期刊文献+

机载信息系统存储安全问题研究

Storage security solution to air-borne information system
下载PDF
导出
摘要 机载信息系统由于它特殊的应用环境对信息安全有着特殊的要求,一方面要保障存储信息的绝对安全可靠,另一方面又必须考虑在某些紧急情况下,机载信息系统中信息的绝对保密。在存储信息绝对安全可靠方面,为了防止存储介质损坏,采用损耗平衡算法平均使用存储介质所有存储单元;损毁块管理算法用以保证损坏的存储单元不再被使用;而错误纠正与检测算法保证了存储单元的读写操作万无一失;掉电管理保护防止了意外断电造成的数据丢失或损坏。对于机载信息系统中绝密信息,紧急情况下将进行数据擦除的方法从而保证绝密信息不落入敌手,根据机载信息的绝密程度和擦除数据的时间要求选择Basic Purge、Rapid Purge、MilPure和Intelligent Destructive Purge4种数据擦除方式。 Air-borne information system has special requirements due to the special environment it applies. The storage of the information both demands reliability and confidential under urgent situations. On the aspect of information storage, Wear-leveling algorithm is developed assuring the equal usage of all storage units in the storage media so as to prevent the media from damaging; BBM (Bad Block Management) algorithm is developed to avoid further use of damaged storage unit; ECC (Error Checking and Correcting) is developed to guarantee the reading/writing operation of the storage unit and Power Fail Safeguard is developed to protect the data from unprecedented failure of the power system. On the aspect of keeping confidential information, a wiping-out procedure will be undergone when emergency approaches isolating the information from rivals and enemies. According to the confidential degree and wiping-out time requirements, 4 modes which called Basic Purge,Rapid Purge,MilPure and Intelligent Destructive Purge are available for the purpose.
出处 《北京信息科技大学学报(自然科学版)》 2012年第4期56-58,共3页 Journal of Beijing Information Science and Technology University
基金 北京信息科技大学校基金项目(5026010938)
关键词 机载信息系统 存储安全 绝密信息防护 air-borne information system storage security security protection of strictlyconfidential information
  • 相关文献

参考文献5

二级参考文献28

  • 1潘惠芹.电子盘的设计及实现[J].计算机工程,2004,30(16):194-196. 被引量:2
  • 2韩茜,罗丰,吴顺君.高速大容量固态存储系统的设计[J].雷达科学与技术,2005,3(2):110-114. 被引量:28
  • 3叶咏辰,赵光恒.用PowerPC硬核的FPGA片上系统及在存储系统中的应用[J].电子技术(上海),2005,32(5):48-52. 被引量:3
  • 4王洪迅,赵天云,毕笃彦,王鼎.机载高速电子存储器的研究和设计[J].计算机工程与应用,2005,41(21):133-135. 被引量:5
  • 5秦岭.固态电子盘的军事应用[J].测控技术,2006,25(4):42-43. 被引量:2
  • 6Strunk J D. Self-securing Storage: Protecting Data in Compromised Systems[C]//Proc. of the 4th Symposium on Operating Systems Design and Implementation. [S. l.]: IEEE Computer Society, 2000: 195-209.
  • 7Butler K, McLaughlin S, McDaniel P. Non-volatile Memory and Disks: Avenues for Policy Architectures[C]//Proc. of the 1st Computer Security Architecture Workshop. Alexandria, VA, USA: IEEE Computer Society, 2007:51-57.
  • 8Jayaram H. The Impact of Smart Disks and Spatial Reuse Property on RAID-5 Storage Systems[C]//Proceedings of the 1998 ICPP Workshops on Architectural and OS Support for Multimedia Applications/Flexible Communication Systems/Wireless Networks and Mobile Computing. [S.l.]: IEEE Press, 1998: 21-28.
  • 9Keeton K, Patterson D A, Hellerstein J M. A Case for Intelligent Disks[J]. SIGMOD Record, 1998, 27(3): 42-52.
  • 10Suh C4 Clarke D, Gassend B, et al. AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing[C]//Proe. of the 17th International Conference on Computing. San Francisco, CA, USA: [s. n.], 2003: 160-171.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部