Key Management for Transcrypt
#1

Key Management for Transcrypt


With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is gaining considerable interest. The challenge in designing an encrypted filesystem stems from balancing performance, security perception, ease of usage and enterprise level deployability. Often, the most secure solutions may not even be the best solution either due to hit on performance or due to decreased usability. Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted filesystem a huge engineering exercise.

In this thesis, we talk about key management issues in TransCrypt, an encrypted filesystem design with smallest trust circle to the best of our knowledge. We provide an entire architecture with utilities like secure key stores, and their management through libraries inside and outside the kernel space. We provide enhancement of kernel CryptoAPI to include asymmetric cryptography, filesystem and file metadata management tools, and a communication framework to authenticate genuine users through user-space key stores. We present a design that incorporates modularity, flexibility while providing a transparently operational encrypted filesystem.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: transcrypt, transcrypt design of a secure and transparent encrypting file system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Projects9 0 864 20-01-2012, 06:30 PM
Last Post: Projects9
  Three Party Authentications for key Distributed Protocol using Implicit and Explicit mechanical engineering crazy 5 3,395 19-10-2011, 09:44 AM
Last Post: seminar addict
  RSA – Public Key Cryptography Algorithm seminar class 1 2,062 13-08-2011, 12:03 AM
Last Post: ja_mir05
  A Device Mapper based Encryption Layer for TransCrypt computer science crazy 1 1,014 11-08-2011, 11:22 AM
Last Post: smart paper boy
  TransCrypt: Design of a Secure and Transparent Encrypting File System computer science crazy 1 1,026 11-08-2011, 10:58 AM
Last Post: smart paper boy
  Key Management for Transcrypt smart paper boy 0 702 11-08-2011, 09:31 AM
Last Post: smart paper boy
  File System Independent Metadata Organization for TransCrypt computer science crazy 1 911 10-08-2011, 04:55 PM
Last Post: smart paper boy
  KTR: an Efficient Key Management Scheme for Secure Data Access Control seminar presentation 7 4,667 09-08-2011, 09:46 AM
Last Post: seminar addict
  An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting project topics 1 1,548 15-06-2011, 07:00 PM
Last Post: santhoshreddy challa
  A SECURE AND EFFICIENT KEY DISTRIBUTION SYSTEM computer science technology 2 2,249 20-05-2011, 09:36 PM
Last Post: seminar-database

Forum Jump: