applicable. Therefore we clarify design criteria peculiar to mobile devices in order to
maximize the usability while minimizing security risks. Then we describe a design of
mobile distributed storage system based on self-encryption scheme. The self-
encryption scheme refers to an encryption scheme which we define in this paper. An
encryption key management scheme is one of the main challenges in the security
community. Conventional block ciphers aim at generating stronger cipher text from
plain text while minimizing the length of the encryption key. On the other hand, our
self-encryption scheme exploits the heterogeneity of data files (plain text) to generate
a longer encryption key sequence. As we use a longer key, we can use a simpler
stream cipher which requires less computational resources. By integrating the self-
encryption scheme into distributed storage system, we aim at realizing a practical
secure file system for mobile handsets.
2 Security Technologies for Mobile Handsets
In this section, we introduce security technologies provided for mobile communica-
tion services such as mobile phones and PHS (Personal Handy-phone System). Then
we clarify the technical requirements and design criteria for data protection of mobile
handsets.
2.1 Existing Approaches
Existing security mechanisms for mobile handsets include unauthorized access pre-
vention mechanisms, data backup mechanism, and data encryption mechanisms for
locally stored data. Table 1 shows security mechanisms provided for mobile handsets
such as laptop PC and mobile phones. When a user’s mobile terminal is lost or stolen,
terminal security mechanisms can reduce the risk of strangers to access to confiden-
tial data stored in the terminal. However, if the malicious attacker breaks the chassis
to pick out HDD or a flash memory, data may be analyzed easily. When data security
mechanisms are applied to the local storage data, the data can be protected with cryp-
tographic assurance.
If we look at existing data security services for mobile handsets, a remote deletion
service is the only feasible choice. With remote lock services, the owner can lock the
mobile handset and/or delete locally stored data by sending a special command over
wireless network [2,3]. This approach, however, is helpless if the mobile handset is
intentionally placed outside the coverage area. Though data encryption and remote
storage can be the potential choices for sustaining data security, actual realization
mechanisms are sometimes too heavy for resource constrained hardware like mobile
handsets[4,5]. Remote storage approach works without a local data storage and
downloads necessary files from a remote storage over the network. This approach is
acceptable for desktop PC and workstations that are always connected to high speed
LAN. Mobile handsets, on the other hand, are connected to the network by wireless
link, which is, in general, error-prone and limited in bandwidth. Therefore download-
ing the entire file may lose usability. A distributed storage divides a file into several
4