Font Size: a A A

The Research And Implementation Of Encrypted Storage Platform Based On Safe Depot

Posted on:2012-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:X J ChenFull Text:PDF
GTID:2218330341951760Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The rapid development of information technology makes the flexible and efficient management of privacy data become a very challenging technical difficult problem. For one thing, privacy data become more and more, which present an explosive growth, and personal PC's Storage capability has been unable to meet this demand. On the other hand, the traditional encryption file system is geared to the needs of indiduals encryption storage mainly, which is deficiency in the storage capcity, encrypted data sharing and management, the user usability. Aiming at these problems, this paper studies how to use the server-oriented encryption file system to encrypt intensively and store users'privacy data flexibly and efficiently.This paper analysised the traditional encryption file system and kylin server-oriented encryption file system, first, and we propose the concept of safe depot, constructed the hierarchy tree encryption file system storage structure to manage user's encrypted data, which improve the system Security, flexibility and the efficiency.In this paper, the properties of safe depot and user behavior on the safe depot are studied and designed, according to encrypted the hierarchical storage structure we proposed a tree access control model, designed the encrypted data tree-level access control algorithm.This paper made in-depth analysis and research on encrypting hierarchical storage structure introduced the safe depot on the user data accessing and sharing, and designed Shared access state consistency maintenance strategy based on the counter, which ensured the user data that revoked share is consistent with before.At last, this paper has implemented a prototype of encryption hierarchical storage platform on the KYLIN operating system, and we analysed its security. The results show that the system has fine secutity and usability.
Keywords/Search Tags:Encryption File System, data management, Safe Depot, access control for tree
PDF Full Text Request
Related items