Font Size: a A A

Research On Audit Log Of Trusted Storage Based On Security Chip

Posted on:2015-07-11Degree:MasterType:Thesis
Country:ChinaCandidate:J SunFull Text:PDF
GTID:2298330452953233Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The key to data security is stored in the system memory safety current almost allthe audit log to record the behavior of the system. The audit log system is animportant system of safety management measures, through the analysis of the logsystem anomalies or illegal operations, can be found in time, and to provide evidencefor the intrusion behavior. It is because of the importance of log, it has become themain target of attack invaders, vulnerable to tampering, forgery, delete and otherdamage, brings great hidden danger to the safety of the audit log. It must improve theaudit log protection mechanism, to ensure the confidentiality and integrity of the log.The actual demand from this, from the trusted computing and trusted storagetheory, based on detailed analysis of cryptography and security chip and softwarestack, presents a security chip audit log scheme based on trusted storage. Introductionof the security chip makes the audit log to create, store and access are in the trustedenvironment, the formation of a credible audit log system.First of all, from the actual application scene of trusted storage audit logs,proposes the design goals and design idea of trusted storage based on the audit log,presents the whole frame of trusted storage audit logs, and composition and eachfunction of the module in detail. Then, from different angles, concrete analysis oftrusted storage safety behavior is discussed, the audit log record. Then, based on theoverall framework of the audit log, the security chip is added to the audit logmanagement, focus on key parts of the log structure, log generation, storage, accesscontrol, to further refine the function and design. Finally, combined with currenttechnology, design and implementation of the security chip of trusted storageprototype system based on the audit log, and a prototype of the system was verified byexperiment. Test results shows that the design achieves the goal to be achieved, topromote and implement security chip based on trusted storage audit log mechanismprovides a good theoretical and practical foundation.
Keywords/Search Tags:audit log security, trusted storage, security chip, cryptography
PDF Full Text Request
Related items