期刊文献+

基于读写优化的内核级加密文件系统 被引量:1

Kernel-level Cryptographic File System Based on Read/Write Optimization
下载PDF
导出
摘要 为增强数据的机密性,在对存储读写流程优化的基础上提出一种内核级加密文件系统(KCFS),该内核级加密文件系统能克服加密应用程序的使用不便利性和用户级加密文件系统的低效性,在内核级文件系统层提供加/解密功能,从而保护存储系统中的数据。对比测试结果表明,KCFS比用户级加密文件系统CFS具有更好的读写性能。 In order to strengthen the confidentiality of data,this paper proposes a kind of Kernel-level Cryptographic File System(KCFS) combining the optimized data read/write flow.The kernel-level cryptographic file system can overcome the inconvenience of encryption application and the low efficiency of user-level encryption file system,so as to provide the encryption/decryption function in the kernel-level file system,protecting the data stored in the storage system.The result of comparative experiment shows that KCFS can reach better read/write performance compared to user-level encryption file,such as CFS.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第15期137-139,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AA01A402) 国家自然科学基金资助项目(60603074 60603075 60933002)
关键词 存储安全性 内核级加密文件系统 加密策略 storage security Kernel-level Cryptographic File System(KCFS) encryption policy
  • 相关文献

参考文献8

  • 1舒继武.网络存储安全[J].中国教育网络,2007(10):64-65. 被引量:5
  • 2Blaze M.A Cryptographic File System for Unix[C]//Proceedings of the 1st ACM Conference on Communications and Computing Security.[S.l.]:ACM Press,1993:9-16.
  • 3Heidemann J S.File System Development with Stackable Layers[J].ACM Transactions on Computer Systems,1994,12(1):58-89.
  • 4Huang Jianzhong,Xie Changsheng,Cai Bin.Research and Implement of an Encrypted File System Used to NAS[C]// Proceedings of the 2nd IEEE Int'l Conf.on Security in Storage.[S.l.]:IEEE Press,2003:73-77.
  • 5Zadok E.Cryptfs:A Stackable Vnode Level Encryption File System[R].Columbia,USA:Computer Science Department,Columbia University,Tech.Rep.:CUCS-021-98,1998-06.
  • 6郑晓林,荆继武.基于身份加密的密钥管理方案研究[J].计算机工程,2006,32(21):145-147. 被引量:7
  • 7赵铭伟,毛锐,江荣安.基于过滤驱动的透明加密文件系统模型[J].计算机工程,2009,35(1):150-152. 被引量:30
  • 8Schneier B.The Blowfish Encryption Algorithm[J].Dr.Dobb's Journal,1994,7(3):38-40.

二级参考文献12

  • 1张宁,陈智雄,肖国镇.基于身份的加密机制的研究与应用[J].武汉大学学报(理学版),2004,50(A01):164-166. 被引量:3
  • 2郑晓林,荆继武.基于身份加密的密钥管理方案研究[J].计算机工程,2006,32(21):145-147. 被引量:7
  • 3郑磊,马兆丰,顾明.基于文件系统过滤驱动的安全增强型加密系统技术研究[J].小型微型计算机系统,2007,28(7):1181-1184. 被引量:28
  • 4ONEYW. Programming the Microsoft Windows Driver Model[M]. 2nd ed. [S. l.]: Microsoft Press, 2002.
  • 5Russinovich M E, Solomon D A. Microsoft Windows Internals[M]. 4th ed. [S. l.]: Microsoft Press, 2005.
  • 6Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C].Proc.of Crypto'01.Springer-Verlag,2001:213-229.
  • 7Boneh D.The Decision Diffie-hellman Problem[C].Proc.of ICANN'98.Springer-Verlag,1998:48-63.
  • 8Yum D H,Lee P J.Identity-based Cryptography in Public Key Management[C].Proc.of EuroPKI '04,2004:71-84.
  • 9Dodis Y,Yung M.Exposure-resilience for Free:The Hierarchical ID-based Encryption Case[C].Proc.of IEEE Security in Storage Workshop,2002:45-52.
  • 10Hanaoka Y,Hanaoka G,Shikata J,et al.Identity-based Encryption with Non-interactive Key Update[C].IACR ePrint Archive,2004.

共引文献39

同被引文献11

  • 1康潇文.基于虚拟存储的容灾数据备份关键技术研究[D].郑州:信息工程大学,2009.
  • 2Tipton H F, handbook [M] Krause M. Information security management BoeaRaton: CRCPress, 2012:163-166.
  • 3Omar H Alhazmi, Yashwant K Malaiya. assessing disaster re-covery alternatives: On-site, collocation or cloud [C] //23rd IEEE International Symposium on Software Reliability Engi- neering Workshops, 2012: 19-20.
  • 4Modi D, Agrawalla R K, Moona R. TransCryptDFS: A se- cure distributed enerypting file system [C] //International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2010.. 187-194.
  • 5Maclean L. Understanding device-mapper in Linux 2.6 kernel[EB/OL]. [2010-01-06]. http://www, askmaclear com/un- derstanding-device-mapper-in-linux-2-6-kernel, html.
  • 6Morris J. Linux kernel security overview [C] //Kernel Con- ference Australia Brisbane, 2009.
  • 7Thomasian A, Xu J. RAID level selection for heterogeneous disk arrays [J]. Cluster Computing, 2011, 14 (2): 115-127.
  • 8Saeed T. Raid5 recovery in a high availability object based file system: U.S. Patent 8, 458, 515 [P]. 2013-06-04.
  • 9Wang J, Yao X, Mitchell C, et al. A new hierarchical data cache architecture for iSCSI storage server [J]. IEEE Tran- sactions on Computers, 2009, 58 (4): 433-147.
  • 10Lindgren K, Lynn J, Spry A J. Methods for defining and na- ming iSCSI targets using volume access and security policy: U.S. Patent 7, 568, 216 [P]. 2009-07-28.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部