Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm

Download Now
Provided by: International Journal of Computer Applications
Format: PDF
Malware is the intrusive program that affects computer operation and sensitive information of the host system. The objective is to protect such data and prevent malware from injecting fake keystroke into host network stack. The new technique Cryptographic Provenance Verification (CPV) uses a property known as data provenance integrity which improves the trustiness of the system and its data. The system security is enhanced at kernel level. CPV makes use of trusted platform module for detection of fake key stroke. With TPM operating system can identify malware initiated network calls.
Download Now

Find By Topic