期刊文献+

基于环境感知的安全移动存储系统设计与实现 被引量:4

Design and implementation of security portable storage system based on context-aware
下载PDF
导出
摘要 基于环境感知的安全移动存储系统结合了加解密、射频识别和实体鉴别技术,确保只有授权的用户在管控区域内的合法主机上才能使用移动存储设备,实现了对不同用户和不同级别主机的访问控制;系统独有的双射频环境感知机制可以保证设备被带离管控区域时,密钥被安全地销毁。实验结果表明,该安全移动存储系统达到了设计要求,各项功能稳定,有效地保障了设备内的数据安全。 The security portable storage system based on context-aware combines the technology of encryption, radio frequency identification (RFID) and entity authentication, which ensures that only the authorized user can use the portable storage device on the legitimate host in the controlled area, and controls the access of different users and hosts with different levels. The unique dual-RFID context-aware mechanism of the system can achieve reliable key destruction when the storage device is taken out of the controlled area. Experimental results demonstrate that the implemented system meets the design requirements, and the functions are stable, which can effectively protect the data security of the portable storage device.
出处 《计算机工程与设计》 CSCD 北大核心 2014年第4期1165-1171,共7页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2012AA013104 2013AA01A214) 中国科学院战略性先导专项子课题海云信息安全共性关键技术研究基金项目(XDA06010702)
关键词 移动存储设备 安全 环境感知 加解密 射频识别 访问控制 portable storage device security context-aware encryption radio frequency identificatiom access control
  • 相关文献

参考文献10

  • 1Study: Companies lose millions from missing memory sticks [EB/OL]. [2013-06-26]. http://www, cio. com. au/article/ 396622/study_companies_.lose_millions from missing memory _sticks/.
  • 2Li Yamin, Shi Lin. Design and implementation of encryption filter driver for USB storage devices [C] //IEEE Fourth Inter- national Symposium on Computational Intelligence and Design, 2011 : 356-359.
  • 3Chen Hanlin. The single-chip solution of embedded USB en- cryptor [C] //IEEE International Conference on Information Theory and Information Security, 2010: 42-45.
  • 4Yang Fuw-Yi, Wu Tzung-Da, Chiu Su-Hui. A novel mutual au- thentication scheme for USB storage devices [C] //Proceedings ofthe llth International Conference on Information Integration and Web-based Applications & Services, 2009: 410-413.
  • 5Lee Sun-Ho, Yim Kang-Bin, Lee Im-Yeong. A secure solu- tion for USB flash drives using FAT file system structure [C] //13th International Conference on Network-Based Infor- mationSystems, 2010: 487-492.
  • 6李为,刘嘉勇.一种基于分区引导扇区控制的移动存储介质安全控制方法[J].成都信息工程学院学报,2007,22(1):92-97. 被引量:10
  • 7Kevin RB Butler, Stephen E McLaughlin, Patrick D McDaniel. Protecting portable storage with host validation [C] //Pro-ceedings of the 17th ACM Conference on Computer and Com- municationsSecurity, 2010: 651-653.
  • 8Kevin RB Butler, Stephen E McLaughlin, Patrick D McDaniel. Kells.. A protection framework for portable data [C] //Pro- ceedings of the 26th Annual Computer Security Applications Conference, 2010: 231-240.
  • 9Takesue Masaru. A scheme for protecting the information lea- kage via portable devices[C] //The International Conference on Emerging Security Information, Systems, and Technologies, 2007: 54-59.
  • 10Seifert Julian, De Luca Alexander, Conradi Bettina, et al. TreasurePhone: Context-sensitive user data protection on mo- bile phones [C] //Proceedings of Pervasive Computing, 2010: 130-137.

二级参考文献2

  • 1北亚数据恢复站.FAT文件系统原理[EB/OL].http://www.sjhf.net/Article/Index.html,2004.
  • 2VC++实现Win2000下直接读写磁盘扇区[EB/OL].http://www.vczx.com/article/list.php,2004.

共引文献9

同被引文献26

  • 1程晨,沙泉.基于VB和MC35模块的短信收发程序设计[J].上海应用技术学院学报(自然科学版),2007,7(3):209-212. 被引量:3
  • 2于高尚,苏领松,姚长远.加密硬盘技术发展研究[J].保密科学技术,2012(7):21-23. 被引量:1
  • 3MüLLER T,FREILING F C,DEWALD A.TRESOR runs encryption securely outside RAM. USENIX Security Symposium . 2011
  • 4Lee Sun-Ho,Yim Kang-Bin,Lee Im-Yeong.A secure solution for USB flash drives using FAT file system structure. 13th International Conference on Network-Based Information Systems . 2010
  • 5G?TZFRIED J,MüLLER T.Mutual authentication and trust bootstrapping towards secure disk encryption. ACM Transactions on Graphics . 2014
  • 6MüLLER T,LATZO T,FREILING F C.Self-encrypting disks pose self-decrypting risks. Annual Computer Security Applications Conference (ACSAC) . 2011
  • 7IRONKEY.Iron Key Is The First And Only USB Storage Device To Achieve FIPS 140-2,Level 3 Validation(OL)http://www.science20.com/print/55663 .
  • 8CARBONE R,BEAN C,SALOIS M.An in-depth analysis of the cold boot attack. . 2011
  • 9Yang Fuw-Yi,Wu Tzung-Da,Chiu Su-Hui.A novel mutual authentication scheme for USB storage devices. Proceedings of the 11th International Conference on Information Integration and Web-based Applications&Services . 2009
  • 10GORDON L A,LOEB M P,LUCYSHYN W,et al.CSI/FBI computer crime and security survey. .

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部