期刊文献+

Linux磁盘剩余信息保护技术研究

RESEARCH ON LINUX DISK REMAINING INFORMATION PROTECTION TECHNOLOGY
下载PDF
导出
摘要 针对Linux剩余信息安全删除目前存在的耗时问题,设计一种基于LKM的加密安全删除方法。该方法通过LKM的形式利用系统调用劫持来修改unlinkat系统调用的逻辑,可以减少上下文切换及数据拷贝次数。针对大文件且I/O次数少的场景,添加加密模块实现文件头和文件体不同粒度的删除,可以减少总体的覆写次数,使得整体的安全删除性能有所提升。通过实验证明基于LKM的加解密剩余信息保护功能是可用的。 Aiming at the current time-consuming problem of the safe deletion of the remaining information in Linux,an encryption safe deletion method based on LKM was designed. This method used system call hijacking in the form of LKM to modify the logic of the unlinkat system call,which reduced context switching and data copy times. For scenarios with large files and few I/O times,the encryption module was added to implement the deletion of file headers and file bodies with different granularities,which reduced the overall number of overwrites and improved the overall secure deletion performance. Experiments prove that the LKM-based encryption and decryption residual information protection function is available.
作者 陈莉君 田野 郑华利 Chen Lijun;Tian Ye;Zheng Huali(School of Computer Science and Technology, Xi' an University of Posts and Telecommunications, Xi' an 710121, Shaanxi, China)
出处 《计算机应用与软件》 北大核心 2018年第6期325-329,共5页 Computer Applications and Software
关键词 剩余信息 安全删除 LKM 加解密 LINUX内核 Remaining information Safe deletion LKM Encryption and decryption Linux kernel
  • 相关文献

参考文献3

二级参考文献9

  • 1徐国栋,白英彩.加密文件系统在Windows下的实现[J].微型电脑应用,2006,22(5):56-58. 被引量:5
  • 2沈士根.EFS的研究与安全性分析[J].微计算机信息,2006,22(08X):96-98. 被引量:6
  • 3ZADOK E,BADULESCU I,SHENDER A.Cryptfs:A stackable mode level encryption file system,CUCS-021-98[R].New York:Columbia University,Computer Science Department,1998.
  • 4HALCROW M A.eCryptfs:An enterprise-class cryptagraphic filesystem for Linux[EB/OL].[2009-08-22].http://www.dubeyko.com/development/FileSystems/eCryptfs/ecryptfs.pdf.
  • 5IEEE/ANSI Draft Std.1003.1e.Draft standard for information technology-POSIX Part 1:System API:Protection,audit and control interface[S].IEEE,1997.
  • 6Simson L. Garfinkel. Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable[D]. MASSACHUSETTS INSTITUTE OF TECHNOLOGY,2003.
  • 7侯俊杰.深入浅出MFC(第二版)[M].华中科技大学出版社,2002..
  • 8朱珍民,黎慧,魏丕武,吴思.硬盘数据逻辑结构及其数据恢复[J].湘潭大学自然科学学报,2000,22(2):12-16. 被引量:9
  • 9宋立新,李善平.利用LKM提高Linux系统的安全性[J].计算机应用研究,2000,17(8):103-105. 被引量:4

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部