Dissertation > Excellent graduate degree dissertation topics show

Research, Design and Implementation of Self-Securing Disk

Author: ZengMengZuo
Tutor: GuDaWu
School: Shanghai Jiaotong University
Course: Cryptography
Keywords: Self-securing Disk Confidentiality protection Integrity protection Access Control
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 63
Quote: 2
Read: Download Dissertation

Abstract


To guarantee the availability, confidentiality and integrity of storage data in the case that host systems or client systems are compromised, one trend of storage security is to import security functionality into the storage devices. Self-securing disk is a new direction on how to make the storage devices such as disk active and immune.We design an efficient self-securing disk architecture, which is based on traditional self-securing storage prototype S4: 1) On the confidentiality protection side,authenticated encryption mode GCM is adapted to process disk block in parallel ,and authentication latency is overlapped with disk access latency so that our scheme is more efficient and secure than Windows BitLocker. 2) On the integrity protection side, GHASH proposed in GCM is used to generate MAC which is more efficient than SHA-1, MD5. Moreover,“Minimum Integrity Verification Tree”is put forward to decrease performance loss at a maximum. 3) On the access control protection side, we propose a cryptographically featured capability based access control model, which is based on existing OSD access control model.We use hybrid hard drive as an instance to build a self-securing disk prototype which is implemented by simulation. The encryption/authentication overheads are significantly reduced due to buffer techniques and combined GCM/Flash scheme. According to the simulation results, the performance overhead is less than 18%, which is efficient and practical.

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments,TP393.08
  3. Research and Implementation of Embeded Web System Security,TP393.08
  4. Design and Implementation of Network Access Control System Based on Portal Protocol,TP393.08
  5. Design and Realization of Distributed RFID Access Control System,TP273.5
  6. Identity-Based Authentication System Research and Implementation,TN918.1
  7. Research and Application on Access Control Model Based on Workflow,TP393.08
  8. Research and Development of Single Sign-on and Authorization Manage System in Hospital Information System,TP311.52
  9. Research on Key Technologies of Role Based Joint Authorization Administration,TP393.08
  10. Research and Design of Privacy-Ontology-Based Personalized Access Control Model,TP393.08
  11. Research on Tag-Based Fine-grained Access Control Model,TP393.08
  12. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  13. Research on Role-Based Access Control in Multi-domain Authorization Management,TP393.08
  14. Design and Implementation of Security Mechanism for Layered Multicast,TP393.08
  15. The Research and Implementation of Hiding and Protecting Data in Kylin Operating System,TP393.08
  16. The Research of Plug-in Access Control Filter,TP393.08
  17. The Research of Cross-Domain Access Control,TP393.08
  18. RBAC-based Design and Implementation of Party System,TP393.08
  19. Design and Realization Authorization Management System Role-Based Access Control,TP309
  20. The Study and Application Implement of RBAC,TP393.08
  21. Research and Design of Medium Access Control in Wireless Sensor Network,TP212.9

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile