slugInformation Leakage Prevented by Data Encryption using Smartcard
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 3
Abstract
Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Symmetric-key encryption algorithms, however, it is not easy for a user to memorize the random numbers constituting the disk encryption key. So it is important not only to encrypt the disk data but also to store the disk encryption key securely. This can be done by storing the key in a hardware token such as smart card or USB device, but there must also be some way to recover read it If the token is lost. For example, it is necessary to keep a backup copy in a safe place such as another key management server. The encryption key should not be known by the system administrator, however, nor should it be possible for malicious users within the system to recover a user’s encryption key. In this paper we present a scheme that can limit key recovery when a user loses his smart card and can do so.
Authors and Affiliations
D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik
slugIT revolution and changing face of rural India
The role of Information Technology to develop agricultural research, education and extension to improve quality of life in rural area is well established. IT can help an average Indian farmer to get relevant informatio...
slugCost Estimation of Dynamic Programming Algorithm For Solution of Graphical as well as Network Problems for minimum path
The cost estimation for any algorithm defines the running time for that algorithm means to say how much time it taken to produce the solution. It defines the performance of algorithm. The dynamic programming approach i...
slugThe Approaches of Materialize View Maintenance Process in Data Warehousing
Materialized view maintenance is a significant issue due to the growing use of warehouse technology for information integration and data analysis. Materialized views are used to speed up query processing on large amoun...
An Meta Analytical Conceptual Study on Leader Communication Paradox; A Leadership Perspective
In this fast and furious world of lifelessness, with so much of sensory and cognitive overload, not many leaders or is it possible for the leaders to effectively communicate. The paradox is that leaders communicate exa...
PONTIC MORPHOLOGY AS LOCAL RISK FACTOR IN ROOT DECAY AND PERIODONTAL DISEASE
Infections with various microorganisms are main cause of dental caries and periodontal disease [1].The types of fixed partial dentures includes all-metal, metal ceramic, and resin veneered metal prostheses.Some of the...