Font Size: a A A

Operation Monitoring Of Encrypted Mobile Storage Equipment Software Design And Implementation

Posted on:2014-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:G YanFull Text:PDF
GTID:2248330395982507Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
As an important medium for confidential data and information exchange, removable storage device brings us not only conveniences but also security risks. The data in removable storage device can lead to great loss because that the removable device is easy to lose and users’unauthorized malicious behavior also can lead to information’s leakage. So, data security of removable storage device is very important. Existing technologies are mainly inclined to protect the security of storage data instead of monitor the user operation, not to mention the offline user operation. In this context, this paper designs a removable storage device software system with operation monitor. The main research includes such aspects as following:1. This paper designs the overall architecture and function requirements of offline secure storage device with operation monitor, and introduces the filter driver technology of Windows operating system and the basic encryption concepts such as AES, LRW, HMAC and Salt.2. For the design and development of encryption disk module, this paper introduces the overall work flow, random number production based on mouse position, designs the key for the implementation of offline user operation monitor and transparent encryption and decryption system, and analyzes the encrypted disk data format and secure storage technology of encrypted disk control header.3. For mounting module design and development, this paper introduces user’s operation password test process, the virtual disk development and mounting, filter driver binding and binding function implementation, and user’s operation time control technology.4. For monitor module design and development, this paper introduces the administrator password test process, user’s operation record architecture; user’s operation record read and export function.Lastly, a summary of this paper is given, which proposes the inadequacies in this software system and makes a prospects outlook.
Keywords/Search Tags:removable storage, operation monitor, virtual disk, filter driver, transparentencryption and decryption, disk sector
PDF Full Text Request
Related items