Please use this identifier to cite or link to this item: https://idr.l3.nitk.ac.in/jspui/handle/123456789/8621
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPrabhakar, A.
dc.contributor.authorSavin, P.S.
dc.contributor.authorChandrasekaran, K.
dc.date.accessioned2020-03-30T10:22:29Z-
dc.date.available2020-03-30T10:22:29Z-
dc.date.issued2016
dc.identifier.citationProceedings - 2015 5th International Conference on Advances in Computing and Communications, ICACC 2015, 2016, Vol., , pp.163-168en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8621-
dc.description.abstractDevelopment of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment, commonly by diverting possibly vulnerable documents to a protected distant repository, examining them, and at that point doing a last duplicate to remote storage if the output meets the constraints defined in the policy enforced, at that point the output is copied to distant repository. The extra work needed to basically serially write the document twice, once to local repository and lastly to the distant repository is the main issue with local repository isolation. This paper introduces a substitute technique for Information Leakage Prevention is introduced in this paper utilizing a transient cryptographic key. By utilizing a transient key, encoded information can be securely checked on distant repository and safely deleted in case it fails the policy while scanning. This direct procedure brings about better productivity and reduces the time delay than a local repository isolation. � 2015 IEEE.en_US
dc.titleOn-the-Fly Encryption Security in Remote Storageen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.