Abstract

To improve the user's experience, almost all applications save usage data: web browsers save history and cookies, chat programs save message archives and so on. However, this data can be confidential and may compromise the user's privacy. There are third party solutions to automatically detect and wipe these traces, but they have two problems: they need a constantly updated database of files to target, and they wipe the data after it has been written to the disk. Our proposed solution does not need a database and it automatically reverts the application to its initial (clean) state, leaving no traces behind. This is done by using a monitoring process developed by us and the Volume Shadow Copy Service that takes snapshots when the application runs and restores them at the end of the run. Keywords—security; privacy; application traces; data wiping;

Highlights

  • Storage capacity of disks has increased during the recent years - sometimes exponentially - facilitating a large number of programs to work together and make sometimes very complex operations, and facilitating the amount of data that these programs work with

  • It is noted in this context, that there is a strong need to protect the data stored on a computer system against external agents that might compromise the security without the user's knowledge, to ensure the user's privacy and a proper functioning of the operating system

  • This protection was achieved by designing modern operating systems and even computer systems to avoid vulnerabilities to external factors and facilitate the implementation of subsystems designed for maintaining the security of the data

Read more

Summary

INTRODUCTION

Storage capacity of disks has increased during the recent years - sometimes exponentially - facilitating a large number of programs to work together and make sometimes very complex operations, and facilitating the amount of data that these programs work with. For the user of a modern computer system, it has become impossible to know or manually check the data and the software stored on a computer system, for reasons that relate to the huge volume that is stored and to the way programs hide and/or encrypt data during their normal operations It is noted in this context, that there is a strong need to protect the data stored on a computer system against external agents that might compromise the security without the user's knowledge, to ensure the user's privacy and a proper functioning of the operating system. The need to solve this problem started to become real, especially because of websites that lead the user to expose more data to the Internet browser (such as online shopping sites, flight bookings, banking services, etc.), very often on devices that do not belong to the user and that can be accessed by other people, programs or sites that are not trustable

CURRENT SOLUTIONS TO PROBLEMS OF DATA SECURITY AND PRIVATE DATA PROTECTION
Virtual Machines
Sandboxes
COMPARISON WITH OTHER SIMILAR METHODS
PROPOSED SANDBOXED SOLUTION TO ISOLATE PRIVATE DATA
Motivation
Specifications
Implementation
The Protected Mode Service
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call