Font Size: a A A

Research On File Transparent Encryption Protection Model Independent On File Type

Posted on:2022-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y P ZangFull Text:PDF
GTID:2518306536991729Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With more and more enterprises and individuals choosing to store confidential documents in computers,the need to protect information security is also growing.Due to the lack of protection awareness and protection means,document information disclosure incidents occur from time to time,ranging from personal privacy being violated,causing troubles to life,and bringing huge economic and spiritual losses to enterprises and individuals.Traditional protection methods and file protection systems have defects and limitations in practical applications.In order to solve these problems,how to better protect file information security has become one of the key research directions in the field of information security technology in recent years.Based on transparent encryption and decryption technology,this paper constructs a file transparent encryption and decryption protection model independent of file type,which has certain practical significance for the research of file type compatibility of file protection system.Firstly,a layered model of transparent encrypted file protection system is designed by applying the layered idea of software design.The model is divided into three parts:management and control layer,application layer and kernel layer.The management and control layer is responsible for managing the equipment to be protected,including monitoring the operation of the equipment and issuing protection policies.The application layer is responsible for receiving the policies issued by the management and control layer and collecting equipment information;The kernel layer is responsible for implementing protection policies and transparently encrypting and decrypting file information.Secondly,the files in the protection zone are divided into static files to be encrypted and dynamic files to be encrypted and decrypted.Using byte stream reading and writing technology,the two types of files are encrypted/decrypted respectively in the Windows system kernel layer,thus realizing transparent encryption and decryption of files independent of file types.Finally,the functions of each module of the model are tested by examples,and the functions of policy distribution and information acquisition in the management and control layer,policy reception and information collection in the monitoring layer and transparent encryption and decryption of files in the control layer are verified by experiments,which shows that the system correctly performs transparent encryption and decryption of files independent of file types and verifies the feasibility of the model.The performance of the system is tested,which shows that the system occupies an acceptable amount of computer resources such as CPU and memory,and verifies the efficiency of the model.
Keywords/Search Tags:information security, transparent encryption, file filter driver, byte stream reading and writing technology
PDF Full Text Request
Related items