Abstract :
Currently, most of the file encryption systems are implemented in software for the foundation. Once the key was cracked, the encryption system fails completely. With hacking techniques becoming more sophisticated, traditional software encryption alone cannot guarantee the security of sensitive data. This paper introduces a trust storage system based on a security hardware, which implements the disk encryption based on partition, utilizing the device mapper mechanism. Meanwhile, a secure hardware, Trusted Cryptography Module (TCM) [1], provides security support from the hardware layer, greatly increasing the crack difficulty. As a result, effectively enhance the security of sensitive data.
Keywords :
computer crime; cryptography; storage management; trusted computing; TCM; device mapper mechanism; disk encryption; file encryption systems; hacking technique; security hardware; sensitive data security; software encryption; trust storage system; trusted cryptography module; Automation; Manufacturing; Disk Encryption; TCM; Trusted computing;