Font Size: a A A

Research Of Electronic Document Non-proliferation In The Net Of Huge Amounts Of Information Storage

Posted on:2013-10-23Degree:MasterType:Thesis
Country:ChinaCandidate:H J WangFull Text:PDF
GTID:2248330362972663Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the network of scale increases and the network resources the rapidly expanding day by day,the data security demands of users become more and more high, it makes the mass information network security problems of the document is facing enormous challenges. The traditional non-proliferation technology has can’t satisfy the now met in the document security problems, so this paper had new research to document non-proliferation.Not only did a study of documents used,but also the paper researched the security of communication of the mass information net users node and its own security, the main contents are as follows:(1)It made the research of the safety of the communication between the node and node in the network of huge amounts of information. It took use of the roup key management scheme based on LKH, and made better the Key distribution and key updated of the system. At the end,it made a contrast from the cost of Communication, storage and encryption with the Centralized and distributed by the simulation experiment.(2)The paper setted the attributes of safety in order to manage the documentation, at the same time, it took use the the technology of encryption and decryption when people used a USB device to transmit documentation in order to prevent the leak from using the USB device.At the end,it made the analysis the encryption and the decryption,and it made a contrast from using automatic encryption and not using encryption by the experiment.(3)The paper took use of the technology of remote mirror in order to take precautions against the lost of document when the disaster or other causes occurred. At the same time, it improved the technology of remote mirror, used the synchronous and asynchronous mirror,and it used the batching of the requesting of writing. At the end,it improved the disposing of a group of requesting of writing in the node of master and slave,which can better satisfy the data consistency and data recovery rate requirements.
Keywords/Search Tags:Document Non-proliferation, Group key management, Logic key trees, Safety of documents using, Remote mirror
PDF Full Text Request
Related items