Research on Data Leak Protection Technology Based on Trusted Platform

نویسندگان

  • Wang Xingkui
  • Peng Xinguang
چکیده

In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data protection method that is based on Trusted Platform has been also established. Once the encrypted data and platform configuration value is sealed, as long as the system state value is subject to change, the encrypted data will never be revealed and thus the data safety will be preserved, whether it is data stealing or active leakage. According to the test results, this method of data protection will be of great use to prevent the active leakage through the network or mobile storage device.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of Remote Anonymous Attestation Protocol Based on Trusted Cloud Computing Platform

Trusted cloud computing platform is a combination of the use of virtual machine technology and trusted computing technology of cloud computing platform. Virtual machine technology because of its high separability of the client and the resource of high controllability, which greatly improves the security of the system; and the trusted computing technology is through the establishment of a truste...

متن کامل

ROTE: Rollback Protection for Trusted Execution

Security architectures such as Intel SGX need protection against rollback attacks, where the adversary violates the integrity of a protected application state by replaying old persistently stored data or by starting multiple application instances. Successful rollback attacks have serious consequences on applications such as financial services. In this paper, we propose a new approach for rollba...

متن کامل

White Paper: Infineon Trusted Platform Module Security Conformance

To insure that a Trusted Platform Module (TPM) has been manufactured according to high security standards, Trusted Computing Group (TCG) specifications are accomplished by conformance tests. Conformance describes the correct and secure implementation of a TPM according to the specification and the respective protection profile. Conformance with a protection profile and security target, which bo...

متن کامل

Protection of DVB Systems by Trusted Computing

We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other

متن کامل

Secure user authentication based on the trusted platform for mobile devices

In recent years, the use of mobile devices including smartphones has increased significantly all over the world, and e-commerce using smartphones has also greatly increased. Furthermore, many people are using their smartphones to carry out certain aspects of their work according to the BYOD trend. Therefore, it is extremely important that mobile device users are authenticated securely by remote...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015