Proposed Anti-Symmetric Preventive Control Optimizing the Risk on RTOS

Proposed Anti-Symmetric Preventive Control Optimizing the Risk on RTOS

Padma Lochan Pradhan (Department of Computer Science and Engineering, Central Institute of Technology, Naya Raipur, India)
DOI: 10.4018/IJSITA.2016010102
OnDemand PDF Download:
$37.50

Abstract

Now a day increasing the clients, business and computer & communications by complex IT infrastructure has growing the risk to proprietary information is a common in around the globe and as well as cloud. The operating system risk assessment, control and audit is a primary method of protecting system resources (Processor, Memory, UFS & Encryption Key) from the uncertainty. The system risk optimization is probably the most important aspect of communications security for preventive control. The cryptographic control (Encryption key) is a primary method of protecting system resources. The control is directly proportional to mitigation & mitigation is directly proportional to standard. Furthermore, the model & mechanism optimize the cost, time & resources is supposed to reduce the system risks. In this paper, the author is focusing only real time operating system level. We have to optimize the technology, resource cost and maximize the performance & throughput factor of technology (RTOS) and business.
Article Preview

1. Introduction

The large scale of the machine consists of millions of chips, each capable of testing a million keys per second, such machine could be test 2^56 key in 20 hours. It is easy to design a machine with a million parallel processors, each working independent of the others. The encryption key length size depends on Memory, Control, Arithmetic & logic unit, Processor etc. to perform the functionality of the operating system. The operating system control is the process to address security weaknesses in operation systems by implementing the latest tools, utilities, OS patches, hot fixes and updates and the procedures and policies to reduce attacks and system down time mean while increase the throughput of the system. The preventive control of the operating systems is the first step towards safeguarding systems from intrusion, workstations, applications; network and servers typically arrive from the vendor, installed with a multitude of development tools and utilities, which although beneficial to the clients & user, also provide potential back-door access to the systems. The control of an operating system involves the removal of all nonessential tools, utilities and other systems programmer options, any of which could be used to ease a hacker's path to our systems (Kai,2008; O’ Reilly 1995; Sumitabh,2009; Sun-Microsystems, 2002; Tanenbaum 2010).

The main components of the operating system are file, shell & kernel. The shell is communicated between the user, application, hardware and software. The file system is store the data, services and information as system software and application software. The sets of files system make the directory system. This directory space going to disk for storing and restoring purpose. This is called the hard disk of the computer system. The kernel improves the capabilities of processor, memory (Kai, 2008; O’ Reilly, 1995; Sumitabh, 2009; Sun-Microsystems, 2002; Tanenbaum, 2010).

Figure 1.

PMF protecting data & services

The cryptographic key management (CKM) is a must be securely managed when dynamic cryptographic functions, tools and utilities are implemented in various other controls on operating system. The cryptographic key management includes key generation, distribution, storage and maintenance purpose for secure & reliable operating system. This is a measure preventive control in security world around the globe. As a brief, in the operational security domain, preventive controls are designed to achieve two things: to minimize the cost and maximize the security (impact of unintentional errors there are entering the system and to prevent unauthorized intruders from internally or externally accessing to the application and operating system). We have to find out some method and mechanism to maintaining ratio & proportion among various sub systems like server key, encryption key, processor & memory capability, availability in around the clock. This issue is highlighted in our action plan and proposed method. We have to find out some method, to make the more efficient, secure, high available & reliable the robust high end operating system. The SSH key in the existing Unix based operating system support only up to 32, 64, 128, ….1024 etc/ssh/sshd_config (Cryptography enable through ssh implementation AES:56, 128, 256, 2048, bits cipher, cipher blowfish-CBC,aes256-CBC, aes256-chr.). The existing system supporting only 1024 in SSH key & 256 key size in AES level. These AES-256 and SSH-1024 is not sufficient for high end processor, CPU, Memory, instruction pipe lines (SISD, SIMD, MISD, MIMD). But, the proposed dynamic key management will be facilitated and resolve the various problems when it spans several jobs and applications are running simultaneously under heterogeneous complex infrastructure & mobile computing environment, which using millions of user accessing the same piece of data around the clock (24 x 7 x 52) on internet and Intranet application (Kai, 2008; O’ Reilly, 1995; Sumitabh, 2009; Sun-Microsystems, 2002; Tanenbaum, 2010).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 4 Issues (2017): Forthcoming, Available for Pre-Order
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing