TransCrypt: Design of a Secure and Transparent Encrypting File System
#2
[attachment=15206]
Introduction
The need for data security emerges from the widespread deployment of shared file
systems, greater mobility of computers and the rapid miniaturization of storage devices.
It is increasingly obvious that the value of data is much more than the value of
the underlying devices. The theft of a personal laptop or a USB thumbdrive leaves
the victim vulnerable to the risk of identify theft in addition to the loss of personal
or financial data and intellectual property. Several recent incidents of data theft emphasize
the need for a cohesive solution to the problem of storage security. Hence,
it is fast becoming necessary to protect stored data from unauthorized access using
strong cryptographic methods.
1.1 Motivation for Data Security
An enterprise-ready data protection system is vital in military organizations where
classified and secret data need to be shared and secured simultaneously. Recent news
reports of security breaches and data thefts from India’s military and intelligence
agencies [2] accentuate the critical need for a cryptographic solution to this problem.
According to reports relating to one case, important information was leaked through
stolen USB thumbdrives. Another case purportedly involved a computer administrator
who was able to pass secret data illegitimately to a foreign country. The fact that
both these cases involved insiders motivates the need for a secure data protection
mechanism that thwarts theft attempts and ensures that undue power is not left in
the hands of individual employees or administrators.
Data protection systems are increasingly playing a crucial role in commercial
environments too. A recent study conducted by Symantec Corporation [18] surveyed
laptop users across Europe, the Middle East and Africa to estimate the value of the
commercially sensitive contents of their laptops. The study estimated the average
worth of a single laptop to be about a million dollars.
Clearly, there is a pressing need to design and develop secure and usable data
protection mechanisms that cater to the above application scenarios. Encrypting file
systems fill this void to enable individuals and organizations to keep their storage
systems highly available and protected from unauthorized access at the same time.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: advantage and diadvantage of transparent electronic, projects for encrypting and decrypting in java, transparent connectivity for embedded system design, papad file design, transparent, ppts on transparent, transparent**ution in gujarati language,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: TransCrypt: Design of a Secure and Transparent Encrypting File System - by smart paper boy - 11-08-2011, 10:58 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,087 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Exploring the design space of social network-based Sybil defenses 1 938 15-02-2017, 02:55 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 924 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Design of Intranet Mail System nit_cal 14 11,527 19-05-2015, 11:17 AM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,946 25-02-2015, 07:17 AM
Last Post: Guest
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,597 10-01-2015, 11:13 PM
Last Post: Guest
  Visa Processing System full report and asp source code project topics 2 5,563 19-06-2014, 06:54 PM
Last Post: seminar report asees
  Crime File management project topics 11 15,813 11-04-2014, 04:23 PM
Last Post: babs01
  e billing and invoice system seminar presentation 8 7,364 28-08-2013, 12:06 PM
Last Post: sonalibe1
  E -Crime File Management System seminar class 8 13,493 24-06-2013, 10:02 AM
Last Post: computer topic

Forum Jump: