Font Size: a A A

Design And Implementation Of Data Security System Based On TPM

Posted on:2012-06-20Degree:MasterType:Thesis
Country:ChinaCandidate:K DongFull Text:PDF
GTID:2178330335960305Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the deep development of computer technology, protecting data safety becomes the focus of people's attention, how to save data on security medium to avoid stealing and damaging by illegal users but allow to access the data simply and quickly by authorized users is a urgent practical problem the enterprises, R&D institutions and military organizations face to, which is also the important content in information security field---data security. In the information security theoretical research, encryption and authentication technique is effective to ensure data security, particularly the combination of them can be used to realize the data storage encryption and access control perfectly, which can be used to meet the demand of privacy, integrality and acknowledge of data.Trusted computing is a new trend of modern computer techonology development. It provides the more trustable protection mechanism for data. This paper utilizes some important concepts and stucture of trusted computing, designs a data security system based on trusted platform module (TPM) for its advantage of key storage and key management.This paper has completed following works:Firstly, it presents the background and research significance, and describes the main research contents of this topic. Secondly, it introduces current data security technology, mechanism of trusted computing module and virtual hard disk technology which is used to realize data security system. Thirdly, it put forth a data security solution---Data Securiy System Design Based on TPM and describes the general function and submodule function of the system in detail. Fourthly, it reveals the implemention result of the system and the testing result of the system. Finally, to make a brief summary, it analyzes the application prospects of this system furthermore it raises future improved scheme and research directions.
Keywords/Search Tags:Trusted computing, Trusted platform module, Virtual hard disk
PDF Full Text Request
Related items