Font Size: a A A

The Research Of Trusted Storage And Its Application To Secure Data Management

Posted on:2008-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:J X LuFull Text:PDF
GTID:2178360242476865Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the digital time's coming, more and more impliments are used on the Internet, computer and Internet are becoming important part of our life.But when the development of Internet make computer more flexible, open, dynamic, it brings on many security problem.So how to constitute new kind of trusted computing environment to fit the requirement of information development is one of the most important problem in information science and technology area.Trusted compution technology becomes new research hotport in information security area, and the research is to effectively resolve unsafe problem in computer's configuration, and to protect data in computer, prevent virus and untrusted user.This paper introduces Trusted Computing technology in detail, analyse the shortcoming of today's sealed storage, and proposes a property-based sealed storage solution, and this solution not only ensure high security lever of sealing data and platform, but also solve the problem that sealed data become invalid when soft and hareware updated, to better implement sealed storage which is a characteristic function. This paper introduce Trusted Computing technology based on today's security problem computers faces,and introduce predominance of Trusted Computing technology in protecting computer's security. Then this paper analyse sealed storage technology in detail,discuss the shortcoming of sealed storage of present standard。Then based on the conclution of research of other people, proposes a property-based sealed storage solution to solve the problem that sealed data become invalid after soft and hareware updated. At last, this paper proposed a software protection implement moduler based on this storage solution.This implement moduler provide delicate software protection measure, provent legal user using protected software in broken systerm, provent the shortcoming of invalidity of sealed storage after the update of trusted platform.This solution is more convenient in software update progress comparing sealed storage technology of present,and the update progress don't need re-seal progress of sealed software module,only thing to do is to update the Software Information Table or PCRs Update TableSo, Research result of this paper has not only academic but also practical meaning in protecting date security and validatity, and provides references to constructing high trusted data environment and farther research on trusted computing environment.
Keywords/Search Tags:Trusted Computing, trusted platform moduler (TPM), sealed storage, property
PDF Full Text Request
Related items