MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot

Wendi Feng, Chuanchang Liu*, Zehua Guo, Thar Baker, Gang Wang, Meng Wang, Bo Cheng, Junliang Chen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems provide an effective manner to protect sensitive data by hiding them on the device. However, existing PDE systems can lose data due to overriding the hidden volume, waste physical storage owing to the “reserved area” for avoiding data loss, and require device reboot when using the hidden volume. This paper presents MobiGyges, a hidden volume-based mobile PDE system, to fill the gap. MobiGyges addresses the problem of data loss by restricting each storage block used only by one volume, and it improves storage utilization by eliminating the “reserved area”. MobiGyges also avoids device reboot by mounting the hidden volume dynamically on-demand with the Dynamic Mounting service. Moreover, we identify two novel PDE oriented attacks, the capacity comparison attack and the fill-to-full attack. MobiGyges can defend against them by jointly leveraging the Shrunk U-disk method and multi-level deniability. We implement the MobiGyges proof-of-concept system on a real mobile phone Google Nexus 6P with LineageOS 13. Experimental results show that MobiGyges prevents data loss, avoids device reboot, improves storage utilization by over 30% with acceptable performance overhead compared with current solutions.

Original languageEnglish
Pages (from-to)158-171
Number of pages14
JournalFuture Generation Computer Systems
Volume109
DOIs
Publication statusPublished - Aug 2020

Keywords

  • Avoiding reboot
  • Data loss preventing
  • Hidden volume
  • Improving storage utilization
  • Sensitive data protection

Fingerprint

Dive into the research topics of 'MobiGyges: A mobile hidden volume for preventing data loss, improving storage utilization, and avoiding device reboot'. Together they form a unique fingerprint.

Cite this