Implementation of Clipboard Security using Cryptographic Techniques
2014
present scenario malicious authors are rapidly growing and now other than internet users they are also targeting the loophole in operating system application level security. Transferring data between applications is common user activity. Since data in a clipboard is freely delivered between arbitrary programs capable of using a format of the data, a simple text, a rich text, a picture, and information having a particular format may be delivered between programs capable of using such information. Information delivery made between programs through a clipboard is undoubtedly an efficient method of properly using a multitasking function of an operating system, but as the security of important data is increasingly demanded, data transmitted between independent programs through the clipboard needs to be protected. Any malicious application with get through from the protection system can easily watch the content of our clipboard and can modify the content during copy paste operation. In this paper implementation of a prototype model for clipboard security of operating system is presented, as we know that whole operating system has a common clipboard which acts as channel for inter-application operability. In our approach we prevent the clipboard data by encrypting the content at the time of copying & cutting and decrypting at the time of pasting, for this we use cryptographic techniques.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
5
References
0
Citations
NaN
KQI