Abstract

Cyber Security, over the last few years, has been a topic of great research given the number of cyber crimes have been increasing. To provide cyber security , constant efforts are being made to secure the communications and to protect user data using various cryptography techniques. With the increasing number of cryptography, the number of keys used to secure communications also sees a high. It is always difficult to manage these keys and their identity in a multi process communication environment. This paper brings into light an approach for the enhancement of data security and cryptographic key management using a policy based key management system. An on the device approach is proposed which uses the file system to create a secure storage with enhanced security for the storage of the data . The access to this storage is governed by policies to allow an application based access to the storage. This model will provide a highly scalable secure storage and management of keys.

Highlights

  • All the devices use many secrets and protected information, as well use cryptographic keys for secure communication

  • The secrets need to be stored in a consistent way across the system; and the storage mechanism must ensure that secrets on one device are locked for that particular device and are not transferrable unless authorized This is key for virtual platforms that run as virtual machines that can be cloned

  • All of the work reviewed does bring new insights into their application domains, none of the existing studies considers the problem of ensuring both storage security as well as policy and role based access mechanism to provide a comprehensive solution for the cryptographic key management

Read more

Summary

INTRODUCTION

All the devices use many secrets and protected information, as well use cryptographic keys for secure communication. These information are all stored by different subsystems in different ways that results in an inconsistent security posture for the overall system. The vault is used to govern the policies for all the applications running on the device and the virtual TPM is the storage which stores the data by maintaining high security by using the security features of the Trusted Platform Module which is present on all devices.

LITERATURE SURVEY
PROPOSED MODEL
RESULTS
CONCLUSION
FUTURE WORK

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.