Skip to main content

A Cross-layer Plausibly Deniable Encryption System for Mobile Devices

  • 594 Accesses

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 462)

Abstract

Mobile computing devices have been used to store and process sensitive or even mission critical data. To protect sensitive data in mobile devices, encryption is usually incorporated into major mobile operating systems. However, traditional encryption can not defend against coercive attacks in which victims are forced to disclose the key used to decrypt the sensitive data. To combat the coercive attackers, plausibly deniable encryption (PDE) has been introduced which can allow the victims to deny the existence of the sensitive data. However, the existing PDE systems designed for mobile devices are either insecure (i.e., suffering from deniability compromises) or impractical (i.e., unable to be compatible with the storage architecture of mainstream mobile devices, not lightweight, or not user-oriented).

In this work, we design CrossPDE, the first cross-layer mobile PDE system which is secure, being compatible with the storage architecture of mainstream mobile devices, lightweight as well as user-oriented. Our key idea is to intercept major layers of a mobile storage system, including the file system layer (preventing loss of hidden sensitive data and enabling users to use the hidden mode), the block layer (taking care of expensive encryption and decryption), and the flash translation layer (eliminating traces caused by the hidden sensitive data). Experimental evaluation on our real-world prototype shows that CrossPDE can ensure deniability with a modest decrease in throughput.

Keywords

  • PDE
  • Mobile devices
  • Coercive attacks
  • Confidentiality
  • Cross-layer
  • Flash memory

This is a preview of subscription content, access via your institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (Finland)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   93.08
Price includes VAT (Finland)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   120.99
Price includes VAT (Finland)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions
Fig. 1.
Fig. 2.
Fig. 3.

Notes

  1. 1.

    Data stored at the beginning of the block layer are mapped to those blocks at the beginning of the flash memory, as the system usually fills randomness sequentially from the beginning of the disk, and the FTL uses a log-structured writing strategy.

  2. 2.

    Those blocks which are 1) reserved for the hidden mode, and 2) entirely or partially filled with actual randomness, can be allocated.

References

  1. Lpc-h3131. https://www.olimex.com/Products/ARM/NXP/LPC-H3131/

  2. Truecrypt. http://truecrypt.sourceforge.net/

  3. Veracrypt. https://www.veracrypt.fr/code/VeraCrypt/

  4. Anderson, R., Needham, R., Shamir, A.: The steganographic file system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 73–82. Springer, Heidelberg (1998). https://doi.org/10.1007/3-540-49380-8_6

    CrossRef  Google Scholar 

  5. Barker, A., Sample, S., Gupta, Y., McTaggart, A., Miller, E.L., Long, D.D.E.: Artifice: a deniable steganographic file system. In: 9th \(\{\)USENIX\(\}\) Workshop on Free and Open Communications on the Internet (\(\{\)FOCI\(\}\) 19) (2019)

    Google Scholar 

  6. Breeuwsma, M., De Jongh, M., Klaver, C., Van Der Knijff, R., Roeloffs, M.: Forensic data recovery from flash memory. Small Scale Dig. Dev. Forensics J. 1(1), 1–17 (2007)

    Google Scholar 

  7. Chang, B., et al.: User-friendly deniable storage for mobile devices. Comput. Secur. 72, 163–174 (2018)

    Google Scholar 

  8. Chang, B., Wang, Z., Chen, B., Zhang, F.: Mobipluto: file system friendly deniable storage for mobile devices. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 381–390 (2015)

    Google Scholar 

  9. Chang, B., et al.: Mobiceal: towards secure and practical plausibly deniable encryption on mobile devices. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 454–465. IEEE (2018)

    Google Scholar 

  10. Chen, B.: Towards designing a secure plausibly deniable system for mobile devices against multi-snapshot adversaries-a preliminary design. arXiv preprint arXiv:2002.02379 (2020)

  11. Chen, C., Chakraborti, A., Sion, R.: Infuse: invisible plausibly-deniable file system for nand flash. Proc. Priv. Enhan. Technol. 4, 239–254 (2020)

    Google Scholar 

  12. Chen, C., Chakraborti, A., Sion, R.: Pearl: plausibly deniable flash translation layer using wom coding. In: The 30th Usenix Security Symposium (2021)

    Google Scholar 

  13. Chen, N., Chen, B., Shi, W.: MobiWear: a plausibly deniable encryption system for wearable mobile devices. In: Chen, B., Huang, X. (eds.) AC3 2021. LNICST, vol. 386, pp. 138–154. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-80851-8_10

    CrossRef  Google Scholar 

  14. Chen, N., Chen, B., Shi, W.: The block-based mobile pde systems are not secure - experimental attacks. In: EAI International Conference on Applied Cryptography in Computer and Communications. Springer, Heidelberg (2022). https://doi.org/10.1007/978-3-031-17081-2_9

  15. Google Code. Opennfm (2011). https://code.google.com/p/opennfm/

  16. exfat file system specification. https://docs.microsoft.com/en-us/windows/win32/fileio/exfat-specification

  17. Feng, W., et al.: Mobigyges: a mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot. Fut. Gener. Comput. Syst. 109, 158–171 (2020)

    CrossRef  Google Scholar 

  18. Typical hardware of flash storage devices. https://snp.cs.mtu.edu/techdoc/flash-devices.html

  19. Freecode. fio (2014). http://freecode.com/projects/fio

  20. Gutmann, P.: Secure deletion of data from magnetic and solid-state memory. In: Proceedings of the Sixth USENIX Security Symposium, San Jose, CA, vol. 14, pp. 77–89 (1996)

    Google Scholar 

  21. Han, J., Pan, M., Gao, D., Pang, H.: A multi-user steganographic file system on untrusted shared storage. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 317–326 (2010)

    Google Scholar 

  22. Hong, S., Liu, C., Ren, B., Huang, Y., Chen, J.: Personal privacy protection framework based on hidden technology for smartphones. IEEE Access 5, 6515–6526 (2017)

    Google Scholar 

  23. Jia, S., Xia, L., Chen, B., Liu, P.: Deftl: implementing plausibly deniable encryption in flash translation layer. In: Proceedings of the 24th ACM Conference on Computer and Communications Security. ACM (2017)

    Google Scholar 

  24. Johnson, N.F., Jajodia, S.: Steganalysis: the investigation of hidden information. In: 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No. 98EX228), pp. 113–116. IEEE (1998)

    Google Scholar 

  25. Liao, J., Chen, B., Shi, W.: Trustzone enhanced plausibly deniable encryption system for mobile devices. In: 2021 IEEE/ACM Symposium on Edge Computing (SEC), pp. 441–447. IEEE (2021)

    Google Scholar 

  26. McDonald, A.D., Kuhn, M.G.: StegFS: a steganographic file system for linux. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 463–477. Springer, Heidelberg (2000). https://doi.org/10.1007/10719724_32

    CrossRef  Google Scholar 

  27. Microsof. Bitlocker (2013). https://technet.microsoft.com/en-us/library/hh831713.aspx

  28. Plausible deniability. https://www.veracrypt.fr/en/Plausible%20Deniability.html

  29. Pang, H., Tan, K.-L., Zhou, X.: Stegfs: a steganographic file system. In: Proceedings 19th International Conference on Data Engineering (Cat. No. 03CH37405), pp. 657–667. IEEE (2003)

    Google Scholar 

  30. Peters, T.M., Gondree, M.A., Peterson, Z.N.J.: Defy: a deniable, encrypted file system for log-structured storage (2015)

    Google Scholar 

  31. Skillen, A., Mannan, M.: On implementing deniable storage encryption for mobile devices. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, 24–27 February 2013 (2013)

    Google Scholar 

  32. Skillen, A., Mannan, M.: Mobiflage: deniable storage encryption for mobile devices. IEEE Trans. Depend. Secure Comput. 11(3), 224–237 (2014)

    CrossRef  Google Scholar 

  33. How to create a strong password (and remember it). https://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/

  34. Tankasala, D., Chen, N., Chen, B.: A step-by-step guideline for creating a testbed for flash memory research via lpc-h3131 and opennfm. Technical report, Department of Computer Science, Michigan Tech (2020)

    Google Scholar 

  35. Tankasala, D., Chen, N., Chen, B.: Creating a testbed for flash memory research via lpc-h3131 and opennfm - linux version. Technical report, Department of Computer Science, Michigan Tech (2022)

    Google Scholar 

  36. Wroblewski, G.: General method of program code obfuscation (2002)

    Google Scholar 

  37. Yu, X., Chen, B., Wang, Z., Chang, B., Zhu, W.T., Jing, J.: MobiHydra: pragmatic and multi-level plausibly deniable encryption storage for mobile devices. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 555–567. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13257-0_36

    CrossRef  Google Scholar 

Download references

Acknowledgments.

This work was supported by US National Science Foundation under grant number 1928349-CNS, 1928331-CNS, 1938130-CNS, and 2043022-DGE.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, N., Chen, B., Shi, W. (2023). A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. In: Li, F., Liang, K., Lin, Z., Katsikas, S.K. (eds) Security and Privacy in Communication Networks. SecureComm 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 462. Springer, Cham. https://doi.org/10.1007/978-3-031-25538-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25538-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25537-3

  • Online ISBN: 978-3-031-25538-0

  • eBook Packages: Computer ScienceComputer Science (R0)