Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.4.781

Design and Implementation of Virtual and Invisible Private Disk (VIPDISK) having Secure Storage Device  

Quan, Shan Guo (YanBian University of Science and Technology)
Kwon, Yong-Gu (Philipsoft)
Abstract
This paper proposes a virtual and invisible private disk (VIPDISK) technology equipped with the secure storage devices. As a software based security technology, it can create hidden partitions on any data storage device which can not be identified by the windows OS, so the program running on it, does not have any evidence of the existence of the hidden storage space. Under inactive state, it maintains an unexposed secure partition which can only be activated with a matching combination of a unique digital key and a user password to open the decryption tool. In addition, VIPDISK can store data to secure storage device with real-time encryption, it is worry-free even in the case of lost or theft. Simulation results show that VIPDISK provides a much higher level of security compared to other existing schemes.
Keywords
Secure storage device; virtual; hidden storage space; digital key; activated; inactivation; decryption tool;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Deyan Chen and Hong Zhao, "Data security and privacy protection issues in clouding computing," Proceedings of 2012 International Conference on Computer Science and Electronics Engineering, pp. 647-651, Mar. 2012.
2 Youngmin Yeo, Chanwoo lee, and Jongsub Moon, "Proposal of security requirements for the cloud storage virtualization system," Journal of The Korea Institute of information Security & Cryptology, 23(6), pp. 1247-1257, Dec. 2013   DOI
3 Jong-chang Ahn, Seung-won Lee, Ook Lee, and Sung phil Cho, "A study on influence of information security in selecting smart phone," Journal of The Korea Institute of information Security & Cryptology, 24(1), pp. 207-214, Feb. 2014   DOI
4 DaeYeong Hong, WonSeok Ko, and Seongsoo Im, "Virtualization techniques for secure and reliable computing," Journal of The Korea Institute of information Scientists and Engineers, 26(10), pp. 50-57, Oct. 2014
5 Jungho Ju, Seungyoung Ma, and Jongsub Moon, "Proposal of security requirements for storage virtualization system against clouding computing security threats," Journal of Security Engineering, 11(6), pp. 469-478, Dec. 2014   DOI
6 Jong-shik Lee and Kyung ho Lee, "A study on security container to provent data leaks," Journal of The Korea Institute of Information Security & Cryptology, 24(6), pp. 1225-1241, Dec. 2014   DOI
7 Khelender Sasan, "Docker Containers," NEC Technologies India, Oct. 2014.
8 Kong Jae Hee, "Secure full-virtualization method," M.S. Thesis, SungKyunKwan University, Apr. 2013.
9 Hyewon Lee, Changwook Park, GuenGi Lee, KwonYoup Lee, and Sangjin Lee, "Analysis of present situation of secure USB from forensic view point," Proc. of The Korean Society of Broadcast Engineers, pp. 63-65, Feb. 2008
10 Ji-Hoon Jung, Suk-Hyun Kim, Min-Su Kim, and Bong-Nam Noh, "Analyze vulnerability of secure storage," Proc. of The Korean Institute of Information Scientists and Engineers, pp. 58-61, Nov. 2009
11 Byong Kuk Lee, "Memory system having secure storage device and method of managing secure area thereof," Patent (KR1020090067649), Jun. 2009
12 Suk-Jo Shin, Seon-Joo Kim, and In-June Jo, "Privacy data protection methods on smart phone using a virtual disk," Journal of The Korea Contents Association, 13(12), pp. 560-567, Dec. 2013   DOI
13 TaeSup Zang, "Understanding virtualized disk storage technology," Journal of The Korean Information Technology, 7(1), pp. 67-74, Dec. 2009
14 Manel Medina, "VIPDISK security report," esCERT at inLAB-UPC, Barcelona, Apr. 2015.