Loading

A Policy Based Data Security and Key Management System
Saket Ringsia1, Shobha G2

1Saket Ringsia*, Dept. of Computer Science & Engineering, RV College of Engineering, Bangalore, I-ndia.
2Dr. Shobha G, Dept. of Computer Science & Engineering, RV College of Engineering, Bangalore, India. 

Manuscript received on May 11, 2020. | Revised Manuscript received on May 25, 2020. | Manuscript published on June 30, 2020. | PP: 227-229 | Volume-9 Issue-5, June 2020. | Retrieval Number: E9700069520/2020©BEIESP | DOI: 10.35940/ijeat.E9700.069520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cyber Security, over the last few years, has been a topic of great research given the number of cyber crimes have been increasing. To provide cyber security , constant efforts are being made to secure the communications and to protect user data using various cryptography techniques. With the increasing number of cryptography, the number of keys used to secure communications also sees a high. It is always difficult to manage these keys and their identity in a multi process communication environment. This paper brings into light an approach for the enhancement of data security and cryptographic key management using a policy based key management system. An on the device approach is proposed which uses the file system to create a secure storage with enhanced security for the storage of the data . The access to this storage is governed by policies to allow an application based access to the storage. This model will provide a highly scalable secure storage and management of keys. 
Keywords: Secure storage, Policy based access control, key management, secrets, keys.