Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014
Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Our objective is to build an environment which provides a secured workspace for handling data, such as copying and editing important user files, for secure transactions over the internet and much more. It could be viewed as a Secured Machine equipped with locked-down Operating System with services and applications that support the user to access data securely. This environment will also decide which applications should run and which ones should not. It will also act as a logger of User Actions, in order to record and prevent an unauthorized action. Hence, an unauthorized person will not be able to access your personal information, either through the machine or by snooping on the internet, and will maintain integrity. In particular, we propose a mechanism which will focus on who is having access to data and how, as well as it will secure end-to-end data sharing and will have thinnest chances of intrusion.
Keywords: SSL, Secure Environment, RELIDTM, Locked Down OS
Edition: Volume 3 Issue 10, October 2014
Pages: 2097 - 2100
How to Cite this Article?
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse, "Prototype of Computing Device That Aims to Secure User Data on a Compromised OS", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14748, Volume 3 Issue 10, October 2014, 2097 - 2100
114 PDF Views | 86 PDF Downloads
Similar Articles with Keyword 'SSL'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2203 - 2208Review on MANETs Characteristics, Challenges, Application and Security Attacks
Anuj Rana, Sandeep Gupta
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2124 - 2127Medical Image Compression Using ISPIHT & JPEG2000 Hybrid
Yashpreet Sain
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1450 - 1456An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks
M. Devapriya, R. Sudha
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2523 - 2525Study of Semantic Retrieval by Data Similarity of Trademarks
Deepak Mali, P. D. Lambate
Similar Articles with Keyword 'Secure Environment'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2097 - 2100Prototype of Computing Device That Aims to Secure User Data on a Compromised OS
Pavan Kulkarni, Aditi Halgekar, Avantika Dhavale, Mehak Daftari, Snehal Wayse
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 459 - 462Dynamic Key for Secure Communication among the Flexible Nodes
Vijay Kumar Mahto, D. Praveen Kumar
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1271 - 1272An Approach for Outsourced Big Data to Provide Security
Veladandi Divya
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013
Pages: 112 - 116Authentication of an Image over Wireless Channels Based on Secure Digital Signature Scheme
A. Swetha, P. Chenna Reddy