Font Size: a A A

Design And Implement Of Sensitive Information Monitor System

Posted on:2013-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2248330362970888Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The21st century is the information society, the information has attract more and more attentionas an important resource, and how to secure authorization is an important direction for informationresources management and security monitoring. Sensitive electronic documents related to the secretof the State and enterprises, will be directly related to the security and interests of the State and therelevant units. Sensitive information being stolen or destroyed will cause unpredictable direct orindirect impacts and losses. Initiative of sensitive information management and monitoring not onlybecome the focus of academic research, the attention of national defense institutes, enterprises andinstitutions.This paper first discusses the security of sensitive information access control technologydevelopment status by comparing the traditional security access control technology, and analyze theadvantages and disadvantages, then we select the usage control as our base control model, we analysisthe principle of usage control model and its advantages and disadvantages; we design a sensitiveinformation access control model based on usage control model, with the file system filter drivertechnology we achieve real-time monitoring module for document, the module can effectivelyintercept the illegal access to documents; then we analysis of the existing sensitive information filteralgorithms, based on the study of local sensitive hashing algorithm, we design an asymmetric localsensitive hashing algorithm, the algorithm can compress large documents into smaller piece, andaccelerate the speed of document retrieval. We has been completed the overall design of the safetymonitoring system for sensitive information, and realization of the monitoring system of sensitiveinformation.The work of this thesis is the real-time monitoring system for digital document and systemexperiments shows that the system with monitored host has low system usage and high practicality.Compared to the same kind of safety monitoring system, the system can be effective classify forsensitive information with high efficiency and safety. The experimental results show that the systemcan effectively prevent the leakage of sensitive information document in the monitored host, andachieve the protection of sensitive information.
Keywords/Search Tags:Information Security, Usage Control Model, Security Monitoring, Document RetrievalAlgorithms
PDF Full Text Request
Related items