Skip to Main Content
 

Global Search Box

 
 
 
 

ETD Abstract Container

Abstract Header

A Survey of Existing Technologies to Build Next Generation Data Security.

Yekkuluri, Damodar Reddy

Abstract Details

2019, Master of Science, Ohio State University, Electrical and Computer Engineering.
Current data security solutions are usually designed only to mandate access control. The fundamental flaw in this point of view is the lack of mechanisms for mitigation. We propose to rethink the data security paradigm, which concerns controlling the data access and reformulate it. We view data security as a continuous service that is inseparable of the content itself. This approach allows the consumption of the data without transferring its full ownership and hence makes it possible for the legitimate owner to maintain their control over data they shared with others. Widely acclaimed methods like subroutine hooking, stackable file systems are powerful tools for performance and behavioral analysis of user-level programs. Especially, thanks to subroutine hooking, practices like code obfuscation are no longer able to hide the conduct of anonymous programs, exposed vulnerabilities, and malware. Due to the strengths as mentioned above, we wanted to employ these approaches, but our investigations revealed certain fundamental flaws when used in the context of data security. On the other hand, more and more operating systems employ stricter controls over the processes, restricting the availability of such approaches for systems integrity protection in many instances, making their sustainability questionable. Since feasibility and sustainability are some of our top priorities, we decided not to further our work on improving these approaches, but we propose specific suggestions that can open up a new line of work to improve their applicability within this context. To achieve our comprehensive and expandable security infrastructure, we define the desired features and corresponding technical requirements and survey the existing paradigms to discuss their compatibility in supporting them. Then, we describe a hybrid approach that combines the strengths of low-level and the simplicity of user-level programming and implemented this architecture in the Windows operating system using the Minifilter framework and Windows services. We believe the availability of a general and applicable guideline for data security as a governance problem would pave the way for the next generation of data security technologies. With this goal in mind, we have prioritized the adaptability and feasibility of our solution to be able to support a variety of applications that revolve around protection of the ownership of data.
C. Emre Koksal (Advisor)
Yinqian Zhang (Committee Member)
51 p.

Recommended Citations

Citations

  • Yekkuluri, D. R. (2019). A Survey of Existing Technologies to Build Next Generation Data Security. [Master's thesis, Ohio State University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=osu1545675985185805

    APA Style (7th edition)

  • Yekkuluri, Damodar. A Survey of Existing Technologies to Build Next Generation Data Security. 2019. Ohio State University, Master's thesis. OhioLINK Electronic Theses and Dissertations Center, http://rave.ohiolink.edu/etdc/view?acc_num=osu1545675985185805.

    MLA Style (8th edition)

  • Yekkuluri, Damodar. "A Survey of Existing Technologies to Build Next Generation Data Security." Master's thesis, Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1545675985185805

    Chicago Manual of Style (17th edition)