Full Disk Encryption based on Virtual Machine and Key Recovery Scheme
Cited by
Export citation
- BibTex
- RIS
- TXT
@Article{JICS-6-163,
author = {Min Liang and Chaowen Chang},
title = {Full Disk Encryption based on Virtual Machine and Key Recovery Scheme},
journal = {Journal of Information and Computing Science},
year = {2024},
volume = {6},
number = {3},
pages = {163--172},
abstract = {Full disk encryption is a good choice to solve the problem of information leakage. In this paper,
a full disk encryption based on virtual machine is proposed for computers without TPM. The program to
decrypt the operating system is stored in a USB device which is more secure than in hard disk together with
confidential information. Its key recovery scheme is with the help of a smartcard which is used for enhancing
security. The experiments, security analysis and comparison demonstrate the efficiency, security and
advantage of the proposed scheme.
},
issn = {1746-7659},
doi = {https://doi.org/},
url = {http://global-sci.org/intro/article_detail/jics/22674.html}
}
TY - JOUR
T1 - Full Disk Encryption based on Virtual Machine and Key Recovery Scheme
AU - Min Liang and Chaowen Chang
JO - Journal of Information and Computing Science
VL - 3
SP - 163
EP - 172
PY - 2024
DA - 2024/01
SN - 6
DO - http://doi.org/
UR - https://global-sci.org/intro/article_detail/jics/22674.html
KW - Full Disk Encryption, Virtual Machine, Key Recovery, Smartcard
AB - Full disk encryption is a good choice to solve the problem of information leakage. In this paper,
a full disk encryption based on virtual machine is proposed for computers without TPM. The program to
decrypt the operating system is stored in a USB device which is more secure than in hard disk together with
confidential information. Its key recovery scheme is with the help of a smartcard which is used for enhancing
security. The experiments, security analysis and comparison demonstrate the efficiency, security and
advantage of the proposed scheme.
Min Liang and Chaowen Chang. (2024). Full Disk Encryption based on Virtual Machine and Key Recovery Scheme.
Journal of Information and Computing Science. 6 (3).
163-172.
doi:
Copy to clipboard