Font Size: a A A

Research On Disk Data Hiding And Fast Destruction Methods

Posted on:2020-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y L ZhaiFull Text:PDF
GTID:2518306047998439Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
In recent years,countries have continuously strengthened their ability to supervise information.For those who work or live abroad,the classified information they deal with has also been threatened by security.This information may be relevant to the state,and the consequences will be very serious once it is disclosed.In general,there are two main ways to protect the security of data privacy.First,data must be stored in a confidential manner to prevent unauthorized access,and the solution should not cause significant inconvenience during normal use.Second,at the time of disposal,the confidential data must be removed from the storage medium in an unrecoverable manner.Based on the above two objectives,this thesis conducts research on file hiding and rapid destruction.The main contributions of this thesis are 2 points:Firstly,this thesis chooses the way of file hiding for the confidentiality of information,and studies the mainstream NTFS(New Technology File System),and proposes A block-based implicit storage algorithm(BISA)under NTFS.This method utilizes the redundant space caused by the allocation characteristics of NTFS,encrypts the file,performs block transfer storage,and records hidden files and host space information,which realizes the hiding of file content and file existence.Secondly,the method of data overwriting is selected for the removal of private data,and an index-based fast destruction algorithm(IFDA)is proposed.When the file is large,it is very time consuming to overwrite the file for destruction.This process may lead to the disclosure of private information.In order to make the file reach an unrecoverable state in a very short time,only the data file and the key for recording the hidden file and the host information are overwritten multiple times.For the overwrite mode,a combination of all 0 overwrite,full 1 overwrite,random overwrite and other methods and the number of times is more than 35 times.Finally,this thesis proves that the file hiding method designed in this thesis has good concealment,robustness and security.It also proves that the data destruction method designed in this thesis achieves the goal of second-level destruction and thoroughness.
Keywords/Search Tags:File hiding, Data destruction, File encryption, Redundant space, Data overwriting
PDF Full Text Request
Related items