Information Leakage Prevented by Data Encryption using Smartcard

Abstract

Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Symmetric-key encryption algorithms, however, it is not easy for a user to memorize the random numbers constituting the disk encryption key. So it is important not only to encrypt the disk data but also to store the disk encryption key securely. This can be done by storing the key in a hardware token such as smart card or USB device, but there must also be some way to recover read it If the token is lost. For example, it is necessary to keep a backup copy in a safe place such as another key management server. The encryption key should not be known by the system administrator, however, nor should it be possible for malicious users within the system to recover a user’s encryption key. In this paper we present a scheme that can limit key recovery when a user loses his smart card and can do so.

Authors and Affiliations

D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik

Keywords

Related Articles

SHORTEST PATH ALGORITHMS: A COMPARATIVE ANALYSIS

Now a days routing is the vital problem while forwarding information from one node to another node in communication networks. Routing in today’s network is accomplished by shortest path routing algorithm. There are dif...

MULTI-TIER MANET’S

While mobile ad-hoc networking (MANET) research has received a considerable attention in recent years, the majority of them have focused on single-tier (e.g., ground) and homogeneous (e.g., same radio for every node) M...

A Study of Modeling, Simulation and Control Strategies for Marine Control Systems

This paper presents a review of various recent papers on development of models for control systems of large and complex processes of a vessel‘s main and auxiliary systems. The aim of this paper is to bring together the...

“BRAIN CONTROLLED CAR FOR DISABLED USING ARTIFICIAL INTELLIGENCE”

This paper considers the development of a brain driven car, which would be of great help to the physically disabled people. Since these cars will rely only on what the individual is thinking they will hence not require...

Deep web Data Integration Approach Based on Schema and Attributes Extraction of Query Interfaces

The deep web is becoming a collection of informative resource unlike the conventional web information that allow retrieval of the contents into the Deep Web only accessible through source query interfaces. However, the...

Download PDF file
  • EP ID EP26590
  • DOI -
  • Views 326
  • Downloads 6

How To Cite

D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik (2012). Information Leakage Prevented by Data Encryption using Smartcard. International Journal of Engineering, Science and Mathematics, 2(3), -. https://europub.co.uk/articles/-A-26590