TransCrypt: Design of a Secure and Transparent Encrypting File System
#1

TransCrypt: Design of a Secure and Transparent Encrypting File System


Increasing thefts of sensitive data owned by individuals and organizations call for an integrated solution to the problem of storage security. Most existing systemsare designed for personal use and do not address the unique demands of enterprise environments. An enterprise-class encrypting file system must take a cohesive approach towards solving the issues associated with data security in organizations. These include flexibility for multi-user scenarios, transparent remote access of shared file systems and defense against an array of threats including insider attacks while trusting the fewest number of entities.

In this thesis, we formalize a general threat model for storage security and discuss how existing systems that tackle a narrow threat model are thus susceptible to attacks. We present the conceptualization, design and implementation of {\em TransCrypt,} a kernel-space encrypting file system that incorporates an advanced key management scheme to provide a high grade of security while remaining transparent and easily usable. It examines difficult problems not considered by any existing system such as avoiding trusting the superuser account or privileged user-space process and proposes novel solutions for them. These enhancements enable TransCrypt to protect against a wider threat model and address several lacunae in existing systems.
Reply
#2
[attachment=15206]
Introduction
The need for data security emerges from the widespread deployment of shared file
systems, greater mobility of computers and the rapid miniaturization of storage devices.
It is increasingly obvious that the value of data is much more than the value of
the underlying devices. The theft of a personal laptop or a USB thumbdrive leaves
the victim vulnerable to the risk of identify theft in addition to the loss of personal
or financial data and intellectual property. Several recent incidents of data theft emphasize
the need for a cohesive solution to the problem of storage security. Hence,
it is fast becoming necessary to protect stored data from unauthorized access using
strong cryptographic methods.
1.1 Motivation for Data Security
An enterprise-ready data protection system is vital in military organizations where
classified and secret data need to be shared and secured simultaneously. Recent news
reports of security breaches and data thefts from India’s military and intelligence
agencies [2] accentuate the critical need for a cryptographic solution to this problem.
According to reports relating to one case, important information was leaked through
stolen USB thumbdrives. Another case purportedly involved a computer administrator
who was able to pass secret data illegitimately to a foreign country. The fact that
both these cases involved insiders motivates the need for a secure data protection
mechanism that thwarts theft attempts and ensures that undue power is not left in
the hands of individual employees or administrators.
Data protection systems are increasingly playing a crucial role in commercial
environments too. A recent study conducted by Symantec Corporation [18] surveyed
laptop users across Europe, the Middle East and Africa to estimate the value of the
commercially sensitive contents of their laptops. The study estimated the average
worth of a single laptop to be about a million dollars.
Clearly, there is a pressing need to design and develop secure and usable data
protection mechanisms that cater to the above application scenarios. Encrypting file
systems fill this void to enable individuals and organizations to keep their storage
systems highly available and protected from unauthorized access at the same time.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ppts on transparent, transparent connectivity for embedded system design, transparent lcd system ppt, transparent connectivity for embedded system design project report, advantage and diadvantage of transparent electronic, transcrypt design of a secure and transparent encrypting file system, transparent**ution in gujarati language,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,063 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Exploring the design space of social network-based Sybil defenses 1 919 15-02-2017, 02:55 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 907 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Design of Intranet Mail System nit_cal 14 11,447 19-05-2015, 11:17 AM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,927 25-02-2015, 07:17 AM
Last Post: Guest
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,576 10-01-2015, 11:13 PM
Last Post: Guest
  Visa Processing System full report and asp source code project topics 2 5,531 19-06-2014, 06:54 PM
Last Post: seminar report asees
  Crime File management project topics 11 15,719 11-04-2014, 04:23 PM
Last Post: babs01
  e billing and invoice system seminar presentation 8 7,288 28-08-2013, 12:06 PM
Last Post: sonalibe1
  E -Crime File Management System seminar class 8 13,442 24-06-2013, 10:02 AM
Last Post: computer topic

Forum Jump: