Information Leakage Prevented by Data Encryption using Smartcard
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 3
Abstract
Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Symmetric-key encryption algorithms, however, it is not easy for a user to memorize the random numbers constituting the disk encryption key. So it is important not only to encrypt the disk data but also to store the disk encryption key securely. This can be done by storing the key in a hardware token such as smart card or USB device, but there must also be some way to recover read it If the token is lost. For example, it is necessary to keep a backup copy in a safe place such as another key management server. The encryption key should not be known by the system administrator, however, nor should it be possible for malicious users within the system to recover a user’s encryption key. In this paper we present a scheme that can limit key recovery when a user loses his smart card and can do so.
Authors and Affiliations
D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik
SHORTEST PATH ALGORITHMS: A COMPARATIVE ANALYSIS
Now a days routing is the vital problem while forwarding information from one node to another node in communication networks. Routing in today’s network is accomplished by shortest path routing algorithm. There are dif...
MULTI-TIER MANET’S
While mobile ad-hoc networking (MANET) research has received a considerable attention in recent years, the majority of them have focused on single-tier (e.g., ground) and homogeneous (e.g., same radio for every node) M...
A Study of Modeling, Simulation and Control Strategies for Marine Control Systems
This paper presents a review of various recent papers on development of models for control systems of large and complex processes of a vessel‘s main and auxiliary systems. The aim of this paper is to bring together the...
“BRAIN CONTROLLED CAR FOR DISABLED USING ARTIFICIAL INTELLIGENCE”
This paper considers the development of a brain driven car, which would be of great help to the physically disabled people. Since these cars will rely only on what the individual is thinking they will hence not require...
Deep web Data Integration Approach Based on Schema and Attributes Extraction of Query Interfaces
The deep web is becoming a collection of informative resource unlike the conventional web information that allow retrieval of the contents into the Deep Web only accessible through source query interfaces. However, the...