Font Size: a A A

Trusted Data Storage Model Based On TPM

Posted on:2011-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2178360308454364Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the information technology and network technology rapid development and popularization of its application, computers and networks have become an important part of daily life. However, the rapid development of the Internet makes the computer systems become flexible, open, dynamic system, at the same time, also brings a lot of security issues. These security issues have become more severe along with the field of information technology applications'extension. Construction of a new generation security trusted computing environment which is adapting to requirement of information development has become one of the hot of the field of information science and technology.The technology of trusted computing primarily looks at how to solve the problem of insecurity on the computer architecture effectively, and improves the system's security fundamentally. Trusted and secure data storage is an important part of trusted computing, the data's sealing storage is one of main functions of trusted computing, it can protect the data of computer terminals effectively, and can prevent viruses, hackers and malicious users'destruction and unauthorized access.This paper introduces the trusted computing research at home and abroad firstly. Then, the paper introduces the concepts, characteristics, system structure and working mechanism of trusted platform in detail. And then, the paper discusses the type of keys, the main technologies and the storage solutions of trusted storage. On this basis, the paper analyses the tree-based key system's efficiency, and puts forward a new management model based on the hash key. The application model can not only simplify the tree-based key management system, improve the system efficiency, but also provides a new solution for keys'secure storage. Finally, the paper constructs a new model of full disk encryption that can achieve the security encryption for the entire hard disk data by using the hash key management model, on the one hand, the model simplifies the tree-based key encryption system, and on the other hand, the model has also enhanced the data security storage greatly.Therefore, the paper's research has theoretical and practical significance in data security storage, at the same time, can also provide reference for the establishment of highly trusted data terminal environment and the further study to trusted computing environment.
Keywords/Search Tags:Trusted Platform Module, Trusted Data Storage, Hash Key, Full Disk Encryption
PDF Full Text Request
Related items