期刊文献+

基于对称加密的透明数字文件保密柜系统 被引量:4

The Digital File Confidential Cabinet Based on Symmetric Encryption
下载PDF
导出
摘要 目前信息安全是计算机领域内讨论热烈的话题,为了让计算机使用者和管理者更好地对自己的文件数据进行保护,文章提出了一种电子文件保密机制,设计了基于对称加密算法的数字文件保密柜,用以保护本地文件内容不受到未经授权者的非法获取。数字文件保密柜为用户提供一种较为安全的保护机制,在用户透明地读写文件的同时对文件进行加密保护,且位于数字文件保密柜中的文件只可在本地计算机使用,异地使用则发生错误,防止敏感文件被恶意复制与传输。数字文件保密柜节省了用户对文件的安全管理,简化了一般加密软件的使用过程,提供了良好的抗破解性能。数字文件保密柜实现了一种不依赖于第三方的自主安全性,同时也可在公安网发展的过程中对其安全性保障起到积极促进的作用。 Information security has become a heated topic in the field of computer science.In order to facilitate the users and managers of computer to protect their data better, this paper proposed a confidential mechanism for digital files. A digital file confidential cabinet based on symmetric encryption algorithm was designed to protect the local files from illegal acquisition by unauthorized persons. The digital file confidential cabinet provided a more secure protection mechanism for the users. The user could read and write a file transparently and encrypt this file at the same time. To protect sensitive files from being maliciously copied and transferred, the files located in the digital file confidential cabinet can only be used in the local computer while errors will occur in the remote use. The digital file confidential cabinet saves the safety management of the users on the file, simplifies the process of encryption software, and provides good performance of anti-crack. The digital file confidential cabinet provides an independent safety which is not rely on the third parties, but also plays a positive role in promoting its security in the process of the development of the public security intranet.
作者 王威 黄淑华 WANG Wei;HUANG Shuhua(Information Technology and Cyber Security Institution,People’s Public Security University of China,Beijing 102623,China;Safety Precaution Laboratory of Ministry of Public Security,Beijing 102623,China)
出处 《信息网络安全》 CSCD 北大核心 2021年第12期19-24,共6页 Netinfo Security
基金 国家自然科学基金青年项目[61602489] 中国人民公安大学基本科研业务费重点项目[2021JKF209]。
关键词 文件异地保护 数字文件保密柜 数据泄露 对称加密 重编DES算法 file off-site protection digital file confidential cabinet data leakage symmetric encryption DES algorithm reprogramming
  • 相关文献

参考文献6

二级参考文献28

  • 1鲁宾尼.LINUX设备驱动程序[M].中国电力出版社,2000..
  • 2PC/104 Embedded Consortium, PC104 Specification, August 2001
  • 3Chaum D,van Heyst E, Group signatures [C] //Proc of the10th Annual Int Conf on Theory and Application ofCryptographic Techniques. New York: ACM, 1991 : 257 -265.
  • 4Boneh D, Boyen X,Shacham H. Short group signatures[C] //Proc of the 24th Annual Int Cryptology Conference.New York: ACM, 2004* 41-55.
  • 5Kim D, Choi J, Jung S. Mutual identification and keyexchange scheme in secure VANETs based on groupsignature [C] //Proc of the 7th Consumer Communicationsand Networking Conference. Piscataway, NJ: IEEE,2010:1-2.
  • 6Guo J, Baugh J, Wang S. A group signature based secureand privacy-preserving vehicular communication framework[C] //Proc of 2007 Mobile Networking for VehicularEnvironments. Piscataway, NJ : IEEE, 2007 : 103-108.
  • 7Zhang J, Ma L, Su W, et al. Privacy-preservingauthentication based on short group signature in vehicularnetworks [C] //Proc of the 1st Int Symp on Data, Privacyand E-Commerce. Piscataway, NJ: IEEE, 2007 : 138-142.
  • 8Liu Hui, Li Hui,Ma Zhanxin. Efficient and secureauthentication protocol for VANET [C] //Proc of Int Conf onComputational Intelligence and Security (CIS). Piscataway,NJ: IEEE, 2010: 523-527.
  • 9Othman H,Hashim H, et al. A conceptual frameworkproviding Direct Anonymous Attestation (DAA) protocol intrusted location-based services (LBS) [C] //Proc of the 5thInt Conf for Internet Technology and Secured Transactions(ICITST). Piscataway,NJ: IEEE, 2010: 1-7.
  • 10Daniel S,Stefan R. Anonymous but authorized transactionssupporting selective traceability [C] //Proc of the 5th IntConf on Security and Cryptography ( SECRYPT ).Piscataway? NJ: IEEE, 2010; 1-10.

共引文献257

同被引文献40

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部