• Write/Randomized Write: This test measures the
performance of writing a new file (at randomly se-
lected locations).
Each test only considers the time needed to exe-
cute read/write operations in files and does not con-
sider the time needed to open or close the file. In
Figures 2 we report the performance of our filesys-
tem (compared with a plain ext4 file system) in the
random read operations into files with size ranging
from 64KB to 512MB. The performance of the read
and write operations are similar to the corresponding
randomized versions and are omitted.
7 CONCLUSIONS
In this paper propose the design of a full fea-
tured cryptographic file system, intended as general
purpose facility for Trusted Execution Environment
(TEE)-compliant platforms.
Data may either lie on a device internal stor-
age (and bound to that device) or can be transferred
amongst different devices (e.g., by means of micro SD
cards rather than trusted communication channel). In
this case, a protocol to transfer access privileges to the
receiving device is provided.
The file system is fully compliant to the TEE stan-
dard specifications. As far as we know, this is the
first project of this kind which offers this feature. We
present a prototype based on OpenTEE and the FUSE
filesystem. Although preliminary experiments are
likely to significant improvements and optimizations,
they look quite promising and make the approach
worthy of further investigation.
REFERENCES
FUSE: Filesystem in Userspace. http://fuse.sourceforge.
net.
Aich, S., Mondal, S., Sural, S., and Majumdar, A. (2009).
Role based access control with spatiotemporal context
for mobile applications. In Trans. on Computational
Science IV, volume 5430 of LNCS, pages 177–199.
Apple Inc. (2016). Apple Shared Ipad. https://developer.
apple.com/education/shared-ipad/.
Apple Inc. (2018). iOS Security Guide - White
Paper. https://www.apple.com/business/docs/iOS
Security Guide.pdf.
Blaze, M. (1993). A cryptographic file system for unix. In
Proceedings of the 1st ACM conference on Computer
and communications security, pages 9–16. ACM.
Bonatti, P., Galdi, C., and Torres, D. (2015). Event-driven
RBAC. Journal of Computer Security, 23(6):709–757.
Castiglione, A., Catuogno, L., Del Sorbo, A., Fiore, U., and
Palmieri, F. (2014). A secure file sharing service for
distributed computing environments. The Journal of
Supercomputing, 67(3):691–710.
Cattaneo, G., Catuogno, L., Sorbo, A. D., and Persiano, P.
(2001). The design and implementation of a trans-
parent cryptographic file system for unix. In USENIX
Annual Technical Conference, pages 199–212.
Catuogno, L., Galdi, C., and Riccio, D. (2016). Flexible and
robust enterprise right management. In IEEE Sympo-
sium on Computers and Communication, ISCC 2016,
Messina, Italy, June 27-30, 2016, pages 1257–1262.
Catuogno, L., Galdi, C., and Riccio, D. (2018). Off-line en-
terprise rights management leveraging biometric key
binding and secure hardware. Journal of Ambient In-
telligence and Humanized Computing.
Catuogno, L., L
¨
ohr, H., Winandy, M., and Sadeghi, A.-R.
(2014). A trusted versioning file system for passive
mobile storage devices. Journal of Network and Com-
puter Applications, 38:65–75.
Garg, D. and Pfenning, F. (2010). A proof-carrying file sys-
tem. In Security and Privacy (SP), 2010 IEEE Sym-
posium on, pages 349–364. IEEE.
Geambasu, R., John, J. P., Gribble, S. D., Kohno, T., and
Levy, H. M. (2011). Keypad: an auditing file system
for theft-prone devices. In Proceedings of the sixth
conference on Computer systems, pages 1–16. ACM.
GlobalPlatform (2010). TEE Client API Specification v1.0.
http://globalplatform.org.
GlobalPlatform (2011). TEE System Architecture v1.0.
http://globalplatform.org.
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and
Fu, K. (2003). Plutus: Scalable secure file sharing on
untrusted storage. In Prof. of the USENIX Conference
on File and Storage Technologies, pages 29–42.
Microsoft Corp. (2017). Windows 10 mo-
bile deployment and management guide.
https://docs.microsoft.com/en-us/windows/
client-management/windows-10-mobile-and-mdm.
Peters, T., Gondree, M., and Peterson, Z. N. J. (2015).
DEFY: A deniable, encrypted file system for log-
structured storage. In 22nd Network and Distributed
System Security Symposium, NDSS. The Internet Soc.
Wang, Z., Murmuria, R., and Stavrou, A. (2012). Imple-
menting and optimizing an encryption filesystem on
android. In Proc. of IEEE Mobile Data Management,
pages 52–62.
Weinhold, C. and H
¨
artig, H. (2008). Vpfs: Building a vir-
tual private file system with a small trusted comput-
ing base. ACM SIGOPS Operating Systems Review,
42(4):81–93.
Yun, A., Shi, C., and Kim, Y. (2009). On protecting in-
tegrity and confidentiality of cryptographic file system
for outsourced storage. In Proc. of the ACM workshop
on Cloud computing security, pages 67–76.
A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment
595