Confidential Storage and Deletion methods for Electronic Media
#1

Confidential Storage and Deletion methods for Electronic Media


.doc   Electronic Media.doc (Size: 221 KB / Downloads: 2)

INTRODUCTION

As the cost of electronic storage declines rapidly, more and more sensitive data are stored on media such as hard disks, CDs, and thumb drives. The push toward the paperless office also drives businesses towardconverting sensitive documents, once stored in locked filing cabinets, into digital forms. Today, an insurance agent can carry a laptop that holds thousands of Social Security numbers, medical histories, and other confidential information.

As early as 2003, the U.S. Census Bureau reported that two-thirds of American households have at leastone computer, with about one-third of adults using computers to manage household finances and make online purchases [U.S. Census Bureau 2005]. These statistics suggest that many computers store data on personal finances and online transactions, not to mention other confidential data such as tax records,passwords for bank accounts, and email. We can estimate that these figures have risen dramatically since the 2003 survey.

SECURITY BACKGROUND

This section is designed for storage researchers and provides the relevant security concepts used whencomparing storage designs.
The general concept of secure handling of data is composed of three aspects:confidentiality, integrity, and availability. Confidentiality involves ensuring that information is not read by unauthorized persons.Using encryption to store data or authenticating valid users are example means by which confidentiality is achieved. Integrity ensures that the information is not altered by unauthorized persons. Combining a message authentication code with sensitive data is a way to verify integrity.Finally, availability ensures that data is accessible when needed. Having multiple servers to withstand a malicious shutdown of a server is one way to improve availability.

Commonly Used Encryption Algorithms

Encryption is a procedure used in cryptography “to scramble information so that only someone knowing the appropriate secret can obtain the original information (through decryption) [Kaufman et al. 2002].” The secret is often a key of n random bits of zeros and ones, which can be derived through the use of a password or passphrase. A key’s strength is often associated with the length of the key which, if it consists of truly random bits, requires a brute-force enumeration of the key space to decrypt the original message.
An encryption algorithm, or cipher, takes a plaintext as input and produces encrypted text (i.e., ciphertext); similarly, a decryption algorithm takes a ciphertext as input and generates decrypted text (i.e., plaintext). Encryption algorithms can be either symmetric or asymmetric. Symmetric algorithms use the same key for both encryption and decryption. Asymmetric algorithms use two keys: one for encryption and another for decryption. For example, public-key cryptography uses two keys (public and private keys) and is often used to establish secure communication across a network where there is no way to exchange a symmetric key beforehand. Symmetric encryption schemes can be many times faster than comparable asymmetric schemes, and are therefore used more often in secure data storage, especially when the data in question does not traverse through an insecure network.
Common symmetric key encryption algorithms include the Data Encryption Standard (DES), TripleDES (3DES), and the Advanced Encryption Standard (AES).
These algorithms are block ciphers, meaning that they take a block of symbols of size n as input and output a block of symbols of size n. DES was published in 1975 and developed as the U.S. standard for unclassified applications in 1977 [Stinson 2002].

Traditional Modes of Operation

The operating mode of an encryption algorithm allows block ciphers to output messages of arbitrary length or turns block ciphers into self-synchronizing stream ciphers, which generate a continuous key stream to produce ciphertext of arbitrary length. For example, using AES alone, one may only input and output blocks of 128
bits each. Using AES with a mode of operation for a block cipher, one may input and output data of any length.
An initialization vector (IV) is commonly used with many block ciphers: it is a small, often random, but non-secret value used to help introduce randomness into the block cipher. The IV is often used at the beginning of the block cipher.



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: electronic data storage methods, electronic storage research topics, deletion, seminar topics on electronic media, data storage media, london college of media film and, wireless devices and media,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network attached storage computer science crazy 3 12,455 20-02-2019, 01:16 PM
Last Post:
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 8,502 12-09-2013, 08:28 PM
Last Post: Guest
  Automated Storage/Retrieval System seminar class 3 3,018 02-09-2013, 11:09 AM
Last Post: uchconveyor
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,119 29-11-2012, 12:56 PM
Last Post: seminar details
  Network Attached Storage (NAS) computer science crazy 3 4,205 16-11-2012, 12:40 PM
Last Post: seminar details
  Intelligent Electronic Devices (IEDs) and Supervisory Control and Data Acquisition computer girl 0 1,141 09-06-2012, 06:01 PM
Last Post: computer girl
  The 8051 Microcontroller and Embedded Systems Using Assembly and C computer girl 0 1,036 04-06-2012, 05:41 PM
Last Post: computer girl
  Electronic Nose (Download Full Seminar Report) Computer Science Clay 17 15,276 02-03-2012, 03:57 PM
Last Post: ratanlal
  Electronic Paper Display summer project pal 2 2,102 14-02-2012, 10:38 AM
Last Post: seminar paper
Shocked Electronic paper (E-paper) Computer Science Clay 19 15,342 14-02-2012, 10:38 AM
Last Post: seminar paper

Forum Jump: