Research and Implementation of a Trusted Data Storage Technology Based on Virtual Isolation

WU Jiang-jiang,WANG Zhi-ying,MA Jun,REN Jiang-chun,CHENG Yong,MEI Song-zhu
DOI: https://doi.org/10.3969/j.issn.1007-130X.2012.05.012
2012-01-01
Abstract:Against the risk of information leakage because of that the data is stored and used in an open network environment,this paper presents a trusted data storage architecture based on virtual isolation.The structure draws on the design idea of trusted root in the trusted computing technology,in the architecture,the credible storage root is used to verify the legitimacy of user identity and manage data access,and the data is stored with centralized encryption in the server;while the end-user use the data,the local memory and disk virtual isolation techniques are used to ensure data security,preventing nonauthorized users and processes to leak information to non-protected areas.The security analysis and testing toward the credible data storage system based on virtual isolation which are designed and implemented in this article shows that the structure can guarantee the security of the entire life cycle including storage,use,transfer and destruction when the data locates in the open network environment.
What problem does this paper attempt to address?