Font Size: a A A

The Design And Implementation Of The Netwoek File

Posted on:2016-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2308330473462489Subject:Computer technology
Abstract/Summary:PDF Full Text Request
More and more of Party and government organizations are beginning to explore the way of information with the rapid development of information technology and the mature of informatization office software. Informatization construction not only can meet the needs of the business, but also to serve the society, to maintain national functions, improve the operation efficiency and made important contributions to increase the transparency. It need to be proceeding with The Times, according to the local conditions and applying different units to realize the informatization construction of Party and government organizations, the security problem is the top priority of the system design for which storage the important data. This paper is devoted to solve the issue which encountered in the actual work that the large amount of file data cannot be storaged centrally and shared access safely.Regarding the design, first of all, it need to establish the overall system architecture and the process of upper application; Second, in order to realize the data encryption transmission and identity authentication, and combine the system with PKI/CA technology framework; third, in order to consolidate the data storage safe, the system is using 256-bit AES high intensity data encryption storage technology to storage the data centrally; Then, in order to realize the fine granularity authorization, the data diagram, detailed record, folder and department, the relationship of authorization between people will be stored in the database; Finally, the system need to build a concise and friendly user interface, perform the whole system test to guarantee the system quality. To design a safe, reliable, stable performance network file safe system based on the important data storage and application issue in the actual work, it need to be elaborate design and improvement step by step, for this system, not only can meet storaging the data centrally, requirement of efficient application, but also can make sure the data security.The design of this system meets the criterion and requirement of the Security Department, filled the gap of large data storage and application, solved the issues of data storage centrally, transmission and authurized access. This system has strong applicability, and can be ported to multiple departments, finally serving all the departments. This system has the high popularization value, and provides a good reference for the storage and application of the file data in other fields.
Keywords/Search Tags:storage centrally, security transmission, authorization access, PKI/CA
PDF Full Text Request
Related items