Font Size: a A A

Data Security Storage System

Posted on:2011-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:H L LuFull Text:PDF
GTID:2208360305497312Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Computer Science, electronic data storage is becoming more popular. More than 90% of data was stored as electronic documents. It arouses wide concern of how to prove data security. In the information systems, if storages were out of control, all the sensitive information and important data will be stolen, which result in heavy losses. Therefore, to efficiently secure the data, it's necessary to research data security system base on encryption.Aims at various storages, the thesis designs and implements a data security system by utilizing data encryption technology, file system filter technology, virtual disk technology and Windows API, and compares with other similar systems. In details, it firstly introduces the main technologies of data security, including encryption algorithm, USB Key, file system filter, virtual disk driver, file filter and steganography, then designs and implements the data security system in detail. The system has four main functions. Encrypting data:Encrypted protection area created by users exists as encrypted files, and will be loaded as virtual disk where users can read/write files as normal. The system uses AES and RSA to encrypt/decrypt data, and users are identified by USB Key. Network disable/enable:To prevent plaintext from being stolen from network, it automatically disables network connection while virtual disk is loaded. Hidden encrypted protection area:The encrypted protection area can be loaded as virtual disk only if the correct USB Key is connected. The system can run on Windows 2000 and above, and secure the data stored on hard disk, USB disk, CD-Rom and floppy disk.At last, by comparing with TrueCrypt, DriveCrypt and FileSafe, it proves the system has better performance. Meanwhile, the results of testing on functions, compatibility and stability in production environment indicate that the system achieves the design objective.
Keywords/Search Tags:data security, encryption, intelligent network auto-protection, file complete deleting, file hiding
PDF Full Text Request
Related items