Font Size: a A A

Researchand Implementation Of Self-Securing Disk Encrypted System Based On Truecrypt

Posted on:2014-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:T Y TaoFull Text:PDF
GTID:2248330398970968Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology, there are multiple types of data encryption system appearing to meet the increasing demands of data storage. Those systems can assure the confidentiality and completeness of the encrypted datasufficiently, however, they donot provide a mechanism to guarantee the security for thevital data, and make the user experience as a convenience.These defects are a directresult of the characteristics of the encrypted data. Because the data encryptedwhich needs arelevant software to work can’t be read directly by operating system, some junior users may unconsciously putthe encrypt data to a risk.To solve these problems, this article puts forward a new "self-securing"disk encrypted system based on the TrueCrypt disk encrypted system. The system is designed from four aspects,data security, operating security, user security and audit security, toachieve the goal of "self-securing" forenhance the security requirement of the encrypted data storage.This paper gives emphasis todivide the system to six main parts, which are named as disk encryption module, encrypted disk volume protection module, data recovery module, user management module, behavior audit module, and process watch module. In one hand, the study does an investigation in users’operatingbehaviorsto analyze the most major threats which the encrypted disk volumes face; in the other hand,the study put forward a data recovery proposalfor encrypted data which is quickly formatted. The threat avoiding and the encrypted data recovery,are the two main innovation points of the system.
Keywords/Search Tags:disk encrypted system, TrueCrypt, auditself-securingdata recoverybehavior, Hook
PDF Full Text Request
Related items