Font Size: a A A

Research On The Integrity Protection Of Data Stored On Hard Disk

Posted on:2010-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:N N SongFull Text:PDF
GTID:2178360275470213Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The protection of data integrity has become a hot issue. Being a widely adopted data storage devices, hard disk is responsible for the integrity of important data stored on it. Various security threats will bring inestimable loss to the organizations, such as army, government and enterprises, holding critical data without integrity protection.The main methods of hard disk data integrity protection are introduced and analyzed. Data integrity protection techniques were explored from the perspectives of data integrity verification and data recovery in this thesis. Considering data integrity verification, a new kind of incremental hash function called iHash is proposed based on incremental cryptology. Besides provable security against collision-attack, and the analysis of its time complexity, the experiment results reveal that when only little modifications are made on a large amount of data, iHash is much more efficient than traditional hash algorithms, such as SHA1. At last, hard disk data integrity protection solutions, which can be used in DAS(Direct Attached Storage) and SAN(Storage Area Network) separately, are proposed based on the incremental authentication technique.Considering data recovery, a data recovery scheme based on stackable file system is designed after comparison and analysis of some current main techniques on data recovery. This scheme uses stackable file system module to intercept all the writing operations on basis of file system and record logs for data recovery. This scheme uses little storage resources to save logs. The amount of logs increases dynamically according to the writing operations, which is more efficient compared with data backup. At last this thesis introduces how to use FiST to create stackable module to record logs and how to compress logs efficiently.
Keywords/Search Tags:Data integrity verification, Data recovery, Incremental hash, Provable security, Stackable file system
PDF Full Text Request
Related items