Font Size: a A A

Design And Implementation Of Transparent Encryption System Based On Linux

Posted on:2020-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:R C PengFull Text:PDF
GTID:2428330590483229Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the advent of the Internet age,the way people use to access things is not limited to simple communication tools,such as oral communication,letter delivery,etc.,and now more and more through mobile phones,computers,tablets and other electronic devices.Exchange information and store information.However,while we enjoy convenient communication methods,our personal information and important information needed are leaked.Therefore,ensuring the security of data has become an urgent research direction.As an open source operating system,Linux is more convenient than Windows operating system.Without modifying the kernel source code,the purpose of this design is to implement a transparent encrypted file system based on Linux,which mainly includes Two parts: the compression part and the encryption and decryption part.The compression part is mainly completed in the user space,the file is compressed and passed down to the virtual file system(VFS),and then passed down to the encryption and decryption file system by the virtual file system,and finally processed by the encryption and decryption file system.Passed to the real file system,the disk.Vice versa,a stacked information transfer structure is formed.In this mode,it does not affect the original file flow direction,and the security of the file is guaranteed.Finally,a compressed and cryptographic Linux-based transparent encryption system was obtained.The user space is compressed by combining gzip and LZMA.The stacked encrypted file system mainly uses the Blowfish algorithm for encryption.Based on the above results,the files processed by the designed system are obtained,which have better security,faster read rate and credibility.However,compared to other convenient file systems,a certain amount of time and space complexity will be sacrificed,and a transparent encryption process relative to the user's use can be realized.
Keywords/Search Tags:compression, stacked file system, Transparent encryption, Linux
PDF Full Text Request
Related items