Study on Secure File Transfer Scheme on ARM9-based Security
|
|
- Evangeline Gaines
- 8 years ago
- Views:
Transcription
1 Study on Secure File Transfer Scheme on ARM9-based Security Authentication Platform * (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, ) * idlink@163.com Abstract A file transfer scheme on ARM9-based security authentication platform is proposed for secure transfer of file between computer and storage device. The scheme has designed several functional modules on basis of self-designed ARM9 platform, which include secure hiding, transfer management, recovery and destruction management. User can directly operate the files by using these functions. By comparing with traditional software based secure file transfer system, our scheme has better performance on security and transfer overhead. 1. Introduction Keywords: ARM9, File Hiding, Recovery Management, Transfer Overhead With the rapid development of network, network file storage makes life and work much convenient. However, data security is concerned by more and more people. At present, people always use software for secure authentication of secret files. Software authentication system [1-2] has lots of security vulnerabilities in secret file transfer between removable storage device and computer. The current software authentication system [3-9] cannot meet the security requirement in secret file transfer by using only general password authentication. It is pressed for a secure file transfer system with high security and controllability in user terminal and removable storage device. In order to prevent important files from theft and leakage, USB filtering driver is used in literature [10]. Device control is implemented by intercepting in loading of USB storage device; in literature [11], USB filtering driver is combined with file filtering driver for device controlling. Literature [12] has used file filtering driver for controlling storage device, however, multi-volume and unique reorganization did not take into account since multiple volumes may produced in file system for one removable storage device. Consequently, literature [13] has presented authority grading for volumes in removable device. Real-time control is implemented by recognizing the produced volumes, unique identification and access authority of each volume. This method mainly concentrate on application driver controlling under API of operating system, it is not effective in authentication terminal for file transfer. In result, these methods have certain threaten to secure authentication. In our paper, a secure file transfer system based on fingerprint characteristics is proposed. The scheme consists of hardware authentication and secure file transfer management. Hardware authentication is on basis of biometric recognition principle, which integrates self-designed ARM9 master-controlling circuit, fingerprint signal processing circuit, USB data acquisition circuit and power supply. A secure file transfer device with fingerprint recognition is produced. On basis of the device, we have designed management software for encrypted file transfer with identity authentication and file hiding. A distributed algorithm for effectively hiding file is integrated in the software, which makes distributed file hidden and complete recovery. The system has compact architecture, high performance, convenient authority management and operation and retrospective functions as well. 2. Design of Secure File Transfer System 2.1. Hardware Architecture According to requirements of system functions, the hardware architecture is divided as shown International Journal of Advancements in Computing Technology(IJACT) Volume5,Number8,April 2013 doi: /ijact.vol5.issue
2 in Figure 1. A hardware architecture based on ARM9 is used. Master controlling CPU is S3C2440, which shoulders controlling and operation of the whole system. High-capacity Flash and RAM are used for temporary storage and data storage management. External interface devices adopt mature USB bus control technology for interconnection of external storage and confidential computer. If high-speed devices (CPU, SRAM, Flash, system, power protect unit, USB2.0 controller) use AHB interconnection, 1G Flash storage device could be used for secure storage of abundant data. Fingerprint acquisition chip is American Veridicom FPS200, which can directly output digital image signal. A pixel is indicated with 8 bits. Three interface modes (CPU, SPI, USB) are optional. The area of required sensor array is easy to define Design of Software Modules Figure 1. Hardware architecture of system Modules of Driver Mounting and Task Control Driver mounting and task control modules of the entire system are implemented by using driver mount control thread. After starting, the thread repeats scanning the sda device file under /dev directory. If detected, a USB storage device is inserted. In this case, system determines the authority. If readable and writable, the driver g_file_storage.ko module will be mounted with read and write mode. If read-only, the driver g_file_storage.ko module will be mounted with read-only mode. If no authority, the driver is unmounted. After that, the thread repeats scanning the sda device file under /dev directory. If not exist, USB storage device is extracted. In this case, the thread will unmount the mounted driver. The flow is shown as Figure
3 Figure 2. Flow of driver mounting Figure 3. Flow of application software on upper computer Modules of File Transfer and Task Management The module of file transfer is shown in Figure 3. PC application software supervises the access of USB removable transmission medium. If detected, the accessed USB is immediately hidden. User can access and transfer files only by using the software. (1) Module for Hiding USB device For sake of hiding USB device module, custom file traversal function is used to replace entry address of original file traversal function. After that, the system calls original function. In this case, the file traversal function called by system is actually the custom. There are two ways to mount API in Windows operating system: one is to mount API at user level; the other one is to mount API at kernel layer. The former is applicable for high stability of user-state, easy to realize and more robust. The latter requires the use of drivers, which is more complicated but better hiding effect. Our work adopts the former way to hide USB device module. As shown in Figure 4, once the system software detected removable storage volumes carried with USB device, it will immediately distinguish. The procedure usually performs when the kernel, device driver or application access file or directory in the volume at the first time. All of IRP for this volume will be sent to its driver by FO manager. The unauthorized USB devices will be shielded directly with no response. For the authorized ones, system will close all of other probable accessing ways immediately. A kernel thread will be created to access the lower computer, by which API functions provided by lower computer can be called to access or transfer files in the inserted USB devices. 192
4 Figure 4. Flow of hiding module Figure 5. Flow of file transfer module (2) Module of File Transfer The file transfer module of our system is shown in Figure 5. The module is completely different from the past file copy and paste and has used file cutting encryption algorithm. The target file is cut into several parts. These parts are hidden into uncertain positions in operating system or file system of removable device and related information is saved in log file. Moreover, the log file will save authorized user name permitted to operate the target file, operating time, operating type and other relevant information. Anyone who transfers files will leaves some relevant information. According to the information, the traceability to file transfer is realized. The security of files in upper computer and removable device is highly improved. System confirms identity of user, if authorized, it will traversal the specific disc and search the existed LOG files. The LOG files under the directory are pushed. Once count of files is greater than two, a new LOG file is generated and pushed. The transferred file will be cut into parts and then distributed to random positions of hash table. These positions are recorded into LOG file. Finally, for authorized user, an image file with the same name to the original file should be created at the saved path of transferred file. It is invalid to access this file directly. The file is only the entry to transfer file. (3) The Modules of Recovery and Destruction The modules of recovery and destruction actually use the log file generated by target file to realize file recovery and destruction. According to information in log file, the module searches all parts of target file. By using related decryption algorithm, the target file could be completely recovered. Same to recovery, the destruction is to delete all parts instead of decryption. The file is not complete if it is operated directly without using the module. Recovery or destruction only through the modules can recover or destroy the file. The destruction module need to find host file, erase fragment information and then delete image file. The function destroyinfoformdir() verifies if the image file is invalid and then read relevant fragments and host file. The function destroyfile() is to destroy file fragments according to relevant information. 193
5 The function firstly obtains pointer and fragment size of the host file, opens it with function fopen() and moves the pointer to the end with fseek(). Finally, verify whether tag exists at the end of host file. If exists, function fwrite() will delete fragment information according to fragment size. 3. Experiments and Analysis The experiments conduct on personal computer with Intel Pentium Dual-Core 2GHz CPU and 2G memory and ARM9 Linux system. The test files include 200 files with different types. The Figure 6, Figure 7 and Figure 8 show the physical picture of our platform, login interface and software interface. The final experimental environment is on self-designed embedded authentication platform based on ARM9 CPU (frequency: 170MHz). Figure 6. Picture of our platform Figure 7. System login interface Figure 8.Software interface In order to further verify the file system for the safety of the virus resistance performance, we embed respectively three different virus in the file system by the malicious software in the base of designing feature code library. As shown in Table 1, according to the method and the other two kinds of different methods of killing experimental, in three different feature code file system of mobile storage volume, the space of the killing method designed in the base of literature [12] is slow, it is invalid for the killing of shock wave software, and the killing method designed in the base of literature [13] is also invalid for the killing of worm virus, but the method of this article can quickly isolation and killing three different virus file in the mobile storage volume. Therefore, the method of this article has a better safety performance in safety and protection aspects of the virus. The standard files are chosen in experiments. As shown in Table 2, we conduct secure file transfer to three different types of removable storage device. The experimental results show that our scheme has better performance to read arbitrary volumes by comparing with literature [12]. The reason is that our ARM9 based authentication platform could rapid control write-read to arbitrary volume. The transferred file will be hidden in each system file of operating system randomly. Once the file destroyed, our recovery algorithm could recover to the original. Consequently, our scheme has better performance in terms of controllability and security in file transfer procedure. 194
6 Table1. Performance comparison chart of System security Objects Document [12] Document The method of this [13] article Shock wave software invalid valid valid Worm virus valid invalid valid Trojan virus valid valid valid 4. Conclusions An ARM9 based secure file transfer system is proposed. By comparing hardware model and experiments, our scheme has the following advantages that: (1) the use of self-designed embedded secure file transfer platform based on ARM9, has solved the dependency on unreliable platform for file transfer; (2) file hiding and recovery in file transfer has realized on the proposed platform; (3) security and response speed is better in secure file transfer. Since the creation of secure file transfer model is much complicated, the system may cost much hardware resources. In future, low-overhead and high-speed file transfer scheme will be concentrated. Method Literature [13] Removable Storage device Table2. Performance Comparison of File Transfer Controllability of File Transfer Overhead of Secure File Transfer Arbitrary volume read-writ e Recovery Destruction CPU Speed Power Overhead Transmission Rate Kingston 4G USB Disk Yes No No Medium Low Medium Seagate Mobile Hard No No No Medium Higher Medium Disk Hitachi Mobile Hard Disk No No No Medium Low Medium Kingston 4G USB Disk Yes Yes Yes Fast Higher Fast Our method Seagate Mobile Hard Disk Hitachi Mobile Hard Disk Yes Yes Yes Fast Higher Fast Yes Yes Yes Fast Higher Fast 5. Acknowledgements This paper is supported by the National Natural Science Foundation of China (No ).National Natural Science Foundation of Hunan Province and Xiangtan united Foundation under Grant (No.11JJ9014), the Planned Science and Technology Project of Hunan Province, China (No. 2011GK3156, 2011GK3205 ), the SRIP Project of Hunan Science and Technology University (No.SZZ ), and the College Students' Innovative Project of Hunan Province (No.KDSC1105). 6. References [1] H. Tang, F. Bo, K. Hou, J. Zhou, Design of Secure File Transfer System based on ARM, China Science and Technology Information, vol.4, pp.94-96,
7 [2] J. Qin, P. Wang, Mobile Media Management System based on USB Device Driver, Computer and Digital Engineering, vol.38, no.4, pp , [3] L. Zheng, Z. Ma, M. Gu, Techniques of File System Filter Driver-based and Security-enhanced Encryption System, Mini-Micro Systems, vol.7, no.7, pp , [4] H. Hu, F. Yao, C. He, Solution of Windows Files Security Protection based on File System Filter Driver, Computer Application, vol.29, no.1, pp , [5] J. Zou, W. Cai, A USB Storage Device Monitor and Control System based on WDF Filter Driver, Computer Engineering and Science, vol.32, no.3, pp.42-44, [6] Zhe Jia, Lei Pang, Shoushan Luo, Yang Xin, Miao Zhang, Research on Distributed Privacy-Preserving Data Mining, JCIT, Vol. 7, No. 1, pp , 2012 [7] Lei Pang, Jian-feng Sun, Shou-shan Luo, Bai Wang, Yang Xin, A Research of the Privacy Preserving Architecture of Electronic Auction, JCIT, Vol. 7, No. 1, pp , 2012 [8] J. Li, H. Shu, W. Dong, Y. Xie, Security Monitoring Technology of USB Storage Device based on Driver Layer, Computer Engineering, vol.34, no.8, pp , [9] G. Sun, D. Chen, D. Wu, Research and Implementation of Secure-Mobile Storage System, Computer Engineering, vol.35, no.11, pp , [10] Z. Gu, L. Zhou, G. Lv, The Access Control Technology of Spatial DataFiles based on File System Filter Driver, 11th IEEE International Conference on Communication Technology, pp , [11] D. Jovan, B. Madalina, Entropy Analysis and New Constructions of Biometric Key Generation Systems, IEEE Transactions on Information Theory, vol.54, no.5, pp , [12] F. M. Bui, K. Martln, H. Lu, K. N. Plataniotis, D. Hatzinakos, Fuzzy Key Binding Strategies based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications,, IEEE Transactions on Information Forensics and Security, vol.5, no.l, pp , [13] Y. Suteu, S. Rane, J. S. Yedidia, S. C. Draper, A. Vetro, Feature Transformation of Biometric Templates for Secure Biometric Systems based on Error Correcting Codes, IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp.l-6,
The Research and Application of College Student Attendance System based on RFID Technology
The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,
More informationExploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
More informationSecure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More informationPublic Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
More informationSecurity Technology for Smartphones
Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationTechnical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationSecure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
More informationThe design and implementation of the environment monitoring system of smart home based on EnOcean technology
International Conference on Manufacturing Science and Engineering (ICMSE 2015) The design and implementation of the environment monitoring system of smart home based on EnOcean technology Peng Dong1, a,
More informationACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
More informationNetwork Attack Platform
Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute
More informationARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
More informationSECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
More informationAegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationResearch on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
More informationpreliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationMicrocontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
More informationYOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
More informationOptimization of Distributed Crawler under Hadoop
MATEC Web of Conferences 22, 0202 9 ( 2015) DOI: 10.1051/ matecconf/ 2015220202 9 C Owned by the authors, published by EDP Sciences, 2015 Optimization of Distributed Crawler under Hadoop Xiaochen Zhang*
More informationModern Accounting Information System Security (AISS) Research Based on IT Technology
, pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and
More informationFile System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
More informationThe Remote Monitoring System Based on GPRS for the Health State of
The Remote Monitoring System Based on GPRS for the Health State of Civil Engineering 1 Gang Li, 2 XiLong Che *1, First Author and Corresponding Author School of Information Engineering,Chang an University,
More informationEncrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
More informationNavigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
More informationCloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
More informationResearch and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China cfcao@126.com Abstract. With the development
More informationOn Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
More informationTrusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
More informationMCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
More informationN TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
More informationUSB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
More informationWHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationDesign and Realization of Internet of Things Based on Embedded System
Design and Realization of Internet of Things Based on Embedded System Used in Intelligent Campus Department of Computer and Information Engineering, Heze University, Shandong,274015,China,kanghyhy@126.com
More informationPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
More informationA Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationWhite Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
More informationAssessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
More informationState of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationAn Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationA Storage Architecture for High Speed Signal Processing: Embedding RAID 0 on FPGA
Journal of Signal and Information Processing, 12, 3, 382-386 http://dx.doi.org/1.4236/jsip.12.335 Published Online August 12 (http://www.scirp.org/journal/jsip) A Storage Architecture for High Speed Signal
More informationThe Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
More informationData Storage Framework on Flash Memory using Object-based Storage Model
2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51. 118 Data Storage Framework
More informationintroducing COMPUTER ANTI FORENSIC TECHNIQUES
introducing COMPUTER ANTI FORENSIC TECHNIQUES COMPUTER FORENSIC DATA RECOVERY TECHNIQUES AND SOLUTIONS WORKSHOP Executive Summary Computer Forensics, a term that precisely identifies the discipline that
More information22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system
More informationContent Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
More informationFriendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationAUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
More informationChapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
More informationOdysseyTM. removable hard disk storage system. secure. fast. expandable.
OdysseyTM removable hard disk storage system secure. fast. expandable. P o w e r f u l d a t a p r o t e c t i o n w i t h m i n i m a l e f f o r t Imation Corp. is the only company in the world solely
More informationwww.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
More information15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
More informationA Web Site Protection Oriented Remote Backup and Recovery Method
2013 8th International Conference on Communications and Networking in China (CHINACOM) A Web Site Protection Oriented Remote Backup and Recovery Method He Qian 1,2, Guo Yafeng 1, Wang Yong 1, Qiang Baohua
More informationMethod of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
More informationWhat is a SSL VPN and How Does it Work?
Acceleration of Data through SSL Virtual Private Networks Rob Jansen University of Minnesota, Morris 600 East Fourth Street Morris, MN 56267 (123) 456-7890 jans0184@morris.umn.edu ABSTRACT A Virtual Private
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationCapability Service Management System for Manufacturing Equipments in
Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan
More informationResearch on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationHigh Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
More informationPERSONALIZED WEB MAP CUSTOMIZED SERVICE
CO-436 PERSONALIZED WEB MAP CUSTOMIZED SERVICE CHEN Y.(1), WU Z.(1), YE H.(2) (1) Zhengzhou Institute of Surveying and Mapping, ZHENGZHOU, CHINA ; (2) North China Institute of Water Conservancy and Hydroelectric
More informationResearch and realization of Resource Cloud Encapsulation in Cloud Manufacturing
www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology
More informationDigital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
More informationDATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
More informationEnova X-Wall XO Frequently Asked Questions--FAQs
Enova X-Wall XO Frequently Asked Questions--FAQs Q: What is X-Wall XO? A: X-Wall XO is the fourth generation product that encrypts and decrypts the entire volume of the hard drive. The entire volume includes
More informationA Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationUniticket: A Third Party Universal E-Ticket System Based on Mobile Phone *
Wireless Engineering and Technology, 2011, 2, 157-164 doi:10.4236/wet.2011.23023 Published Online July 2011 (http://www.scirp.org/journal/wet) 157 Uniticket: A Third Party Universal E-Ticket System Based
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationERNW Newsletter 29 / November 2009
ERNW Newsletter 29 / November 2009 Dear Partners and Colleagues, Welcome to the ERNW Newsletter no. 29 covering the topic: Data Leakage Prevention A Practical Evaluation Version 1.0 from 19th of november
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationStorage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
More informationDigital signature in insecure environments
Digital signature in insecure environments Janne Varjus Helsinki University of Technology jvarjus@cc.hut.fi Abstract Due to current legislation the digital signatures can be as valid as the hand written
More informationFile System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich fsfs@stefan-ludwig.de Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
More informationHIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
More informationNetworking Remote-Controlled Moving Image Monitoring System
Networking Remote-Controlled Moving Image Monitoring System First Prize Networking Remote-Controlled Moving Image Monitoring System Institution: Participants: Instructor: National Chung Hsing University
More informationHIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
More informationSingle Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
More informationSupport for the HIPAA Security Rule
WHITE PAPER Support for the HIPAA Security Rule PowerScribe 360 Reporting v2.0 HEALTHCARE 2 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationFirmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
More informationSECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationS E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com
SEAhawk CryptoMill CryptoMill Technologies Ltd. www.cryptomill.com OVERVIEW S EAhawk is an endpoint and removable storage security solution for desktop PCs and laptops running the Microsoft Windows operating
More informationResearch Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
More informationPlain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
More informationFAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
More informationProtected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
More informationDesign of UPS Battery Remote Monitoring System
, pp.26-268 http://dx.doi.org/.4257/ijmue.24.9.9.28 esign of UPS Battery Remote Monitoring System Jiabin Wang, Haiying Wang 2,*,Tianjun Sun 2,Yuran Wang 2 and Ruilin Wang 2 aqing Oil Field Chemical Co.,LT,
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More information