期刊文献+

基于信息系统容灾技术的数据存储脆弱性分析 被引量:1

Data Stored Vulnerability Analysis of the Disaster Recovery Technology Based on the Information Systems
下载PDF
导出
摘要 论文针对近几年迅速发展的信息系统远程容灾技术进行数据存储结构的脆弱性分析,对目前仍在普遍采用的DAS、NAS和SAN技术以及新近发展的IP存储技术进行简单的介绍,并提出对这些数据存储技术给容灾系统带来的安全威胁的看法,分析现有的容灾技术所存在的安全隐患,提出通过层叠文件系统技术对容灾系统添加透明加密层的方案,为容灾系统的进一步开发和对已有系统的改进提供新的思路。 This paper have done a vulnerability analysis on the data storage structure of the remote disaster recovery technology based on the information system,and briefly introduced DAS,NAS and SAN technology,as well as the IP storage technology which developed quickly in recent years.This paper also pointed out security threats of disaster recovery systems brought by these technologies,and analyzed the security risks that exist in the current disaster recovery technology.Propose to add a layer of transparent cryptographic by stacking technology file system for disaster recovery system program.Finally a new ideas is provided for the further development of disaster recovery systems and the improvement of existing systems.
出处 《计算机与数字工程》 2013年第5期794-796,815,共4页 Computer & Digital Engineering
基金 2011年全军军事学研究生课题(编号:2011JY002-436)资助
关键词 容灾系统 数据存储安全 数据存储技术 安全威胁 透明加密 disaster recovery system data storage security data storage technology security threats transparent cryptographic
  • 相关文献

参考文献8

二级参考文献32

  • 1谢长生,黄建忠,刘朝斌.堆叠式文件系统的研究及其在NAS整合中的实现[J].小型微型计算机系统,2005,26(3):515-518. 被引量:4
  • 2iSCSI,Julian Satran,Kalman Meth et al.http://www.ietf.org/internetdrafts/draft-ietf-ips-iscsi-20.txt,2003-01
  • 3Robert Eckstein,David Collier-Brown,Peter Kelly.Using Samba(First Edition)[M].O'Reilly Publishion,1999-11
  • 4Tavis Barr,Nicolai Langfeldt,Seth Vidal et al.Linux NFS-HOWTO.2002-08
  • 5Marc Farley.Building Storage Networks(Second Edition)[M].MC Graw Hill Publishion,2001-05
  • 6LVM Howto,AJ Lewis.Sistina Software.http://www.sistina.com,2003-02
  • 7Jakob Φstergaard.The Software-RMD Howto,2000-01
  • 8Mazieres D, Kaminsky M, Kaashoek M F, et al. Separating Key Management from File System Security[C]//Proc. of the 17th ACM Symposium on Operating Systems Principles. Kiawah Island Resort, SC, USA: [s. n.], 1999.
  • 9Cattaneo G, Catuogno L, Sorbo A D, et al. The Design and Implementation of a Transparent Cryptographic Filesystem for UNIX[C]//Proc. of the Annual USENIX Technical Conference. Boston, Massachusetts, USA: [s. n.], 2001.
  • 10Wright C R Martino M C, Zadok E. NCryptfs: A Secure and Convenient Cryptographic File System[C]//Proc. of General Track of the USENIX 2003 Annual Technical Conference. San Antonio, Texas, USA: [s. n.], 2003.

共引文献25

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部