A Bit-wise Partial Encryption Scheme for Flash Memory Based Storage Systems
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Tae-Sun Chung | - |
dc.contributor.author | Mamo, Surafel Teshome | - |
dc.date.accessioned | 2018-11-08T08:05:21Z | - |
dc.date.available | 2018-11-08T08:05:21Z | - |
dc.date.issued | 2012-02 | - |
dc.identifier.other | 12249 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/handle/2018.oak/10339 | - |
dc.description | 학위논문(석사)아주대학교 일반대학원 :컴퓨터공학과,2012. 2 | - |
dc.language.iso | eng | - |
dc.publisher | The Graduate School, Ajou University | - |
dc.rights | 아주대학교 논문은 저작권에 의해 보호받습니다. | - |
dc.title | A Bit-wise Partial Encryption Scheme for Flash Memory Based Storage Systems | - |
dc.type | Thesis | - |
dc.contributor.affiliation | 아주대학교 일반대학원 | - |
dc.contributor.department | 일반대학원 컴퓨터공학과 | - |
dc.date.awarded | 2012. 2 | - |
dc.description.degree | Master | - |
dc.identifier.localId | 569820 | - |
dc.identifier.url | http://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000012249 | - |
dc.description.alternativeAbstract | Because of the small size, fast read write time, shock resistance and low power consumption nature of flash memory storage systems, they are preferred over traditional data storage mechanisms for permanent storage. Though, there is a high risk of losing data to unauthorized users since they are easy to transport and ubiquitous. There have been a number of researches conducted to secure the content and the access of these devices, but on the other hand an encryption system specifically designed for flash memory systems is a relatively new area of interest in computing community. We proposed a bit wise partial encryption scheme which is specifically adopted to FAST FTL. The scheme presents a light weight encryption mechanism for the protection of the contents of flash memory storage systems. In this paper we have described the detailed algorithm of the scheme, and available options for key management. We intentionally left the freedom for the implementers to decide the key length which affects the security level. Finally we have analytically determined the security level and the performance of the proposed scheme. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.