期刊文献+

基于入侵容忍的电子证据保护机制设计与实现

Design and Implementation of Digital Evidence Preservation Mechanism based on Intrusion Tolerance
下载PDF
导出
摘要 电子证据属于敏感信息,且种类繁多,数量巨大,如何对电子证据提供安全保障对网络取证的有效性尤为关键。文章提出了一种电子证据保护方法可防范入侵并容忍入侵。该方法主要对证据数据进行编码并分散存储,利用用户密钥自动生成编码矩阵,并采用累积校验来对分片的完整性进行保证。该方法在证据数据被部分破坏的情况下可完全恢复原始信息,并防止假冒,具有较好的安全性,而自动生成编码矩阵又大大提高了可用性。该方法也适用于大数据环境中其他敏感数据的安全存储需求。 Digital evidence belongs to sensitive information which is always varied and massive. It is especially important to protect digital evidences during process of network forensics. A novel evidences preservation mechanism is proposed which can prevent intrusion and tolerant intrusion. The core ideas of this mechanism consist of information encodeing and fragment, creating coding matrix by secret key and cumulate checksum for integrity of formation. The original information could recover from damage and prevent fake. This mechanism not only obtains securtiy but also improves usability. Further more, it also meet the security storage demand of sensitive information of bi~, data.
作者 刘平 陈琳
出处 《信息网络安全》 2013年第10期170-172,共3页 Netinfo Security
基金 信息网络安全公安部重点实验室开放课题[C13606]
关键词 网络取证 证据保护 信息分片 入侵容忍 network forensics evidence preservation information fragment intrusion tolerance
  • 相关文献

参考文献10

  • 1Bruschi, D. Monga, M. Rosti, E. Trusted Internet Forensics: design of a network forensics appliance. Proceedings of Security and Privacy for Emerging Areas in Communication Networks[C]. Workshop of the 1st International Conference, 2005:33-35.
  • 2孙波,纪建敏,孙玉芳,梁彬.电子数据证据收集系统保护机制及其发展趋势[J].计算机科学,2004,31(7):9-11. 被引量:3
  • 3孙波,孙玉芳.电子数据证据收集系统的研究与保护[J].计算机研究与发展,2005,42(8):1422-1426. 被引量:6
  • 4丁丽萍,周博文,王永吉.基于安全操作系统的电子证据获取与存储[J].软件学报,2007,18(7):1715-1729. 被引量:8
  • 5Bellare M,Yee B S. Forward Integrity For Secure Audit Logs[1L1. Tech. report. 1997, University of California, SanDiego.
  • 6Schneier B,Kellsey J, Secure Audit Logs to Support Computer Forensics[J],ACM Transaction on Information and System Securitv,1999,2(2):159 176.
  • 7Takada T. Koike H. NIGELOG : Protecting Logging Information by Hiding Multiple Backups in I)irectories[C]. Proceedings of Workshop on Electronic Commerce and Security (in conjunction with DEXA' 99) IEEE CS Press, 1999: 874-878.
  • 8Adi shamir. How to Share secret[J]. Communications of the ACM, 1979,22(11): 612-613.
  • 9Rabin, M.O. Efficient dispersal of information for security, load balancing, and fault tolerance[J]. Journal of the ACM, 1989,36(2): 335-348.
  • 10Rao T. Joint encryption and error correction schemes[J]. ACM SIGARCH Computer Architecture News, 1984, 12(3): 240-241.

二级参考文献16

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部