期刊文献+

一种安全增强的容灾数据保护体制研究 被引量:1

A Study on Security Enhancement Technology for Disaster Tolerant System
下载PDF
导出
摘要 本文在利用可信计算技术的基础上,结合分布式门限存储思想,提出了一种容灾系统的安全增强体制。该体制引用了嵌有可信平台模块的可信计算平台,这种具有安全存储、远程证明等优势特性的平台有效保证了容灾终端的高可信性;为了保障信息数据的存储安全性,则采用基于Erasure码的分布式门限存储的安全增强技术,该技术不仅能解决海量数据的存储问题,而且可以较好地防止单点失效、减轻在容灾过程中网络负载以及解决联合欺骗等安全问题。因此,通过应用这些安全增强技术,可以为容灾系统中的海量数据提供全面的安全保护。 A kind of data protection scheme based on trusted computing is proposed, which combines trusted computing with distributed store. This scheme takes advantage of trusted computing platform with trusted computing module, wbicb is provided with such excellent lfeatures as security storage, remote attestation, and so on. Those features solve the problem whether the terminal of tolerance disaster is trustworthy; Furthermore, distributed storage based on Erasure code not only disposes the problem about a great deal of data, but also preferably avoids one node's invalidation, alleviates network load and deals with joint cheat. So, those security enhancement technologies provide the perfect protection witb mass data during the course of disaster tolerance.
出处 《微计算机信息》 2009年第24期44-46,共3页 Control & Automation
关键词 可信计算 门限存储 安全增强 Erasure码 Trusted computing Threshold storage Security enhancement Erasure code
  • 相关文献

参考文献2

二级参考文献74

  • 1张晓娟,杨世松.硬盘数据恢复在信息安全应急响应中的应用[J].微计算机信息,2006,22(04X):49-51. 被引量:4
  • 2Stinson D R,Strobl R.Provably secure distributed schnorr signatures and a (t,n) threshold scheme for implicit certificates [A].ACISP 2001 [C].Australia:ACISP,2001. 被引量:1
  • 3Damgrd I,Koprowski M.Practical threshold RSA signatures without a trusted dealer [A].LNCS,2045 [C].Springer-Verlag,Berlin:LNSC,2001. 被引量:1
  • 4Hirt M,Maurer U.Robustness for free in unconditional multi-party computation [A].LNCS,2139 [C].Springer-Verlag,Berlin:LNCS.2001. 被引量:1
  • 5Cramer R,Damgrd I.Secure distributed linear algebra in a constant number of rounds [A].LNCS,2139 [C].Springer-Verlag,Berlin:LNCS,2001. 被引量:1
  • 6Ayako Maeda,Atsuko Miyaji,and Mitsuru Tada.Efficient and unconditionally secure verifiable threshold changeable scheme [A].ACISP 2001 [C].Australia:ACISP,2001. 被引量:1
  • 7He J,Dawson E.Multisecret-sharing scheme based on one-way function [J].Electron.Lett.,1995,31(2):93-95. 被引量:1
  • 8Shamir,A.How to share a secret[J].Communications of the ACM,1979,24(11):612-613. 被引量:1
  • 9Blakley,G R Safeguarding cryptographic keys [A].Proceedings of the National Computer Conference[C],Montvale:NCC,1979. 被引量:1
  • 10Karnin E D.,Green J W.,Hellman M E.,On secret sharing systems [J].IEEE Trans.,1983,IT-29(1):35-41. 被引量:1

共引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部