Font Size: a A A

Research Of Transparent Encryption Model Based On Windows NT File I/O Interception Technology

Posted on:2011-05-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y YuFull Text:PDF
GTID:2178330338986015Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the information age, electronic information security has become a well-focused topic. But the traditiona encryption l model always have complicated operation, chaotic management, which transparent encryption model privide a solution,and has become the mainstream technology and the inevitable direction of electronic information security area.Compared with traditional encryption model, transparent encryption model has a high efficiency, easy operation, safety, and can be effectively prevent network leaks and other advantages. File I/O interception technology, file buffer processing and file encryption strategy become key issues in the model.This transparent encryption model intercept the file IO information through file system filter driver technology in kernel mode, which is safer, automatic encryption and decryption operations; and prohibit user from copying confidential file context through the API HOOK technology in the application layer, which is better stability. Transparent encryption model handle the file buffer in two ways, one is to remove the file buffer contents when authorized and non-authorized state transitions, which is Widely used ; and the other is double buffering techniques, which has synchronization issue.In order to avoid information leak caused by network traffic, transparent encryption model uses the process indentify to distinguish is the authorized state or not. To distinguish file is encrypted write encryption sign in the file header. Transparent encryption use of AES symmetric encryption algorithm to ensure the efficient, the use of ECC non-symmetric encryption of the AES encryption key management.Transparent encryption model to solvemany problems on efficiency and safety of the traditional encryption model. Transparent encryption model is worthy of popularization and application in the enterprises and institutions.
Keywords/Search Tags:Electronic information security, File I/O interception technology, File system filter driver, Transparent encryption, File buffer, Encryption sign
PDF Full Text Request
Related items