4.2 Security
In terms of security, ePFS assures the confidentiality
of files being stored at email servers with AES
symmetric encryption (Daemen & Rijmen, 2001).
All files processed with ePFS are in practice
confidential as long as the AES implementation is
sound and robust. On the other hand, although files
are not 100% guarantee retrievable in ePFS, the Par2
provides a very strong confidence of getting the files
back with adjustable server failure ratio. The
integrity of the files also relies on the Reed-Solomon
codes.
There is another security issue that concerns user
privacy when a user’ network behaviour is
maliciously monitored. In ePFS the file identity f is
not enciphered, so even if f itself is not indicative,
the occurrences of f are linkable to translate into
meaningful behaviours. The privacy of user
behaviours against the email server or any third
party can be enhanced by enforcing a scrambling
function to the file identity. That is, the file identifier
f can be transformed into plural unlinkable aliases
being applied to different email servers.
5 CONCLUSIONS
The storage of mobile devices is innate limited by
the flash ROMs and memory cards, in this paper
ePFS proposed a possible way to extend available
storage by trading bandwidth for it. Although
currently ePFS works on Windows PC only, it has
shown the feasibility of utilizing email space over
Internet. As the appearance of mobile devices
continuously gets tinier and tinier, we believe the
function that ePFS provides will soon be the need of
mobile applications.
In order to shape ePFS, we will re-examine
current file and server attributes to adopt more
proper parameters. Along with ePFS, we use a small
program to delete emails older than a specific date to
release unused email space. We will develop a new
garbage collection mechanism that takes file
attributes into consideration. Moreover, the
performance of block retrieval is a critical problem,
so we will target some specific applications that do
not require instant access to remote backups.
There are some future works based on ePFS that
require continuous efforts. The porting of ePFS to a
handset model is underway, i.e. we picked Windows
Mobile platform. Besides email services, we will
include more Internet storage resource like photo
albums, video blogs, free FTPs, etc., to be the
candidates of backup depots. In the long run we will
try to enhance ePFS to support a persistent storage
for mobile devices.
ACKNOWLEDGEMENTS
This research was sponsored by the Mobile Digital
Life core technology development projects 2006-
2009, monitored by the Ministry of Economic
Affairs, Taiwan.
REFERENCES
Chervenak, A., Vellanki, V., Kurmas. Z., 1998. Protecting
File Systems: A Survey of Backup Techniques. In
Proceedings of Joint IEEE and NASA Mass Storage
Conference.
Crispin. M., 2003. Internet Message Access Protocol
version 4 revision 1. In STD 1, RFC 3501, IETF.
Daemen. J., Rijmen. V., Rijndael Specification. In
Advanced Encryption Standard. NIST FIPS PUB 197.
Dierks, T., 1999. The TLS Protocol version 1.0. In STD 1,
RFC 2246, IETF.
Jones, R., 2004. GmailFS: A Gmail Based Linux
Filesystem. http://richard.jones.name/google-hacks
/gmail-filesystem/gmail-filesystem.html.
Kane, M., 2006. Going for a GDrive with google. In
CNET News, 7, March 2006. http://cnet.com/2061-
11199_3-6046686.html.
Klensin, J., 2001. Simple Mail Transfer Protocol. In STD
10, RFC 2821, IETF.
Plank, J.S., 1997. A Tutorial on Reed-Solomon Coding for
Fault-Tolerance in RAID-like Systems. In Software,
Practice & Experience, Vol. 27 (9).
Plank, J.S., Ding, Y., 2005. Note: Correction to the 1997
Tutorial on Reed-Solomon Coding. In Software,
Practice & Experience, Vol. 35 (2).
Traeger, A., Joukov, N., Sipek, J., Zadok, E., 2006. Using
Free Web Storages for Data Backup. In Proceedings
of the Second ACM Workshop on Storage Security and
Survivability, ACM Press.
Viksoe, B., 2004. GMail Drive Shell Extension.
http://www.viksoe.dk/code/gmail.htm.
Myers, J., 1996. Post Office Protocol version 3. In STD 53,
RFC1939, IETF.
WINSYS 2007 - International Conference on Wireless Information Networks and Systems
216