Next: CryptFS
Up: Related Work
Previous: Related Work
Matt Blaze's Cryptographic File System (CFS)[2] is probably the
most widely used secure filesystem and it is the
closest to TCFS in terms of architecture.
CFS encrypts the data before it passes across untrusted components,
and decrypts it upon entering trusted components.
CFS users create directories associated with keys and
each file created in a protected directory is
automatically encrypted.
CFS simulates a remote NFS server
which exports on demand encrypted directories.
All operations performed in clear by the user on a protected resource
are mapped by CFS to the source directory (created by cmkdir)
encrypted.
During (and after) the user session, an intruder could not obtain clear
data from the source directory.
CFS, that was the primary motivation of the work presented in
this paper, presents the following characteristics.
- CFS is not transparent to the user.
Encrypted directories have to be explictly
attached to a specific directory by the user before
they can be accessed.
- Cryptography granularity is at the level of the directory. This
implies that the user must remember a password for each
encrypted directory she owns.
Moreover, all files in an encrypted directory are encrypted as
opposed to TCFS where the user can choose which files to keep
in encrypted form and which to keep in clear.
- CFS has been implemented as a user application.
On the positive side, this approach
makes it very easy to port CFS to different operating systems.
On the negative side, this increases its vulnerability to attacks
to the client machine and reduces its performance.
- CFS does not allow group sharing of
protected resources nor it offers data authentication.
Next: CryptFS
Up: Related Work
Previous: Related Work
The TCFS Team
2001-04-27