CFP last date
20 May 2024
Reseach Article

Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm

by Anirudha Vikhe, Prema Desai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 11
Year of Publication: 2014
Authors: Anirudha Vikhe, Prema Desai
10.5120/15398-3939

Anirudha Vikhe, Prema Desai . Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm. International Journal of Computer Applications. 88, 11 ( February 2014), 25-27. DOI=10.5120/15398-3939

@article{ 10.5120/15398-3939,
author = { Anirudha Vikhe, Prema Desai },
title = { Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 11 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number11/15398-3939/ },
doi = { 10.5120/15398-3939 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:21.857348+05:30
%A Anirudha Vikhe
%A Prema Desai
%T Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 11
%P 25-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malware is the intrusive program that affects computer operation and sensitive information of the host system. The objective is to protect such data and prevent malware from injecting fake keystroke into host network stack. The new technique cryptographic provenance verification [CPV] uses a property known as data provenance integrity which improves the trustiness of the system and its data. The system security is enhanced at kernel level. CPV makes use of trusted platform module for detection of fake key stroke. With TPM operating system can identify malware initiated network calls. The propose system consist of two modules sign and verify which prevent tampering of data. Sign module generates signature for outgoing packets from application layer. The packets are encrypted with advanced cryptography algorithm at transport layer and send to verify module along with communication key. Verify module decrypts the received packets and verify them for being malicious. TMP is used for secure key storage which prevents malware from injecting fake keystrokes.

References
  1. KuiXu, HuijunXiong, Chehai Wu, Deian Stefan, DanfengYao Member, Data-Provenance Veri_cation For Secure Hosts , IEEE Transactions On Dependable andsecure computing vol. 9 no. 2 year 2012.
  2. Vishwagupta, Gajendra Singh, Ravindra Gupta Advance cryptography algorithmfor improving data security , International Journal of Advanced Research in Com-puter Science and Software Engineering (IJARCSSE)Volume 2, Issue 1, January 2012.
  3. D. Stefan, C. Wu, D. Yao and G. XU. Ensuring host integrity with crypto-graphic provenance verification. In CCSS 09,poster, November 10-12, Chicago, IL,USA,2009
  4. D. Stefan, C. Wu, D. Yao and G. XU. A Cryptographic Provenance Verification Approach ForHost-Based Malware Detection.
  5. D. Stefan and D. Yao. Keystroke-dynamics authentication against synthetic forgeries. In Proceedings of the International Conference on Collaborative Computing:Networking, Applications and Worksharing (CollaborateCom), November 2010
  6. A. Baliga, V. Ganapathy, and L. Iftode. Automatic inferenceand enforcement of kernel data structure invariants. In 24thAnnual Computer Security Applications Conference (ACSAC) 2008.
  7. A. Baliga, P. Kamat, and L. Iftode. Lurking in the shadows: Identifying systemic threats to kernel data. In IEEE Symposiumon Security and Privacy, pages 246–251. IEEE ComputerSociety, 2007
  8. W. Cui, R. H. Katz, andW. tian Tan. Design and implementationof an extrusion-based break-in detector for personal computers. In ACSAC, pages 361–370. IEEE Computer Society, 2005
  9. S. Garriss, R. C´aceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Trustworthy and personalized computing on public kiosks. In MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services, pages 199–210, New York, NY, USA, 2008. ACM.
  10. J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts byIRC nickname evaluation. In Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, April 2007.
  11. R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy. Not-a-Bot:Improving service availability in the face of botnet attacks. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NDSI), 2009.
  12. S. W. Smith. Trusted Computing Platforms: Design andApplications. New York: Springer, 2005.
  13. B. Schneier and N. Ferguson. Practical cryptography, 2003.
  14. J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS. The Internet Society, 2009.
  15. M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet isbigger than yours (maybe, better than yours). In Proceedingsof the First USENIX Workshop on Hot Topics in Understanding Botnets, April 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Data provenance keystroke integrity message authentication malware attacks advanced cryptography universal hashing trust platform computing.