Feeds

Boffins devise way to hide secret data on hard drives

Technique evades forensics investigations

Build a business case: developing custom apps

Computer scientists have developed software that hides sensitive data on hard drive, without the use of encryption, by controlling the precise disk locations containing the file's data fragments.

The application, which the academic researchers said they would release as open-source software, makes use of steganography, or the ancient art of hiding secret information in plain sight. The technique has long been employed to keep sensitive data out of the hands of adversaries. The use of encryption, by contrast, is easy to detect, tipping off adversaries that a hard drive or other piece of media contains information considered secret.

The software ensures that individual disk clusters that store the sensitive data fragments are positioned in a way predetermined by their code. A person who later wants to read the secret information uses the same application to reassemble the file. The inventors said their method makes it possible to stealthily store a 20-megabyte message on a 160-gigabyte portable hard drive.

“We have presented a novel data security mechanism, a filesystem-based covert channel which allows a user to evade disk forensics by securely hiding data in a removable or permanent mass storage device,” the researchers wrote in their paper, titled Designing a cluster-based covert channel to evade disk investigation and forensics. “Information is hidden in a manner such that an investigator is unable to positively prove the existence of hidden data.”

The researchers, from the University of Southern California in Los Angeles and the National University of Science and Technology in Islamabad, Pakistan, said the technique may cause only small performance degradations. In some cases, the approach requires the data to be hidden through the use of a secret shared between the sender and recipient. ®

Next gen security for virtualised datacentres

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?