Font Size: a A A

Development And Design Of Network Disk Technology In The Public Security System

Posted on:2014-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LuFull Text:PDF
GTID:2268330401467747Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the vigorous development of the e-commerce industry in the whole societyand the popularization of information technology in the public security system, themodern police system’s dependence on information technology is also increasing.If thecritical data was stolen, the loses of the police system will be difficult to estimate. Moreand more key data needs to be kept in computer system secretly. Therefore, how toeasily encrypt the data and effectively keep the password and keys has become a hottopic in today’s research.This essay studies on network data encryption technology of Disk data disasterbackup system. On the basis of the contrast analysis of the various encryptiontechnology, it build up a encryption scheme which is suitable for the network disk datadisaster backup system. It has also introduced the system design and implementationprocess detaily. This system is based on B/S framework. In view of the speed ofencryption and key management problems, the encryption system which is realized inthis article is a digital envelope method. Firstly, it is encrypted in the sending end togenerate random symmetric key. Then the file data is encrypted through the use ofsymmetric key. After that the encrypted symmetric key and key password md5valuegeneration digital envelope files are stored in the sending end. They are kept by thesender himself. At last, the encrypted backup files are uploaded to disaster preparednesscenter. By this method, it not only ensures the integrity of the data on the document andsecurity, but also effectively realized the encryption process efficiency and simplicity ofkey management.Finally, we test the system function and performance which were implemented anddraw the following conclusion: In the wrong key, even if the user can return the Sharedfile to the server side, but he is still unable to get the correct content. It can file thecorrect recovery use the right key only. Thereby the right file content can be got. Inperformance, the encryption process of backup file set spend a little more time in thewhole backup process. With the increase of encrypted file sets, the time used in theencryption will also increase; For the two different types of3DES encryption algorithm and AES-128, the time used in encryption is almost the same when the capacity of theencrypted file is small. But with the increasing of the capacity of encrypted file set, it’sobvious that the3DES encryption algorithm takes much more time than AES-128encryption algorithm.
Keywords/Search Tags:Encryption technology, Backup, Digital envelope, Management of Key
PDF Full Text Request
Related items