Font Size: a A A

Design And Implementation Of A File Protection System Based On Application Audit And Transparent Encryption Technology

Posted on:2016-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:H HeFull Text:PDF
GTID:2308330476453444Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, more and more paper documents are replaced by electronical document, which involve in a large number of high privacy documents, and the leakage of those can cause serious disasters to the enterprises. To deal with the increasingly seriouse of data leakage situation, a safer and practical solution must be designed and implemented.From now on, many methods and technology have been proposed and studied. They can protect such sensitive daga in some degree, but sacrifice the usability of system at the same time. In order to balance the safety of data and keep user-friendly functions, we have design a new model. On the one hand, it combines application audit technology and transparent encryption technology, providing data with double protection. On the other hand, considering the defects of double-cache mechanism, we proposed a new design to resolve the problem of cache-management. This design can both avoid the leakage from cache and improve the system performance and usability. Meanwhile, a new method for authentication and management of file keys make such things easier and safer.From the experimental data, we come to the conclusion that the realization of such a system, it not only banance the security and the usability, but also make the management and control of the data leakage issues of one enterpirse easier.
Keywords/Search Tags:Date leakage, Transparent Encryption, Application Audit, Cache Management, Key Management, Authentication
PDF Full Text Request
Related items