Title :
Research on data leak protection technology based on TPM
Author :
Wang Xingkui ; Peng Xinguang
Author_Institution :
Coll. of Comput. Sci. & Technol., Taiyuan Univ. of Technol., Taiyuan, China
Abstract :
In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data protection method that is based on TPM has been also established. Once the encrypted data and platform configuration value is sealed, as long as the system state value is subject to change, the encrypted data will never be revealed and thus the data safety will be preserved, whether it is data stealing or active leakage. According to the test results, this method of data protection will be of great use to prevent the active leakage through the network or mobile storage device.
Keywords :
cryptography; data protection; trusted computing; TPM data protection technique; active data leakage; asymmetric encryption; data leak protection technology; data leakage prevention; data safety; data stealing; encrypted data; symmetric encryption; trusted platform module; Computers; Data models; Encryption; Safety; Seals; Software; data leak protection(DLP); data seal; platform configuration register(PCR); trusted computing; trusted platform module(TPM);
Conference_Titel :
Mechatronic Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference on
Conference_Location :
Shengyang
Print_ISBN :
978-1-4799-2564-3
DOI :
10.1109/MEC.2013.6885431