期刊文献+

基于组密钥管理技术的SAN安全存储研究 被引量:3

Study of SAN secure storage based on the group key management technology
下载PDF
导出
摘要 面对一个开放的网络环境,企业核心数据容易受到非授权访问、非法修改等攻击.针对数据安全存储问题,详细论述了TGDH组密钥管理技术及其在SAN环境中的应用,讨论了基于硬件的自安全存储设备技术.将两种技术结合起来,即软件上利用TGDH组密钥管理技术,硬件上利用自安全的存储设备,则可以将数据安全提高到一个新的水平. In an open network environment, the core data of an enterprise often is often caught under non-authorized access and other attacks. In terms of the security issues in data storage, this paper mainly introduces TGDH group key management technology and its application in SAN (Storage Area Network) environment, and then discusses the self-securing storage device. Finally, the above technologies are combined by applying TGDH group key management in software and self-securing storage device in hardware to improve the data security to a new level.
出处 《西安建筑科技大学学报(自然科学版)》 CSCD 北大核心 2008年第6期841-845,共5页 Journal of Xi'an University of Architecture & Technology(Natural Science Edition)
基金 陕西省自然科学基金资助项目(2005F38) 西安建筑科技大学基础研究资助项目(JC0617)
关键词 SAN TGDH 组密钥管理 自安全存储设备 SAN TGDH group key management sel f-securing storage device
  • 相关文献

参考文献5

  • 1KIN Yongdae,MAINO Fabio, NARASIMHA Maithili,et al. Secure Group Services for Storage Area Networks[J]. Proceedings of the First International IEEE Security in Storage Workshop (SISW'02), 2003 IEEE. 被引量:1
  • 2BARKER Richard,MASSIGLIA Paul. Storage Area Network Essentials[M]. John Wiley & Sons Ine,2004. 被引量:1
  • 3BANIKAZEMI Mohammad,POFF Dan, ABALI Bulent. Storage-Based Intrusion Detection for Storage Area Networks(SANs) [M]//Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05) ,IEEE. 被引量:1
  • 4邵必林,边根庆,杨玲.自安全存储机制与设备的研究[J].西安建筑科技大学学报(自然科学版),2007,39(5):721-724. 被引量:2
  • 5杨波,张继征,贾惠波.存储设备的自安全机制[J].计算机应用研究,2006,23(4):85-87. 被引量:4

二级参考文献11

  • 1KennethRCastleman 朱志刚 译.数字图像处理[M].北京:电子工业出版社,1998.. 被引量:28
  • 2John D Strunk,Garth R Goodson,Michael L Scheinholtz,et al.Self-securing Storage:Protecting Data in Compromised Systems[C].San Diego:Symposium on Operating Systems Design and Implementation,USENIX Association,2000.165-180. 被引量:1
  • 3Adam G Pennington,John D Strunk,John Linwood Griffin,et al.Storage-based Intrusion Detection:Watching Storage Activity for Suspicious Behavior[R].Technical Report CMU-CS-02-179,Carnegie Mellon University,2002. 被引量:1
  • 4Craig A N Soules,Garth R Goodson,John D Strunk,et al.Metadata Efficiency in a Comprehensive Versioning File System[R].Technical Report CMU-CS-02-145,Carnegie Mellon University,2002. 被引量:1
  • 5John D Strunk,Garth R Goodson,Adam G Pennington,et al.Intrusion Detection,Diagnosis,and Recovery with Self-securing Storage[R].Technical Report CMU-CS-02-140,Carnegie Mellon University,2002. 被引量:1
  • 6Mombers Friederich,Dogimont StepHanie.A New Motion Estimation Algorithm-based in Adaptive Hybrid Genetic and Selective Vector Tracing[C].Proceedings of the International Conference on Image Processing,ICIP 99,1999.75-79. 被引量:1
  • 7Prasad Sistla A,Wolfson O,ChamberlainS,etal.Modeling and Querying Moving Objects[C]//Proceedings of the 13th International Conference on Data Engineering,1 997:422-432. 被引量:1
  • 8NOtsu.A Threshold Selection Method from Gray-level Histogram[J].IEEE Trans.,1979,9(1):62-66. 被引量:1
  • 9Riedel E,Kallahalla M,Swaminathan R.A Frame for Evaluating Storage System Security[R].In Proceeding of the 1st Conference on File and Storage Technologies (FAST),Monterey,CA,2002-01. 被引量:1
  • 10Wylie J,Bigrigg M,Strunk J,et al.Survivable Information Storage Systems[R].IEEE Computer,2000-08. 被引量:1

共引文献3

同被引文献27

  • 1周小燕.关于信息存储安全技术[J].焦作师范高等专科学校学报,2008,24(2):82-83. 被引量:1
  • 2蔡勇.DAS、NAS和SAN存储方案的比较[J].广播电视信息,2006,13(7):82-83. 被引量:1
  • 3DENISE RIDOLFO. IP Storage Whitepaper Final[EB/OL]. SNIA Technical Tutorials, http://www. snia. org, 2008. 被引量:1
  • 4GAUGER, C M,KOHN M, GUNREBEN, et al. Modeling and performance evaluation of ISCSI storage area networks over TCP/IP-based MAN and WAN networks[J]. Broadband Networks, 2005 2nd International Conference on Oct. 3-7, 2005:915-923. 被引量:1
  • 5WANG Y H,YEO H N,ZHU Y L,et al. Design and development of Ethernet-based storage area network protocol [J]. Networks, 12th IEEE International Conference on Volume 1,16-19 Nov. 2004:48-52. 被引量:1
  • 6MORRIS R J T, TRUSKOWSKI B J. The evolution of storage systems[J]. IBM Systems Journal, 2003,42 (2): 205-217. 被引量:1
  • 7MOLERO X, SILLA F, SANTONJA V,DUATO J. Performance analysis of storage area networks using high- speed LAN interconnects[J]. Networks, IEEE International Conference on 5-8 Sept. 2000 : 474-478. 被引量:1
  • 8TOM CLARK.存储区域网络设计-实现光纤通道和IPSAN的实用指南[M].邓劲生,李宝峰,李蕾,等译.北京:电子工业出版社,2005. 被引量:1
  • 9RICHARD BARKER,PAUL MASSIGLIA. Storage Area Network Essentials[M]. John wiley & Sons,lnc, New York. 2004. 被引量:1
  • 10WEINVIEW. Macroinstruction Manual[ G]. 2007. 被引量:1

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部