Font Size: a A A

Researchon Webpage Tamper Proofing Technology Based On Internet

Posted on:2018-05-01Degree:MasterType:Thesis
Country:ChinaCandidate:C X HuFull Text:PDF
GTID:2348330542472261Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet,the scale of Internet users has been growing year by year,the Internet has become one of the most important channels for people to obtain information,including Internet banking,finance,education,shopping,tourism,etc.The Internet has become an indispensable life partner.Applications based on Internet bring people more pleasure and convenience,but also bring users potential security risks.Web page cheating is an improper way to provide users with bad information behavior,not only affect the user's Internet experience,but unfortunately bring the user security risks.The research on webpage anti cheating is from 1996,and then several key technologies are produced: Time polling technology,Event triggered technology,Core embedded technology,File filter driver technology.Currently on the market the anti-tampering system combines several techniques to prevent the occurrence of web cheating.But cheating is still frequent,the frequency of tampering is high.With the rapid development of hardware computing,the existing tamper proofing technology is no longer safe,and the research of tamper resistant technology is still the current research hotspot.In this thesis,the tamper proofing technology is studied,and the security of the web page code and server to data transmission process is protected.In view of the shortcomings of the current tamper proofing system,a S-T tamper resistant model is proposed in the basis of traditional core embedded system,in encryption,we use the ECC algorithm with high security,and in decryption verification we use real time streaming framework Storm to improve the speed of decryption verification.Using ECC,the web page will be encrypted by 1KB,which allows to locate tampering when decryption verifying.The use of ECC algorithm makes the security of the web page guaranteed.The use of flow frame Storm in decryption makes the response speed of a web page can still be accepted.For the server to database transmission process safety problems,twice encryption / decryption scheme to ensure data transmission security is presented.The scheme can not only ensure that the plaintext data can not be restored even if the data is stolen;ensure that after hackers modified the data,it can be found before stored in the database,thus solve the problem of once encryption.The specific implementation steps are: before making the data transmission in the network,the data will be encrypted first,then process twice encryption,at the actual transmission time we transmit both the first encryption result and twice encryption result.Finally,the performance test and functional test of each module of the S-T tamper resistant model are carried out through simulation experiments.Also the Storm based real-time tamper detection scheme,the effectiveness and applicability of the two encryption and decryption scheme are tested.The simulation experiments results show that there is an acceptable response speed in the case of web security.
Keywords/Search Tags:Web page tamper proofing, S-T tamper resistant model, Storm decryption, two encryption and decryption, ECC algorithm
PDF Full Text Request
Related items