Destruction strategy for disks based on AES encrypted storage

For the requirement of destroying sensitive data in the disk in emergency,combined with the AES encryption algorithm,a strategy of fast destruction of disks based on encrypted storage was proposed.The principle,method and basis of the strategy were discussed in detail.Through this strategy,sensitive...

Full description

Saved in:
Bibliographic Details
Main Authors: You YU, Yu FU, Xiaoping WU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018030
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850092364639502336
author You YU
Yu FU
Xiaoping WU
author_facet You YU
Yu FU
Xiaoping WU
author_sort You YU
collection DOAJ
description For the requirement of destroying sensitive data in the disk in emergency,combined with the AES encryption algorithm,a strategy of fast destruction of disks based on encrypted storage was proposed.The principle,method and basis of the strategy were discussed in detail.Through this strategy,sensitive data in the disk can be destroyed quickly,efficiently and safely.
format Article
id doaj-art-e183d6c428724a4eb2cd52429a082ed6
institution DOAJ
issn 2096-109X
language English
publishDate 2018-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-e183d6c428724a4eb2cd52429a082ed62025-08-20T02:42:08ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-04-014727659553261Destruction strategy for disks based on AES encrypted storageYou YUYu FUXiaoping WUFor the requirement of destroying sensitive data in the disk in emergency,combined with the AES encryption algorithm,a strategy of fast destruction of disks based on encrypted storage was proposed.The principle,method and basis of the strategy were discussed in detail.Through this strategy,sensitive data in the disk can be destroyed quickly,efficiently and safely.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018030disk destructionAES algorithmrewrite technologyencryption and decryption technology
spellingShingle You YU
Yu FU
Xiaoping WU
Destruction strategy for disks based on AES encrypted storage
网络与信息安全学报
disk destruction
AES algorithm
rewrite technology
encryption and decryption technology
title Destruction strategy for disks based on AES encrypted storage
title_full Destruction strategy for disks based on AES encrypted storage
title_fullStr Destruction strategy for disks based on AES encrypted storage
title_full_unstemmed Destruction strategy for disks based on AES encrypted storage
title_short Destruction strategy for disks based on AES encrypted storage
title_sort destruction strategy for disks based on aes encrypted storage
topic disk destruction
AES algorithm
rewrite technology
encryption and decryption technology
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018030
work_keys_str_mv AT youyu destructionstrategyfordisksbasedonaesencryptedstorage
AT yufu destructionstrategyfordisksbasedonaesencryptedstorage
AT xiaopingwu destructionstrategyfordisksbasedonaesencryptedstorage