Information Leakage Prevented by Data Encryption using Smartcard

Abstract

Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Symmetric-key encryption algorithms, however, it is not easy for a user to memorize the random numbers constituting the disk encryption key. So it is important not only to encrypt the disk data but also to store the disk encryption key securely. This can be done by storing the key in a hardware token such as smart card or USB device, but there must also be some way to recover read it If the token is lost. For example, it is necessary to keep a backup copy in a safe place such as another key management server. The encryption key should not be known by the system administrator, however, nor should it be possible for malicious users within the system to recover a user’s encryption key. In this paper we present a scheme that can limit key recovery when a user loses his smart card and can do so.

Authors and Affiliations

D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik

Keywords

Related Articles

Views and Perceptions of Stakeholders on Industrial Attachment for Students Studying Tourism and Hospitality Management at the University of Zimbabwe – in Search for Smart Partnerships Between Industry and the University

This paper is based on research work carried out with the objective of establishing the perceptions of key stakeholders about industrial attachment for students studying tourism and hospitality management in the Facult...

Development Of Error Control Coding Technique In Digital Communication System

During digital data transmission in digital communication system, noise is added and physical defects in the communication medium can cause random errors during data transmission. Error coding is a method of detecting...

QUANTIFICATION OF AGILITY OF A SUPPLY CHAIN USING FUZZY LOGIC

We focus on the issue of performance evaluation in supply chains, in particular the concept of “Agility”. All parameters of agility can be qualitatively judged in linguistic terms. We specifically target the problem of...

A Framework for IC-Technology enabled Supply Chains

In lieu of a profound research interest on the growth pattern of financial commitment and deployment of large scale monetary resources on Information Technology within organisations, Information and Communication Techn...

Survey on Software Process Improvement and Improvement Models

Software Process Improvement is common thinking in today’s era for any organizations’ overall benefit. It starts when organization starts thinking about the change in working environment so that performance and profit...

Download PDF file
  • EP ID EP26590
  • DOI -
  • Views 359
  • Downloads 6

How To Cite

D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik (2012). Information Leakage Prevented by Data Encryption using Smartcard. International Journal of Engineering, Science and Mathematics, 2(3), -. https://europub.co.uk/articles/-A-26590