

      Conference

      HotOS '17
      Sponsor:
      HotOS '17: Workshop on Hot Topics in Operating Systems
      May 7 - 10, 2017
      BC, Whistler, Canada

      Upcoming Conference

      HOTOS '25
      Workshop on Hot Topics in Operating Systems
      May 14 - 16, 2025
      Banff , AB , Canada

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)INVISILINE: Invisible Plausibly-Deniable Storage2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00018(2722-2739)Online publication date: 19-May-2024
      • (2022)SoK: Plausibly Deniable StorageProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00392022:2(132-151)Online publication date: 3-Mar-2022
      • (2018)Stash in a flashProceedings of the 16th USENIX Conference on File and Storage Technologies10.5555/3189759.3189775(169-185)Online publication date: 12-Feb-2018
      • (2018)Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a surveyCybersecurity10.1186/s42400-018-0005-81:1Online publication date: 5-Jun-2018

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media