Font Size: a A A

Application And Research Of Transparent Encryption Technology Based On ERM

Posted on:2012-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:X F LiFull Text:PDF
GTID:2218330368499323Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the computer network information era, Enterprise information security problem has been more and more widely to pay attention to. To the enterprise, not only to prevent from external attack and damage, but also to prevent enterprises from the intended or unintended behavior; Enterprises in order to realize humanized management, depend only on the improvement of management system can not fundamentally solve the problem of enterprise interior personnel. Data encryption technology through data encryption protection enterprise important document data, ensure the enterprise data security, reduce economic loss. The traditional encryption software can solve the problem of data security, but the encryption and decryption process requires manual, work efficiency is low, and prone to human error.According to the above analysis, this paper presents the application of transparent encryption and decryption of an enterprise important information document encryption and decryption processing, If fitted with transparent encryption and decryption software system, encryption and decryption can automatically, without user involvement. For enterprise users, not only can protect the important information for the purpose, but also can greatly improve the efficiency of work. The purpose of this research is to prevent unauthorized access to or communication enterprise important information document; For different employees grant different permissions management, according to the above analysis, combined with the current actual, put forward transparent encryption file system. At the start of the various traditional encryption technology and encryption technology to carry on the comparative analysis of transparent.Transparent encryption technology has become an important research area of information security. In order to ensure the security of data stored in the file, the main technology is the important or sensitive information to the text data stored in the form of Transparent encryption file system in the underlying implementation, may reduce the encrypting file system efficiency, transparent encryption technology is convenient for the user in the system, so its research value.Therefore, this paper designs a transparent encryption file system. The entire file encryption system is divided into two parts:the core layer module and the application layer module. The application layer module comprises a control module and key management module. In order to facilitate the use and management of the key, the system will put all the keys on the root directory. System specific functions on the part of the kernel to achieve. In the whole process, the application layer module and the kernel module interaction is crucial. The application layer module is the whole system control hub of the normal running. Transparent encryption technology to realize data transparent encryption and decryption process is:the data read from the file, complete the decryption operation. The data from the memory is written to the documents, complete the encryption operations. In the whole process does not change the operation habit of the user, users to carry out any operation not feel encryption, decryption process, thus achieving its transparent encryption, decryption function.In the end of this paper, according to enterprise right management philosophy using delphi programming to achieve the enterprise's internal access to different users have different rights. Testing and contrasting of the system's two conditions of comprehensive performance, before encryption and encryption, and the using of encryption system to the effects of the storage space. Contrasting this system with disk encryption systems, improved operation efficiency, and at the same time, so that the operating system's overhead reached to minimum. Because it has not encrypted all the files in the disk, but to encrypt the file that the user has specified the file type.
Keywords/Search Tags:Transparent Encryption, Key Management, Access Control
PDF Full Text Request
Related items