TransCrypt: Design of a Secure and Transparent Encrypting File System
#2

[attachment=15206]
Introduction
The need for data security emerges from the widespread deployment of shared file
systems, greater mobility of computers and the rapid miniaturization of storage devices.
It is increasingly obvious that the value of data is much more than the value of
the underlying devices. The theft of a personal laptop or a USB thumbdrive leaves
the victim vulnerable to the risk of identify theft in addition to the loss of personal
or financial data and intellectual property. Several recent incidents of data theft emphasize
the need for a cohesive solution to the problem of storage security. Hence,
it is fast becoming necessary to protect stored data from unauthorized access using
strong cryptographic methods.
1.1 Motivation for Data Security
An enterprise-ready data protection system is vital in military organizations where
classified and secret data need to be shared and secured simultaneously. Recent news
reports of security breaches and data thefts from India’s military and intelligence
agencies [2] accentuate the critical need for a cryptographic solution to this problem.
According to reports relating to one case, important information was leaked through
stolen USB thumbdrives. Another case purportedly involved a computer administrator
who was able to pass secret data illegitimately to a foreign country. The fact that
both these cases involved insiders motivates the need for a secure data protection
mechanism that thwarts theft attempts and ensures that undue power is not left in
the hands of individual employees or administrators.
Data protection systems are increasingly playing a crucial role in commercial
environments too. A recent study conducted by Symantec Corporation [18] surveyed
laptop users across Europe, the Middle East and Africa to estimate the value of the
commercially sensitive contents of their laptops. The study estimated the average
worth of a single laptop to be about a million dollars.
Clearly, there is a pressing need to design and develop secure and usable data
protection mechanisms that cater to the above application scenarios. Encrypting file
systems fill this void to enable individuals and organizations to keep their storage
systems highly available and protected from unauthorized access at the same time.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: transparent**ution in gujarati language, advantage and diadvantage of transparent electronic, transparent connectivity for embedded system design, projects for encrypting and decrypting in java, ppts on transparent, transparent lcd system ppt, papad file design,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: TransCrypt: Design of a Secure and Transparent Encrypting File System - by smart paper boy - 11-08-2011, 10:58 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,090 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Exploring the design space of social network-based Sybil defenses 1 940 15-02-2017, 02:55 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 927 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Design of Intranet Mail System nit_cal 14 11,548 19-05-2015, 11:17 AM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,961 25-02-2015, 07:17 AM
Last Post: Guest
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,598 10-01-2015, 11:13 PM
Last Post: Guest
  Visa Processing System full report and asp source code project topics 2 5,567 19-06-2014, 06:54 PM
Last Post: seminar report asees
  Crime File management project topics 11 15,833 11-04-2014, 04:23 PM
Last Post: babs01
  e billing and invoice system seminar presentation 8 7,371 28-08-2013, 12:06 PM
Last Post: sonalibe1
  E -Crime File Management System seminar class 8 13,496 24-06-2013, 10:02 AM
Last Post: computer topic

Forum Jump: