Online Submission!

Open Journal Systems

A Generic Evolution of Key Using Quantum Cryptography Management for Transcript

Basant Dhakad, Dharmendra Gwala, Manish Sharma, Vivek Shrivastava

Abstract


Network Security is play very important role in Network system, Because in networked systems, the major security risks occur while conducting business on the Net; The following are some of the security risks occur: unauthorized access, Eavesdropping, Password sniffing, spoofing-spoofing, Denial of Service, virus attack, System modification, Data modification, Repudiation, E-mail bombing. Not With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is gaining considerable interest. The challenge in designing an encrypted file system stems from balancing performance, security perception, ease of usage and enterprise level deploy ability. Often, the most secure solutions may not even be the best solution either due to hit on performance or due to decreased usability. Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted file system a huge engineering exercise.

Full Text:

PDF

References


Mick Bauer. Paranoid penguin: Bestcrypt: crossplatform filesystem encryption. Linux J., 2002(98):9,

Matt Blaze. A cryptographic file system for

UNIX. In ACM Conference on Computer and

Communications Security, pages 9–16, 1993.

V Bhanu Chandra. PKI for transcrypt. Technical

report, Indian Institute of Technology Kanpur, Kanpur,

V Bhanu Chandra. Transparent encrypted

filesystem. Technical Report, Indian Institute of

Technology Kanpur, Kanpur, 2006.

Abhijit Bagri. Key Management for Transcrypt

Indian Institute of Technology Kanpur, Kanpur, 2007.

CryptoAPI. The GNU/Linux CryptoAPI, 2003.

http://www.kernel.org.

Mohan Dhawan. libacl for transcrypt.

http://www.security.iitk.ac.in/home/transcrypt.

dm crypt. A device-mapper crypto target for linux.

http://www.saout.de/misc/dm- crypt/.

Satyam Sharma. Transcrypt: Design of a secure and

transparent encrypting file system.M. Tech Thesis, Indian

Institute of Technology Kanpur, Kanpur, 2006.

Dr. David Knight, Dr. Paul Roach. University of

Glamorgan 2004




DOI: http://dx.doi.org/10.6084/ijact.v2i3.415

Refbacks

  • There are currently no refbacks.