DocumentCode
692983
Title
Research on data leak protection technology based on TPM
Author
Wang Xingkui ; Peng Xinguang
Author_Institution
Coll. of Comput. Sci. & Technol., Taiyuan Univ. of Technol., Taiyuan, China
fYear
2013
fDate
20-22 Dec. 2013
Firstpage
2354
Lastpage
2358
Abstract
In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data protection method that is based on TPM has been also established. Once the encrypted data and platform configuration value is sealed, as long as the system state value is subject to change, the encrypted data will never be revealed and thus the data safety will be preserved, whether it is data stealing or active leakage. According to the test results, this method of data protection will be of great use to prevent the active leakage through the network or mobile storage device.
Keywords
cryptography; data protection; trusted computing; TPM data protection technique; active data leakage; asymmetric encryption; data leak protection technology; data leakage prevention; data safety; data stealing; encrypted data; symmetric encryption; trusted platform module; Computers; Data models; Encryption; Safety; Seals; Software; data leak protection(DLP); data seal; platform configuration register(PCR); trusted computing; trusted platform module(TPM);
fLanguage
English
Publisher
ieee
Conference_Titel
Mechatronic Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference on
Conference_Location
Shengyang
Print_ISBN
978-1-4799-2564-3
Type
conf
DOI
10.1109/MEC.2013.6885431
Filename
6885431
Link To Document