On-the-Fly Encryption Security in Remote Storage

dc.contributor.authorPrabhakar, A.
dc.contributor.authorSavin, P.S.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2020-03-30T10:22:29Z
dc.date.available2020-03-30T10:22:29Z
dc.date.issued2016
dc.description.abstractDevelopment of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment, commonly by diverting possibly vulnerable documents to a protected distant repository, examining them, and at that point doing a last duplicate to remote storage if the output meets the constraints defined in the policy enforced, at that point the output is copied to distant repository. The extra work needed to basically serially write the document twice, once to local repository and lastly to the distant repository is the main issue with local repository isolation. This paper introduces a substitute technique for Information Leakage Prevention is introduced in this paper utilizing a transient cryptographic key. By utilizing a transient key, encoded information can be securely checked on distant repository and safely deleted in case it fails the policy while scanning. This direct procedure brings about better productivity and reduces the time delay than a local repository isolation. � 2015 IEEE.en_US
dc.identifier.citationProceedings - 2015 5th International Conference on Advances in Computing and Communications, ICACC 2015, 2016, Vol., , pp.163-168en_US
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/8621
dc.titleOn-the-Fly Encryption Security in Remote Storageen_US
dc.typeBook chapteren_US

Files