I have an application that launches CPU/GPU intensive applications as child processes. Within each child process I'm looking for a way to create a process-private filesystem (encrypted, hidden, etc...) that only that process has access to. This filesystem can reside on a local disk, UNC path or mapped drive. Only the process that created that private filesystem (subfolder) can have access to it. Any other process, including users and administrators, must not be able to "see" the contents of that private filesystem. This filesystem can be disk-based or memory-based (as long as the memory-based filesystem can be accessed via a mapped-drive)
Possibile solutions:
- Process-private RAMDISK. (not visible or accessible to logged in users)
- Encrypted folder that can me managed by unique (random) passwords that are maintained by the process. Again, users and admins must never be allowed to access the contents of this filesystem.
- Custom device driver?
Note: The "filesystem" can be an actual disk-based filesystem or a folder that resides on an existing disk hierarchy.
Any help would be much appreciated.