{"title":"Design and Implementation of Trust Storage System Based on TCM","authors":"","doi":"10.1109/ICDMA.2013.101","DOIUrl":null,"url":null,"abstract":"Currently, most of the file encryption systems are implemented in software for the foundation. Once the key was cracked, the encryption system fails completely. With hacking techniques becoming more sophisticated, traditional software encryption alone cannot guarantee the security of sensitive data. This paper introduces a trust storage system based on a security hardware, which implements the disk encryption based on partition, utilizing the device mapper mechanism. Meanwhile, a secure hardware, Trusted Cryptography Module (TCM) [1], provides security support from the hardware layer, greatly increasing the crack difficulty. As a result, effectively enhance the security of sensitive data.","PeriodicalId":403312,"journal":{"name":"2013 Fourth International Conference on Digital Manufacturing & Automation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Digital Manufacturing & Automation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDMA.2013.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Currently, most of the file encryption systems are implemented in software for the foundation. Once the key was cracked, the encryption system fails completely. With hacking techniques becoming more sophisticated, traditional software encryption alone cannot guarantee the security of sensitive data. This paper introduces a trust storage system based on a security hardware, which implements the disk encryption based on partition, utilizing the device mapper mechanism. Meanwhile, a secure hardware, Trusted Cryptography Module (TCM) [1], provides security support from the hardware layer, greatly increasing the crack difficulty. As a result, effectively enhance the security of sensitive data.