Mobile encryption for laptop data protection (MELP)

نویسندگان

  • Yung-Wei Kao
  • Xin Zhang
  • Ahren Studer
  • Adrian Perrig
چکیده

Based on the advances in laptop technologies and the mobility characteristics, laptops have become a vital device used at various places. Usually, numerous sensitive files such as credit card numbers and Web cookies are stored on laptops for convenient usage. However, if a laptop is stolen, the data stored on it is easily leaked; which may cause serious consequences. Encrypting files by encryption keys is a general solution; however, if the decryption keys are also stored on laptops, the files can also be decrypted by adversaries easily. To solve this problem, this paper proposes the Mobile Encryption for Laptop data Protection (MELP) system. MELP includes the design of an online server and mobile phone, and encrypts each sensitive file by a file system encryption key, which is further sequentially encrypted twice by the phone’s and server’s encryption keys. The reason of adopting a mobile phone is that at least one simple confirmation of execution must be performed by a user, and the reason of adopting an online server is that if both user’s laptop and mobile phone are stolen, users can still disable the online decryption process on the server. www.ietdl.org

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research Article Impact Factor: 4.226 ISSN: 2319-507X Disha Gupta, IJPRET, 2015; Volume 3 (9): 1056-1067 IJPRET

Laptop has become a vital device in our daily life. Because of its mobility characteristics we can used in various place and we can stored our important data in it like office file, photos, bank account numbers etc. But if laptop is stolen then our data can easily access by anyone and that may lead to a serious problem. To overcome this problem we can used Encryption technique except both encry...

متن کامل

Virtual Physical Security for Mobile Computing Devices

In this paper I have attempted to explain briefly, how enterprise security for Mobile Computing Devices can be achieved in organizations. Enterprise security plans must not only address the data security over the network but also the protection of data at rest on mobile devices like Laptop PCs, PDAs, and Smart phones. The inherent lack of physical access control on mobile devices creates specia...

متن کامل

Symmetric Encryption Algorithm in Speech Coding for Defence Communications

In battlefield, messages must be encrypted to provide protection from enemy interception. Several speech coding algorithms have been developed to provide secure communications. FS1015 LPC in 1984, FS1016 CELP in 1991and FS MELP in 1997 became official federal standards. In 2002, the US DoD adopted enhanced MELP (MELPe). Later on in 2007, US Naval Research Laboratories have designed Variable Dat...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing

As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IET Information Security

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2012