Implementasi Secure Storage Menggunakan Metode Full Disk Encryption dan Tamper Proof pada Cloud Storage

Info Kripto Pub Date : 2023-05-31 DOI:10.56706/ik.v17i1.66
Barok Rizqi, Andri Adi, Lestari
{"title":"Implementasi Secure Storage Menggunakan Metode Full Disk Encryption dan Tamper Proof pada Cloud Storage","authors":"Barok Rizqi, Andri Adi, Lestari","doi":"10.56706/ik.v17i1.66","DOIUrl":null,"url":null,"abstract":"Currently, storage development has shifted to internet-based storage, or cloud storage, as online storage media. Cloud storage is becoming more popular among the public due to several advantages, including the fact that when the storage on personal computers runs out, users do not need to purchase new storage devices or incur additional costs for device maintenance. However, using such online storage can increase risks such as unauthorized access, data leakage, sensitive data, and privacy rights. This study proposes a prototype secure personal cloud storage system with physical database protection. The device has data encryption features that use full disk encryption to secure data on the server, VPN to secure communication between user and server, and tamper proof to physically secure the database. The test results show that the implementation of secure storage affects the performance of cloud storage, as evidenced by the decrease in data write speed from 19.87 Mb/s to 15.75 Mb/s after the implementation of LUKS full disk encryption. On the security side of data transmission, OpenVPN can secure the transmission between the user and the server. This is evidenced by sniffing testing using wireshark tools which shows that data transmission has been encapsulated by the OpenVPN application. In unit testing carried out on LUKS, it proved that the number of LUKS version 2 key slots corresponds to the reference, which is a maximum of 32 key slots. The last test proves that the tamper proof mechanism can work as expected. The tamper proof mechanism works when the device detects an indication of an attack on the physical device. The tests carried out were destroying the device casing using a hammer, opening the casing bolt, and a saw. The test results show that the device will perform damage to the SSD when the attack indication exceeds the tolerance value.","PeriodicalId":112303,"journal":{"name":"Info Kripto","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Info Kripto","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56706/ik.v17i1.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Currently, storage development has shifted to internet-based storage, or cloud storage, as online storage media. Cloud storage is becoming more popular among the public due to several advantages, including the fact that when the storage on personal computers runs out, users do not need to purchase new storage devices or incur additional costs for device maintenance. However, using such online storage can increase risks such as unauthorized access, data leakage, sensitive data, and privacy rights. This study proposes a prototype secure personal cloud storage system with physical database protection. The device has data encryption features that use full disk encryption to secure data on the server, VPN to secure communication between user and server, and tamper proof to physically secure the database. The test results show that the implementation of secure storage affects the performance of cloud storage, as evidenced by the decrease in data write speed from 19.87 Mb/s to 15.75 Mb/s after the implementation of LUKS full disk encryption. On the security side of data transmission, OpenVPN can secure the transmission between the user and the server. This is evidenced by sniffing testing using wireshark tools which shows that data transmission has been encapsulated by the OpenVPN application. In unit testing carried out on LUKS, it proved that the number of LUKS version 2 key slots corresponds to the reference, which is a maximum of 32 key slots. The last test proves that the tamper proof mechanism can work as expected. The tamper proof mechanism works when the device detects an indication of an attack on the physical device. The tests carried out were destroying the device casing using a hammer, opening the casing bolt, and a saw. The test results show that the device will perform damage to the SSD when the attack indication exceeds the tolerance value.
实现安全存储蒙古纳坎方法全盘加密和防篡改数据云存储
目前,存储发展已经转向基于互联网的存储,或云存储,作为在线存储媒体。云存储越来越受到公众的欢迎,因为它有几个优点,包括当个人电脑上的存储空间用完时,用户不需要购买新的存储设备,也不需要支付额外的设备维护费用。但是,使用此类在线存储会增加未经授权访问、数据泄露、敏感数据和隐私权等风险。本研究提出一种具有物理资料库保护的安全个人云端储存系统原型。该设备具有数据加密功能,使用全磁盘加密来保护服务器上的数据,使用VPN来保护用户和服务器之间的通信,并使用防篡改来物理保护数据库。测试结果表明,安全存储的实施对云存储的性能有一定影响,实现LUKS全盘加密后,数据写入速度从19.87 Mb/s下降到15.75 Mb/s。在数据传输的安全方面,OpenVPN可以保证用户和服务器之间的传输安全。这可以通过使用wireshark工具进行嗅探测试来证明,该工具显示数据传输已被OpenVPN应用程序封装。在对LUKS进行的单元测试中,证明了LUKS版本2的键槽数与引用对应,最多32个键槽。最后的测试证明了该防篡改机制能够达到预期的效果。防篡改机制在设备检测到对物理设备的攻击迹象时起作用。进行的试验是用锤子破坏设备的外壳,打开套管螺栓和锯子。测试结果表明,当攻击指标超过容限值时,设备会对SSD进行损坏。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信