SECURING CONSUMER ELECTRONICS: A DEEP DIVE INTO CRYPTOGRAPHIC FILE SYSTEM ALGORITHM PERFORMANCE
Abstract
The rapid proliferation of consumer electronic devices with limited capabilities over the last decade has ushered in a remarkable era of growth, necessitating the establishment of a more robust computing, storage, and communication framework to ensure heightened security. This surge in consumer electronics has permeated diverse sectors such as communication, finance, entertainment, and other services, imposing a pressing need to adhere to stringent information security standards. The Gramm-Leach-Bliley Act, including the Financial Services Modernization Act and Federal Financial Institutions Examination Council, underscores the imperative of encrypting electronic customer information during transmission or storage on networks and systems vulnerable to unauthorized access. As the consumer electronics landscape continues to expand, the integration of devices into the Internet of Things (IoT) poses a formidable challenge in devising security solutions capable of safeguarding the exchanged data. In the contemporary realm of digital communication networks, ensuring the privacy and security of transmitted data has emerged as an indispensable prerequisite for effective communication. Over time, there has been a concerted effort to explore data security schemes that furnish secure, real-time data storage across various applications, taking into account an array of potential attacks. In this context, the focus has shifted towards the exploration and implementation of lightweight cryptography algorithms, particularly in the context of resource-constrained devices within the IoT. These lightweight cryptography algorithms serve as a crucial line of defense, mitigating security risks associated with devices operating under resource constraints. This paper delves into the evolving landscape of data security, emphasizing the significance of encryption protocols and the adoption of lightweight cryptography in addressing the unique challenges posed by the IoT ecosystem.
Keywords:
Consumer Electronics, Information Security, Internet of Things (IoT), Lightweight, Cryptography, Data EncryptionDownloads
Published
DOI:
https://doi.org/10.5281/zenodo.10533755%20Issue
Section
How to Cite
License
Copyright (c) 2024 Gabriella Lorraine Makovsky

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Gramm-Leach-Bliley Act, (1999). [Online] Available: https://www.ftc.gov/business-guidance/privacysecurity/data-security (July 23, 2023) Careful Connections: Keeping the Internet of Things Secure, (2020). [Online] Available: https://www.ftc.gov/business-guidance/resources/careful-connections-keeping-internet-things-secure (July 23, 2023) Sunny A. (2022). A Review on Various Methods of Cryptography for Cyber Security. Journal of Algebraic Statistics, vol. 13, no. 3, 2022, 5016-5024. Singhal, V., Singh, D., & Gupta, S. K., “Crypto STEGO Techniques to Secure Data Storage Using DES, DCT, Blowfish and LSB Encryption Algorithms”, Journal of Algebraic Statistics. 2022, vol. 13, no. 3, p11621171. Pandey, A. & P. Bonde, P. Performance evaluation of various cryptography algorithms along with LSB substitution technique. International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 6, 2013, pp. 866871. Jammula, M., Vakamulla, V. M., &Kondoju, S. K. (2022). Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment. Journal of Interconnection Networks, 2022 Supplement, vol. 22, 1-21. Mousavi, S. K., Ghaffari, A., Besharat, S., &Afshari, H. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks (10220038), vol. 27, no. 2, 1515-1555. Shyaa, G. S. & Al-Zubaidie, M. (2023). Utilizing Trusted Lightweight Ciphers to Support Electronic-Commerce Transaction Cryptography. Applied Sciences (2076-3417), Jun2023, vol. 13, no. 12, 7085-7111. Wright, C., Martino, M., & Zadok, E. NCryptfs: A Secure and Convenient Cryptographic File System. USENIX 2003 Annual Technical Conference, San Antonio, Texas, 197-210. The GNU/Linux CryptoAPI site: www.kernel.org. Mueller, S. &Vasut, M. CryptoAPI. [Online] Available: https://www.kernel.org/doc/html/latest/crypto/index.html (July 23, 2023) Hoelzer, Ralf. Cryptoloop HOWTO. [Online] Available: http://www.ibiblio.org/pub/Linux/docs/HOWTO/Cryptoloop-HOWTO (July 23, 2023) Broz, Milan, (2021), Dm-crypt: Linux kernel device-mapper crypto target. [Online] Available: https://gitlab.com/cryptsetup/cryptsetup/-/wikis/DMCrypt (July 23, 2023) Project ID: 195655. Cryptsetup and LUKS - open-source disk encryption. [Online] Available: https://gitlab.com/cryptsetup/cryptsetup (July 23, 2023) Notes on filesystem layout. [Online] Available: http://lxr.linux.no/source/fs/cramfs/README (July 23, 2023) Ahn, S., Hyun, S., Kim, T. & Bahn, H. (2013). A compressed file system manager for flash memory basedconsumer electronics devices. IEEE Transactions on Consumer Electronics, vol. 59, no. 3, 544-549. Quinlan, Daniel. cramfs tools. [Online] Available: https://sourceforge.net/projects/cramfs/ (July 23, 2023) Woodhouse, David (2003). JFFS2: The Journalling Flash File System, version 2. [Online] Available: https://www.sourceware.org/jffs2/ (July 23, 2023)
American International Journal of Computer Science and Information Technology (AIJCSIT) Vol. 9 (1)
pg. 10
Pan, Y., Hu, Z., Zhang, N., Hu, H., Xia, W., Jiang, Z., Shi, L., & Li, S. (2022). HNFFS: Revisiting the NOR Flash File System. 2022 IEEE 11th Non-Volatile Memory Systems and Applications Symposium (NVMSA), 14-19. Gookyi, D. A. N., Ryoo, K. (2022). A Lightweight System-On-Chip Based Cryptographic Core for Low-Cost Devices. Sensors (14248220), Apr2022, vol. 22, no. 8, 1-28. Stallings, W. (2020). Cryptography and Network Security: Principles and Practice. (8th ed.). Pearson (Chapters 3-7). Corbet, J., Rubini, A., &Kroah-Hartman, G. (2005). Linux Device Drivers. (3rd ed.). O’Reilly (Chapters 7). [Online] Available: https://www.oreilly.com/openbook/linuxdrive3/book/ (July 23, 2023) Lomako, G. & Frank Delmas, F. Performance of Two Linux Methods for Encrypting Data at the File System Level in CE Devices. In 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, USA, January 11-13, 2007, IEEE, 2007, 1176-1177.