Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika, 2020, Number 49, Pages 78–97
DOI: https://doi.org/10.17223/20710410/49/6
(Mi pdm715)
 

This article is cited in 1 scientific paper (total in 1 paper)

Mathematical Backgrounds of Computer Security

Data storage security and full disk encryption

E. K. Alekseev, L. R. Akhmetzyanova, A. A. Babueva, S. V. Smyshlyaev

CryptoPro, Moscow, Russia
Full-text PDF (947 kB) Citations (1)
References:
Abstract: In the paper, a systematic description of the process of providing the security of data storage in modern operating systems is presented. The advantages of Full Disk Encryption (FDE) modules as compared with the other ways to security of this data storage are considered and explained. For most of modern FDE modules, there are four stages of work, namely: setup — initial data encryption, mounting — unfolding the key system in OS memory, session — reading and writing data using the FDE module (interaction of the file system with the hard disk driver), and unmounting — carrying out operations for ensuring purposeful properties of security and finishing work with the FDE module. These stages are introduced for the operating FDE module, including possible disrepairs, which are also systematized and considered in details. Performance characteristics that are important for synthesis and analysis are listed. Also, their target protective properties are studied in detail, the relationship between the problems of ensuring the confidentiality and integrity of data storage is shown and substantiated. New variants of these security properies are introduced so that they can become a guideline in the creation of FDE modules and a possible trade-off between performance and security. Some typical scenarios of using such systems are described.
Keywords: models and methods in information security, data storage security.
Bibliographic databases:
Document Type: Article
UDC: 519.7
Language: Russian
Citation: E. K. Alekseev, L. R. Akhmetzyanova, A. A. Babueva, S. V. Smyshlyaev, “Data storage security and full disk encryption”, Prikl. Diskr. Mat., 2020, no. 49, 78–97
Citation in format AMSBIB
\Bibitem{AleAkhBab20}
\by E.~K.~Alekseev, L.~R.~Akhmetzyanova, A.~A.~Babueva, S.~V.~Smyshlyaev
\paper Data storage security and full disk encryption
\jour Prikl. Diskr. Mat.
\yr 2020
\issue 49
\pages 78--97
\mathnet{http://mi.mathnet.ru/pdm715}
\crossref{https://doi.org/10.17223/20710410/49/6}
Linking options:
  • https://www.mathnet.ru/eng/pdm715
  • https://www.mathnet.ru/eng/pdm/y2020/i3/p78
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Прикладная дискретная математика
    Statistics & downloads:
    Abstract page:266
    Full-text PDF :164
    References:28
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024