Font Size: a A A

Research And Implementation Of Transparent Encryption File System Model

Posted on:2009-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:R MaoFull Text:PDF
GTID:2178360272470799Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer science and telecommunication technology, people pay more attention to the enterprise's information security. The enterprise often resists the attacks not olny from the outsides, but also from the enterprise inside. It's difficult to prevent information from leaking only depend on consummating management mechanism. Therefore, we must protect the important information inside technically.Although traditional encryption software can solve the problem of data security, it can't balance and resolve the conflicts between the efficiency and data security. For the traditional encryption software, encryption and decryption need manually operation by users, it is not only cumbersome and easy for the omission, but also for the document itself there is a certain period of risk, that is, in the course of the use the documents exist as clear texts and are stored on hard disk. During the stage Trojan horse hidden in the computer or other forms of the virus has the chance to steal them away; it is not satisfactory both on safety and operation.Based on the above analysis and the practical requirements of the project, this article designs a transparent encryption file system based on filter driver, documents would be encrypted transparently in the course of file operations, it is no need to change the habits of users. Meanwhile the system introduces the control module and the key management module on the application layer, which make the system more flexible. Additionally, by referring to the encryption mechanism of Microsoft Encryption File System (EFS), we build a more practical and safe transparent encryption file system. This system not only overcomes the shortcomings of traditional encryption software, but also effectively solves the problem of the confidential data protection.Finally, we set up a test environment in the laboratory, the test shows that users who have installed the system can use documents freely and are not affected in the internal network. Once the files are separated from the network environment, they are no longer available. The most important reason for that is the files are always stored in encrypted form, in this way it can effectively prevent the leak of the incident.
Keywords/Search Tags:Information Security, File System, Filter Driver, Transparent Encryption
PDF Full Text Request
Related items