present scenario malicious authors are rapidly growing and now other than internet users they are also targeting the loophole in operating system application level security. Transferring data between applications is common user activity. Since data in a clipboard is freely delivered between arbitrary programs capable of using a format of the data, a simple text, a rich text, a picture, and information having a particular format may be delivered between programs capable of using such information. Information delivery made between programs through a clipboard is undoubtedly an efficient method of properly using a multitasking function of an operating system, but as the security of important data is increasingly demanded, data transmitted between independent programs through the clipboard needs to be protected. Any malicious application with get through from the protection system can easily watch the content of our clipboard and can modify the content during copy paste operation. In this paper implementation of a prototype model for clipboard security of operating system is presented, as we know that whole operating system has a common clipboard which acts as channel for inter-application operability. In our approach we prevent the clipboard data by encrypting the content at the time of copying & cutting and decrypting at the time of pasting, for this we use cryptographic techniques.
[1]
Shaobo Li,et al.
Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System
,
2010,
2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[2]
Wing Cheong Lau,et al.
Hitchbot - Delivering Malicious URLs via Social Hitch-Hiking
,
2011,
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[3]
Zhiwen Qi,et al.
Research of Anti-Copy and Plagiarism Monitoring System
,
2009,
2009 First International Workshop on Education Technology and Computer Science.
[4]
Gregg Rothermel,et al.
Revealing the copy and paste habits of end users
,
2009,
2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC).
[5]
Rajan Mishra,et al.
Comparative Analysis Of Encryption Algorithms For Data Communication
,
2011
.