Font Size: a A A

Research On Key Technology For Secure Storage Of Electronic Documents

Posted on:2013-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:T LengFull Text:PDF
GTID:2248330377951105Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the continuous development of information technology, a large number of electronic documents are used or stored. Confidential documents from privacy to government and enterprise, any sensitive information is inadvertently spread and replication will bring catastrophic harm to parties. Electronic data secure storage and use will be to become an increasingly serious problem.Technologies of firewalls、intrusion detection、hierarchical access control and simple encrypted storage can not be good to ensure the safe storage of electronic data。By analyzing the advantages and disadvantages of national safe documents products, File safe system is designed and implemented which based on virtual disk of transparent encryption and decryption. Putting forward combination of hook to achieve documents control. Designing solutions of files anti-delete and system anti-reverse;Auditing log of file operations.Through custom audit model.finally, File safe and monitor audit prototype system is designed,the key technologies and problems is solved.The contribution and innovation of this paper is as follows:1. As a result of SHFileOperation can not monitor the file operation under windows vista and later system,I have analyzed the different features of windows5.x and6.x serial system, realized the monitor of copy and cut operation under all existing windows system.2. Because of SHChangeNotifyRegister can’t get source path.The design of combination of detours hook and SHChangeNotifyRegister function to monitor the file operation. Collect log.besides,designing risk model to audit log.3. To defense software reversing,Research on principle of self modify code technology to analyze statically and dual-process protection to prevent tracking. Designing a model of dual-process protection and modify code to prevent the software static analysis and dynamic tracking.
Keywords/Search Tags:File safe, Electronic Documents, File monitor, Detours, SelfModifying Code, Audit Log
PDF Full Text Request
Related items