http://iet.metastore.ingenta.com
1887

Novel and practical scheme based on secret sharing for laptop data protection

Novel and practical scheme based on secret sharing for laptop data protection

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

With the benefits of portability and mobility, laptops have become more and more popular. People usually believe that their personal laptop is safe, and they store sensitive data in it. However, when a laptop is stolen, a malicious thief can obtain illegitimate benefits by extracting sensitive data from the laptop. For this reason, several security mechanisms for protecting sensitive data on laptops have been designed. Kao et al. (2012) designed a protocol (MELP) that allowed laptop users to use their mobile phones as the encryption key to protect their files. Although the mobile-based mechanism is secure, the authors still believe that it is limited by third-generation mobile devices and online data encryption/decryption. In this study, the authors present their design about a novel scheme based on secret-sharing technique. In the authors’ proposed scheme, users can easily encrypt/decrypt their laptop data offline, that is, without access to the Internet. Furthermore, the authors’ security analysis shows that their scheme satisfies all of the essential requirements for security and functionality. Also, the authors’ performance analysis indicates that their proposed scheme has better efficiency, which makes it suitable for use in protecting the data stored on laptops.

References

    1. 1)
      • 1. ‘Airport insecurity: the case of missing and lost laptops’, http://www.dell.com/downloads/global/services/dell_lost_laptop_study.pdf, accessed September 2013.
    2. 2)
      • 2. ‘How to lock up laptop security’, http://www.cio.com/article/147900/How_to_Lock_Up_Laptop_Security, accessed September 2013.
    3. 3)
      • 3. ‘Laptop losses total 12,000 per week at US airports: nearly 70% are never recovered; many go unreported’, http://www.darkreading.com/authentication/laptop-losses-total-12000-per-week-at-us/211201139, accessed September 2013.
    4. 4)
      • 4. ‘Protect your laptop’, http://www.thehindubusinessline.com/todays-paper/tp-eworld/protect-your-laptop/article1679719.ece?ref=archive, accessed September 2013.
    5. 5)
      • 5. ‘No end in sight: Data breach tally approaches 100 million’, http://www.technewsworld.com/story/53222.html, accessed September 2013.
    6. 6)
      • 6. ‘Increase in stolen laptops endangers data security’, http://chronicle.com/article/Increase-in-Stolen-Laptops/31544, accessed March 2014.
    7. 7)
      • 7. Corner, M.D., Noble, B.D.: ‘Zero-interaction authentication’. Proc. Eighth Annual Int. Conf. Mobile Computing and Networking (MobiCom ‘02), New York, USA, September 2002, pp. 111.
    8. 8)
    9. 9)
      • 9. ‘Increase in stolen laptops endangers data security’, http://chronicle.com/article/Increase-in-Stolen-Laptops/31544, accessed March 2014.
    10. 10)
      • 10. Wyld, D.C.: ‘Preventing the ‘worst case scenario’: combating the lost laptop epidemic with RFID technology’. Novel Algorithms and Techniques in Telecommunications and Networking, 2010, pp. 2933.
    11. 11)
      • 11. Studer, A., Perrig, A.: ‘Mobile user location-specific encryption (MULE): using your office as your password’. Proc. ACM. Conf. Wireless network security (WiSec), New York, USA, March 2010, pp. 151162.
    12. 12)
    13. 13)
      • 13. ‘Secure Socket Layer’, http://en.wikipedia.org/wiki/Secure_Socket_Layer, accessed September 2013.
    14. 14)
    15. 15)
    16. 16)
      • 16. ‘Shamir's Secret Sharing’, http://en.wikipedia.org/wiki/Shamir's_Secret_Sharing, accessed September 2013.
    17. 17)
      • 17. ‘Netscape’, http://en.wikipedia.org/wiki/Netscape, accessed September 2013.
    18. 18)
    19. 19)
    20. 20)
      • 20. ‘Lagrange polynomials’, http://en.wikipedia.org/wiki/Lagrange_polynomial, accessed September 2013.
    21. 21)
      • 21. Schneier, B.: ‘Applied cryptography, protocols, algorithms, and source code in C’ (John Wiley and Sons Inc., 1996, 2nd edn.).
    22. 22)
      • 22. Ohbuchi, E., Hanaizumi, H., Hock, L.A.: ‘Barcode readers using the camera device in mobile phones’. IEEE Int. Conf. Cyberworlds (CW04), 2004, pp. 260265.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2013.0420
Loading

Related content

content/journals/10.1049/iet-ifs.2013.0420
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address