International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 88 - Number 11 |
Year of Publication: 2014 |
Authors: Anirudha Vikhe, Prema Desai |
10.5120/15398-3939 |
Anirudha Vikhe, Prema Desai . Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm. International Journal of Computer Applications. 88, 11 ( February 2014), 25-27. DOI=10.5120/15398-3939
Malware is the intrusive program that affects computer operation and sensitive information of the host system. The objective is to protect such data and prevent malware from injecting fake keystroke into host network stack. The new technique cryptographic provenance verification [CPV] uses a property known as data provenance integrity which improves the trustiness of the system and its data. The system security is enhanced at kernel level. CPV makes use of trusted platform module for detection of fake key stroke. With TPM operating system can identify malware initiated network calls. The propose system consist of two modules sign and verify which prevent tampering of data. Sign module generates signature for outgoing packets from application layer. The packets are encrypted with advanced cryptography algorithm at transport layer and send to verify module along with communication key. Verify module decrypts the received packets and verify them for being malicious. TMP is used for secure key storage which prevents malware from injecting fake keystrokes.