An Authentication Middleware for Prevention of Information Theft

نویسندگان

  • S. Kami Makki
  • Md. Sadekur Rahman
چکیده

Information theft or data leakage is a growing concern for companies as well as individual users. Intruders can easily copy huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for corporates, since the storage devices are becoming smaller in size, easier to use, have higher capacity and data transmission speed. Furthermore, these devices can easily be misplaced or stolen and sensitive data can easily be exposed. In this paper we present a multilevel password verification system for prevention of information theft by removable devices to protect data leakage by various portable devices. Our proposed system consists of three main modules: 1) portable storage device monitoring, 2) activity logging and data encryption, and 3) device authorization. These modules corporate with each other to provide required security, and prevent information theft from the individual users and companies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Complementing for “Permanent Identity-Theft” in Biometrics Using Visual-Based Challenge Response

Biometric authentication has been described to be reliable solution to the problem of identity determination by establishing the identity of a person based on “who he is", but permanent Identity theft has been considered an important issue since biometric samples are not secret and when a biometric feature is compromised, it cannot be changed. This research work describes a middleware called Vi...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013