Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Our objective is to build an environment which provides a secured workspace for handling data, such as copying and editing important user files, for secure transactions over the internet and much more. It could be viewed as a Secured Machine equipped with locked-down Operating System with services and applications that support the user to access data securely. This environment will also decide which applications should run and which ones should not. It will also act as a logger of User Actions, in order to record and prevent an unauthorized action. Hence, an unauthorized person will not be able to access your personal information, either through the machine or by snooping on the internet, and will maintain integrity. In particular, we propose a mechanism which will focus on who is having access to data and how, as well as it will secure end-to-end data sharing and will have thinnest chances of intrusion.

Keywords: SSL, Secure Environment, RELIDTM, Locked Down OS

Edition: Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Share this Article

How to Cite this Article?

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse, "Prototype of Computing Device That Aims to Secure User Data on a Compromised OS", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14748, Volume 3 Issue 10, October 2014, 2097 - 2100

114 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SSL'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1450 - 1456

An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks

M. Devapriya, R. Sudha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2523 - 2525

Study of Semantic Retrieval by Data Similarity of Trademarks

Deepak Mali, P. D. Lambate

Share this Article

Similar Articles with Keyword 'Secure Environment'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 459 - 462

Dynamic Key for Secure Communication among the Flexible Nodes

Vijay Kumar Mahto, D. Praveen Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1271 - 1272

An Approach for Outsourced Big Data to Provide Security

Veladandi Divya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 112 - 116

Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme

A. Swetha, P. Chenna Reddy

Share this Article
Top