Information Leakage Prevented by Data Encryption using Smartcard
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 3
Abstract
Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Symmetric-key encryption algorithms, however, it is not easy for a user to memorize the random numbers constituting the disk encryption key. So it is important not only to encrypt the disk data but also to store the disk encryption key securely. This can be done by storing the key in a hardware token such as smart card or USB device, but there must also be some way to recover read it If the token is lost. For example, it is necessary to keep a backup copy in a safe place such as another key management server. The encryption key should not be known by the system administrator, however, nor should it be possible for malicious users within the system to recover a user’s encryption key. In this paper we present a scheme that can limit key recovery when a user loses his smart card and can do so.
Authors and Affiliations
D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik
Key Performance Metrics for IT Projects
Metrics are the numerical data which will help us to measure the effectiveness of Project Execution. In Information Technology industry there are no standard set of metrics for development and sustenance projects which...
Integration of Network Technology MPLS based VPN: A model for establishing Virtual learning facility for multiple locations
Multi Protocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks that directs voice, video and data on the internet from one network node to the next based on short path labels rathe...
Design of Distributed System application on SOA, WPF, WF and WCF like new technologies: a Survey.
In this paper, a Survey of Latest Technologies used in the Software companies based on the latest Service Oriented Architecture (SOA) ,Windows Presentation Foundation (WPF), Windows communication foundation (WCF), Wind...
RAIN TECHNOLOGY.
The massive jumps in technology led to the expansion of internet as the most accepted medium for communication. But one of the most prominent problems with this client server based technology is that of maintaining a r...
HRD IN SME: A STUDY IN INCULCATION OF THE PRACTICE OF CONSCIOUS COMPETENCE LEARNING IN MOONLIGHT ENGINEERING COMPANY.
The Small and Medium Enterprises (SMEs) sector plays a pivotal role towards economic development regardless of the size of economy. It generates employment, increases production base and provides support to large scale...