Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Our objective is to build an environment which provides a secured workspace for handling data, such as copying and editing important user files, for secure transactions over the internet and much more. It could be viewed as a Secured Machine equipped with locked-down Operating System with services and applications that support the user to access data securely. This environment will also decide which applications should run and which ones should not. It will also act as a logger of User Actions, in order to record and prevent an unauthorized action. Hence, an unauthorized person will not be able to access your personal information, either through the machine or by snooping on the internet, and will maintain integrity. In particular, we propose a mechanism which will focus on who is having access to data and how, as well as it will secure end-to-end data sharing and will have thinnest chances of intrusion.

Keywords: SSL, Secure Environment, RELIDTM, Locked Down OS

Edition: Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Share this Article

How to Cite this Article?

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse, "Prototype of Computing Device That Aims to Secure User Data on a Compromised OS", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14748, Volume 3 Issue 10, October 2014, 2097 - 2100

80 PDF Views | 58 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SSL'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1450 - 1456

An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks

M. Devapriya, R. Sudha

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1255 - 1257

Designing an Improved KISS Environment

Mohinder Singh, Harmandeep Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Similar Articles with Keyword 'Secure Environment'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2097 - 2100

Prototype of Computing Device That Aims to Secure User Data on a Compromised OS

Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1271 - 1272

An Approach for Outsourced Big Data to Provide Security

Veladandi Divya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 459 - 462

Dynamic Key for Secure Communication among the Flexible Nodes

Vijay Kumar Mahto, D. Praveen Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 112 - 116

Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme

A. Swetha, P. Chenna Reddy

Share this Article
Top