slugInformation Leakage Prevented by Data Encryption using Smartcard

Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 3

Abstract

Information leakage has recently become a serious problem and most often a result of actions inside rather than outside the system that should be protecting the information. Although system administrators have high access authority, they should not know the disk encryption keys of users because they may not be authorized to read a user's sensitive information. Information leakage from a disk in a managed network (e.g., an enterprise network) is generally prevented by encrypting either the entire disk or just the confidential files stored on it. Since this encryption uses highly secure. Symmetric-key encryption algorithms, however, it is not easy for a user to memorize the random numbers constituting the disk encryption key. So it is important not only to encrypt the disk data but also to store the disk encryption key securely. This can be done by storing the key in a hardware token such as smart card or USB device, but there must also be some way to recover read it If the token is lost. For example, it is necessary to keep a backup copy in a safe place such as another key management server. The encryption key should not be known by the system administrator, however, nor should it be possible for malicious users within the system to recover a user’s encryption key. In this paper we present a scheme that can limit key recovery when a user loses his smart card and can do so.

Authors and Affiliations

D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik

Keywords

Related Articles

Impact of Financial Inclusion on Daily Wage Earners with Reference to Bhopal

Financial Inclusion was came up to be the best way to deliver financial service to the low income group of society.it is been stated that for the public good, banking services is been Introduced so to keep in mind that...

Data Security in the Transition from IPv4 to IPv6

IPv4 is a foundation of Internet communication. Designed many years ago the protocol is inadequate in modern networks. New sixth ersion is replacing the older one. It is often repeated that IPv6 was designated to solve...

Components Based Software Testing Strategies to Develop Good Software Product

Component based software development is used for building a new software artifact rapidly by using less resource. Different components are collected and integrated collectively to form new product therefore the feature...

M-COMMERCE: SECURITY CHALLENGES ISSUES AND RECOMMENDED SECURE PAYMENT METHOD

As mobile technologies and services are in stable development, many wonder on whether or not mobile payments will be a destroyer function for mobile commerce. To have an improved considerate of the market, presently th...

Relationship between building human resources and business value planning

The purpose of this research is to understand and quantify the relationship of building human resourceson business value planning and strength of interaction among them. A theoretical framework is proposed regarding th...

Download PDF file
  • EP ID EP18208
  • DOI -
  • Views 325
  • Downloads 12

How To Cite

D. B. Shanmugam, P. Sathish Saravanan, T. Karthikeyan and N. Karthik (2012). slugInformation Leakage Prevented by Data Encryption using Smartcard. International Journal of Management, IT and Engineering, 2(3), -. https://europub.co.uk/articles/-A-18208