Volume 18 No 8 (2020)
 Download PDF
Data Encryption Mobile Storage Management Procedure Based on Virtual Disk
S.Saroja Devi, K.Sindhuja, C.Selva Kumar
Abstract
This research presents a procedure for managing data encryption on mobile storage devices through the implementation of a virtual disk. The proposed procedure involves several steps, including the creation of an encryption roll identification at the beginning of the mobile storage device and the establishment of a virtual magnetic disc encryption roll within the device. When the mobile storage device is inserted into a designated computer, the encryption roll identification is checked. If the identification is incorrect, the device is treated as a regular mobile storage device. However, if the check is successful, the encryption roll information of the virtual disk is examined, and upon passing the verification, the encryption roll is mounted. A virtual disk drive program with an encryption and decryption module is invoked to enable real-time encryption and decryption of the virtual disk's data. The encryption and decryption module automatically encrypts and decrypts data, ensuring the security and reliability of information storage. When the mobile storage device is removed, the virtual disk encryption roll is automatically unloaded. This procedure offers various advantages, including robust information storage, flexible security policy configuration, simplified management of portable storage devices, and efficient and transparent data encryption and decryption processing.
Keywords
Data encryption, Mobile storage management, Virtual disk, Encryption roll identification, Real-time encryption, and decryption
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.