J4 ›› 2012, Vol. 34 ›› Issue (5): 58-62.
• 论文 • Previous Articles Next Articles
WU Jiangjiang,WANG Zhiying,MA Jun,REN Jiangchun,CHENG Yong,MEI Songzhu
Received:
Revised:
Online:
Published:
Abstract:
Against the risk of information leakage because of that the data is stored and used in an open network environment, this paper presents a trusted data storage architecture based on virtual isolation. The structure draws on the design idea of trusted root in the trusted computing technology, in the architecture, the credible storage root is used to verify the legitimacy of user identity and manage data access, and the data is stored with centralized encryption in the server; while the enduser use the data, the local memory and disk virtual isolation techniques are used to ensure data security, preventing nonauthorized users and processes to leak information to nonprotected areas. The security analysis and testing toward the credible data storage system based on virtual isolation which are designed and implemented in this article shows that the structure can guarantee the security of the entire life cycle including storage, use, transfer and destruction when the data locates in the open network environment.
Key words: information leakage;virtual isolation;trusted storage;trusted root;credible storage root;centralized encryption
WU Jiangjiang,WANG Zhiying,MA Jun,REN Jiangchun,CHENG Yong,MEI Songzhu. Research and Implementation of a Trusted Data Storage Technology Based on Virtual Isolation[J]. J4, 2012, 34(5): 58-62.
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2012/V34/I5/58