Key Management for Transcrypt
#1

[attachment=15191]
With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is gaining considerable interest. The challenge in designing an encrypted filesystem stems from balancing performance, security perception, ease of usage and enterprise level deployability. Often, the most secure solutions may not even be the best solution either due to hit on performance or due to decreased usability. Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted filesystem a huge engineering exercise.
In this thesis, we talk about key management issues in TransCrypt, an encrypted filesystem design with smallest trust circle to the best of our knowledge. We provide an entire architecture with utilities like secure key stores, and their management through libraries inside and outside the kernel space. We provide enhancement of kernel CryptoAPI to include asymmetric cryptography, filesystem and file metadata management tools, and a communication framework to authenticate genuine users through user-space key stores. We present a design that incorporates modularity, flexibility while providing a transparently operational encrypted filesystem.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: transcrypt, transcrypt design of a secure and transparent encrypting file system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Projects9 0 873 20-01-2012, 06:30 PM
Last Post: Projects9
  Three Party Authentications for key Distributed Protocol using Implicit and Explicit mechanical engineering crazy 5 3,404 19-10-2011, 09:44 AM
Last Post: seminar addict
  RSA – Public Key Cryptography Algorithm seminar class 1 2,067 13-08-2011, 12:03 AM
Last Post: ja_mir05
  A Device Mapper based Encryption Layer for TransCrypt computer science crazy 1 1,025 11-08-2011, 11:22 AM
Last Post: smart paper boy
  TransCrypt: Design of a Secure and Transparent Encrypting File System computer science crazy 1 1,035 11-08-2011, 10:58 AM
Last Post: smart paper boy
  File System Independent Metadata Organization for TransCrypt computer science crazy 1 923 10-08-2011, 04:55 PM
Last Post: smart paper boy
  Key Management for Transcrypt computer science crazy 0 660 10-08-2011, 02:03 PM
Last Post: computer science crazy
  KTR: an Efficient Key Management Scheme for Secure Data Access Control seminar presentation 7 4,676 09-08-2011, 09:46 AM
Last Post: seminar addict
  An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting project topics 1 1,556 15-06-2011, 07:00 PM
Last Post: santhoshreddy challa
  A SECURE AND EFFICIENT KEY DISTRIBUTION SYSTEM computer science technology 2 2,260 20-05-2011, 09:36 PM
Last Post: seminar-database

Forum Jump: