A Group File Encryption Method using Dynamic System Environment Key
Title | A Group File Encryption Method using Dynamic System Environment Key |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Kun-Lin Tsai, Jiu-Soon Tan, Fang-Yie Leu, Yi-Li Huang |
Conference Name | Network-Based Information Systems (NBiS), 2014 17th International Conference on |
Date Published | Sept |
Keywords | auditing security scheme, authentication, authorisation, Authorization, autocrypt, business data processing, cloud computing, Computers, cryptography, decryption method, DRM, dynamic system environment key, eavesdropping attack, Encryption, file organisation, GEMS, group file encryption, message authentication, security, security level, Servers, system environment key |
Abstract | File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method using Dynamic System Environment Key (GEMS for short), which provides users with auto crypt, authentication, authorization, and auditing security schemes by utilizing a group key and a system environment key. In the GEMS, the important parameters are hidden and stored in different devices to avoid them from being cracked easily. Besides, it can resist known-key and eavesdropping attacks to achieve a very high security level, which is practically useful in securing an enterprise's and a government's private data. |
DOI | 10.1109/NBiS.2014.22 |
Citation Key | 7023997 |
- dynamic system environment key
- system environment key
- Servers
- security level
- security
- message authentication
- group file encryption
- GEMS
- file organisation
- encryption
- eavesdropping attack
- auditing security scheme
- DRM
- decryption method
- Cryptography
- Computers
- Cloud Computing
- business data processing
- autocrypt
- authorization
- authorisation
- authentication