期刊文献+

TRSF:一种移动存储设备主动防护框架 被引量:2

TRSF:Implementing Active Removable Storage Protection via Trusted Virtual Domains
在线阅读 下载PDF
导出
摘要 移动存储设备属于被动设备,其安全防护往往依赖于终端系统的安全机制,在提供安全性的同时会降低系统可用性.本文提出了一种基于可信虚拟域的移动存储设备结构框架TRSF(TrustedRemovable StorageFramework)实现存储设备的主动防护.TRSF将智能卡芯片和动态隔离机制绑定到存储设备中,并由片上操作系统构建从底层可信平台模块到隔离运行环境的可信数据通道,从而为移动存储设备在非可信终端系统中被非可信进程访问和使用提供一个可信虚拟环境.最后基于TRSF实现了一款主动安全U盘UTrustDisk.与没有增加主动防护机制相比,增加该机制导致平均读写性能开销分别增加了7.5%和11.5%. As removable storage medias are passive devices, their security policies depend on mechanisms in connected terminal systems, which will reduce the availability while providing security. This paper presents TRSF, a framework of removable stor- age based on trust virtual domain to implement active protection. TRSF solidifies a smart card and an isolation mechanism into the storage device and builds trust data channels from the device to the isolated usage environment in terminal system. So TRSF is able to provide trust virtual environment for data access and usage of removable storage even in untrust terminal systems by untrust processes. We implement an intelligent USB disk based on TRSF called UTmstDisk to evaluate the framework. The average overhead on read and write caused by mast chain mechanism is 7.5 % and 11.5 %.
出处 《电子学报》 EI CAS CSCD 北大核心 2012年第2期376-383,共8页 Acta Electronica Sinica
基金 国家自然科学基金青年基金(No.60903240) 核高基重大专项(No.2010ZX01045-001-002-5)
关键词 可信虚拟域 主动防护 可信存储 信任链 隔离 片上操作系统 masted virtual domains (TVDs) active protection trusted storage mast chain isolation chip operation system
作者简介 马俊 男,1982年生,博士研究生,中国计算机学会学生会员,主要研究方向为数据安全和系统安全.E-Mml:majun_nudt@sohu.com 王志英 男,1956年生,教授,博士生导师,中国计算机学会高级会员,主要研究方向为先进计算机体系结构、微处理器设计技术研究、信息安全及异步电路设计等.
  • 相关文献

参考文献30

  • 1TRUECRYPT.TrueCrypt volume[EB/OL].http://www.truecrypt.org/docs,2010-07-09.
  • 2MICROSOFT.BitLocker drive encryption[EB/OL].http://windows.microsoft.com/en-us/windows7/products/features/bitlocker,2010-07-09.
  • 3McAfee.Data loss prevention[EB/OL].www.mcafee.com/us/enterprise/products/data _ protection/data _ loss _ prevention /index.html,2010-07-09.
  • 4VERDASYS.Mobile data protection & remote media encryption[EB/OL].www.verdasys.com/Mobile_ Data_ Protection_Encryption.php,2010-07-09.
  • 5曾文英 赵跃龙 宋玮 等.个人存储管理策略研究.计算机研究与发展,2009,46:96-101.
  • 6Michael Fabian.Endpoint security:Managing USB-based removable devices with the advent of portable applications[A].In InfoSecCD' 07:Proceedings Security Curriculum Development[C].New York:ACM,2007.1-5.
  • 7Hyeran Lim,Vikram Kapoor,Chirag Wighe.Active disk file system:A distributed,scalable file system[A].Proceedings of the Eighteenth IEEE Symposium[C].Washington,DC:IEEE Computer Society,2001.101-114.
  • 8KimberlyKeeton,David A.Patterson,Joseph M.Hellerstein.A case for intelligent disk[A].ACM SIGMOD Record[C].New York:ACM,1998.
  • 9John D Strunk,Garth R Goodson,Michael L Scheinholtz,et al.Self-securing storage:Protecting data in compromised systems[A].Proc of the 4th Symposium on Operating Systems Design and Implementation[C].Berkeley,CA:USFNIX Association,2000.12-26.
  • 10靳超,郑纬民,张悠慧.主动存储系统结构[J].计算机学报,2005,28(6):1013-1020. 被引量:4

二级参考文献35

  • 1孙海燕,王晓东,周斌,贾焰,王怀民,邹鹏.基于存储联盟的双层动态副本创建策略—SADDRES[J].电子学报,2005,33(7):1222-1226. 被引量:15
  • 2CERN openlab boosts the performance of LHC computing.http://public.web.cern.ch/public/en/SpotlightsGrid-081008-en.html,2008-10-06.
  • 3Deng Y H,Wang F,Na H L,et al.Dynamic and scalable storage management architecture for grid oriented storage devices[J].Parallel Computing,2008,34(1):17-31.
  • 4Rahman R M,Barker K,Alhajj R,Replica selection in grid environment:A data-mining approach.Proceedings of the 2005 ACM Symposium on Applied Computing.New York:ACM,2005.695-700.
  • 5Ranganathan K,Foster I,Computation scheduling and data replication algorithms for data grids.ftp://info.mcs.anl.gov/pub/tech-reports/reports/P1081.pdf,2003.
  • 6Chakrabarti A,Dheepak R A,Sengupta S,Integration of scheduling and replication in data grids.LNCS3296.Berlin:Springer-Verlag,2004.375-385.
  • 7Tang M,Lee B S,Tang X et al.The impact of data replication on job scheduling performance in the data grid[J].Future Generation Computer Systems,2006,22(3):254-268.
  • 8Chang R S,Chang J S,Lin S Y,Job scheduling and data replication on data grids.Future Generation Computer Systems,2007,23(7):846-860.
  • 9Orlandic R,Effective management of hierarchical storage using two levels of data clustering.Proc 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies.USA:IEEE Computer Society,2003.270-279.
  • 10Denning P J,Virtual memory[J].Computing Survey,1970,2(3):153-189.

共引文献21

同被引文献36

  • 1于泠,陈波,肖军模.多策略的工作流管理系统访问控制模型[J].系统工程理论与实践,2009,29(2):151-158. 被引量:4
  • 2张功萱,沈创业,王平立,王玲.移动存储信息的信任链动态跟踪技术研究[J].计算机研究与发展,2011,48(S1):37-42. 被引量:3
  • 3任建华,江国华.终端文件安全保障系统中剪贴板监控技术的应用[J].计算机应用,2005,25(B12):86-88. 被引量:8
  • 4吴世忠,石超英.一种智能卡和U盘复合设备及其与计算机通信的方法[P].中国专利:CN200710000328.3,2007-01-08.
  • 5IEEE Computer Society.IEEE Standard for Authentication in HostAttachments of Transient Storage Devices[S].2010.
  • 6HALSEY M.Beginning Windows 8[M].Berkeley,CA:Apress,2012.
  • 7GFI White Paper.Pod Slurping-an Easy Technique for Stealing Data[R].2011.
  • 8BERGHEL H.WikiLeaks and the matter of private manning[J].Com-puter,2012,45(3):70-73.
  • 9LANDAU S.Making sense from snowden:what’s significant in theNSA surveillance revelations[J].IEEE Security & Privacy,2013,11 ⑷:54-63.
  • 10DeviceLock.Endpoint DLP suite[EB/OL].http://www.devicelock.com/dl/features.html,2013.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部