By Topic

A Secure Secondary Backup Storage with an Isolated Authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Kwangjin Bae ; GigaLane Co. Ltd., Hwaseong, South Korea ; Ilsun You ; Kangbin Yim ; Taeho Son

The primary backup disks store sensitive data such as privacy information and enterprise secrets. However, they are not encrypted usually because they are shared among multiple users in real time. Nevertheless, there is no concept of additional backing up the disks except the RAID support. This paper introduces a secure secondary backup system for the primary backup disks. The proposed system encrypts the scheduled files and backups them into the secondary backup disks. The encryption process uses the encryption key provided from hardware security modules that were directly plugged into the disks during the synchronization step in which the HSMs authenticate the disk owners and then unplugged. This architecture mechanically separates the HSM from the host, makes it immune to the reverse attack at the host side and keeps the disks safe from the insider's attack combined with a physical theft.

Published in:

Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on

Date of Conference:

4-6 July 2012