Font Size: a A A

Security-Enhanced NAS Systems Design And Implementation

Posted on:2015-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:X DaiFull Text:PDF
GTID:2308330452957220Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of network technology and storage technology, whether government, corporate or personal information is stored are gradually information stored in the network memory and rely on network communication and exchange of information. Same time to facilitate the management of information, centralized data storage has become a trend in the development of data storage, therefore, centralized storage of data security is an important issue to bring information security field.NAS(Network Attached Storge) storage devices as a professional network data connection with its convenience, reasonable price and high-capacity network data has become an important role for centralized storage. However, the traditional NAS system exists no strict information security measures weaknesses, which will make security risks in the course of using NAS systems.In order to solve the traditional NAS system is weak information security problem in the analysis of the existing NAS system stored procedures on security issues, we propose a security-enhanced NAS storage system to meet the security needs of the NAS. The system used by the access control model and the pin is a high granularity of access control model has the strength and improve the NAS data security; adds auditing of user behavior to achieve the non-repudiation of data access to the NAS. The system will be divided into three categories of users ordinary users, system administrators and audit manager, and provided with the corresponding function in the system:provides a common user file upload function to download and delete the directory created; for users to manage who provides the users, roles, user groups, and environmental management functions administrators to audit the audit function.
Keywords/Search Tags:NAS, File Encryption, Access control, Auditing, Grading Protection
PDF Full Text Request
Related items