期刊文献+

基于SM1算法的文件安全机制设计与实现 被引量:4

DESIGN AND IMPLEMENTATION OF SECURE FILE SCHEME BASED ON SM1 CRYPTOGRAPHIC ALGORITHM
下载PDF
导出
摘要 智能密码钥匙的物理特性和应用需求,使得必须为其文件操作系统设计专用的文件安全机制,才能有效地为芯片操作系统提供可靠的数据安全和操作,保证文件内存储数据的安全。在分析智能密码钥匙文件系统的文件结构和文件操作方法的基础上,设计基于国密SM1算法的文件安全控制机制,对文件进行多重保护。给出相应的文件存储格式、文件数据访问的加解密和校验处理方式。实验从文件访问的安全性及文件加解密的速率两方面考虑,证明基于国密SM1算法的文件安全控制机制能保证文件的数据及操作安全,且有效地提高了整个文件系统的加解密效率。 The physical properties and application requirements of intelligent USB key demand for unique file secure scheme for its file operating system. Only in this way can we provide reliable data safety and operation for chip operating system and ensure the security of the data stored in files. In this paper,based on analysing the file structure and file operating methods of intelligent USB key file system,we designed the SM1 cryptographic algorithm-based secure file control scheme to provide multiple protections for the files. Meanwhile,we also presented the corresponding file storage format,the encryption and decryption procedure of file data access and the way of check processing.By taking both the security of file accessing and the encryption / decryption efficiency into account,the experiment proved that our scheme enables secure file data accessing and operating and improved effectively the encryption / decryption performance of the entire file system.
出处 《计算机应用与软件》 CSCD 2015年第12期316-320,共5页 Computer Applications and Software
关键词 智能密码钥匙 SM1算法 文件访问控制 Intelligent USB key SM1 cryptographic algorithm File access control
  • 相关文献

参考文献9

二级参考文献50

  • 1李军,孙玉方.计算机安全和安全模型[J].计算机研究与发展,1996,33(4):312-320. 被引量:28
  • 2袁春,文振焜,张基宏,钟玉琢.基于密码学的访问控制和加密安全数据库[J].电子学报,2006,34(11):2043-2046. 被引量:11
  • 3Park J,Sandhu R.Towards Usage Control Models:Beyond Traditional Access Control[C] //Proc.of Symposium on Access Control Models and Technologies.Monterey,USA:[s.n.] ,2002:57-64.
  • 4Zhang Xinwen,Francesco P P,Sandhu R,et al.Formal Model and Policy Specification of Usage Control[J].ACM Transactions on Information and System Security,2005,8(4):351-387.
  • 5Park J,Sandhu R.The UCONABC Usage Control Model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 6Zhai Zhigang,Wang Jiandong,Mao yuguang.Study and Safety Analysis on UCONonA Model[C] //Proc.of the 1st International Workshop on Database Technology and Applications.Wuhan,China:[s.n.] ,2009:103-106.
  • 7毕晓普.计算机安全学[M].王立斌,黄征,等译.北京:电子工业出版社.2005:84-101.
  • 8MALLEY S, VANCE C, SALAMON W. Implementing SELinux as a Linux security module, NAI Labs Report JHJ01- 043 S [ R ]. 2002.
  • 9赵亮.Linux安全模块(LSM)简介[EB/OL].(2003-07-26)[2011-05-10].http://www.ibm.com/developerworks/cn/linux/1-lsm/partl/.
  • 10HARRINGTON A, JENSEN C. Cryptographic access control in a distributed file system[ C ]//Proc of the 8th ACM Symposiumon Access Control Models and Technologies. New York :ACM ,2003 : 158-165.

共引文献16

同被引文献25

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部