slugInformation Leakage Prevented by Data Encryption using Smartcard
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 3
Abstract
Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Symmetric-key encryption algorithms, however, it is not easy for a user to memorize the random numbers constituting the disk encryption key. So it is important not only to encrypt the disk data but also to store the disk encryption key securely. This can be done by storing the key in a hardware token such as smart card or USB device, but there must also be some way to recover read it If the token is lost. For example, it is necessary to keep a backup copy in a safe place such as another key management server. The encryption key should not be known by the system administrator, however, nor should it be possible for malicious users within the system to recover a user’s encryption key. In this paper we present a scheme that can limit key recovery when a user loses his smart card and can do so.
Authors and Affiliations
D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik
Global Financial Crisis: An Indian Context
The financial crisis that originated in the United States in 2007-08 became a global financial crisis unprecedented since the Great Depression of the 1930s. Since mid-september of 2008 financial markets had collapsed a...
Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication
In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor...
slugBIODIESEL AS AN ALTERNATE FUEL FOR POLLUTION CONTROL IN DIESEL ENGINE
Diesel vehicles are the major source for air pollution; there is great potential for global warming due to discharge of greenhouse gases like CO2 from vehicles. Many lung problems are connected with particulate matter...
Multi-objective Optimization in Road Sensor and Actor Networks
In Road Sensor and Actor Networks, a lot of sensors and actors are arbitrarily deployed on public roads to gather real-time data on traffic and road conditions and ease decision making based on data gathered. Some acto...
Design and Simulation of Clock Synchronization Algorithm for Mobile Ad hoc Network
This paper gives brief introduction about clock synchronization in wireless mobile ad-hoc networks. Here we will discuss about the clock synchronization problem and scalability of MANETs. Also we will discuss about the...