Destruction strategy for disks based on AES encrypted storage
For the requirement of destroying sensitive data in the disk in emergency,combined with the AES encryption algorithm,a strategy of fast destruction of disks based on encrypted storage was proposed.The principle,method and basis of the strategy were discussed in detail.Through this strategy,sensitive...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2018-04-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018030 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850092364639502336 |
|---|---|
| author | You YU Yu FU Xiaoping WU |
| author_facet | You YU Yu FU Xiaoping WU |
| author_sort | You YU |
| collection | DOAJ |
| description | For the requirement of destroying sensitive data in the disk in emergency,combined with the AES encryption algorithm,a strategy of fast destruction of disks based on encrypted storage was proposed.The principle,method and basis of the strategy were discussed in detail.Through this strategy,sensitive data in the disk can be destroyed quickly,efficiently and safely. |
| format | Article |
| id | doaj-art-e183d6c428724a4eb2cd52429a082ed6 |
| institution | DOAJ |
| issn | 2096-109X |
| language | English |
| publishDate | 2018-04-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-e183d6c428724a4eb2cd52429a082ed62025-08-20T02:42:08ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-04-014727659553261Destruction strategy for disks based on AES encrypted storageYou YUYu FUXiaoping WUFor the requirement of destroying sensitive data in the disk in emergency,combined with the AES encryption algorithm,a strategy of fast destruction of disks based on encrypted storage was proposed.The principle,method and basis of the strategy were discussed in detail.Through this strategy,sensitive data in the disk can be destroyed quickly,efficiently and safely.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018030disk destructionAES algorithmrewrite technologyencryption and decryption technology |
| spellingShingle | You YU Yu FU Xiaoping WU Destruction strategy for disks based on AES encrypted storage 网络与信息安全学报 disk destruction AES algorithm rewrite technology encryption and decryption technology |
| title | Destruction strategy for disks based on AES encrypted storage |
| title_full | Destruction strategy for disks based on AES encrypted storage |
| title_fullStr | Destruction strategy for disks based on AES encrypted storage |
| title_full_unstemmed | Destruction strategy for disks based on AES encrypted storage |
| title_short | Destruction strategy for disks based on AES encrypted storage |
| title_sort | destruction strategy for disks based on aes encrypted storage |
| topic | disk destruction AES algorithm rewrite technology encryption and decryption technology |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018030 |
| work_keys_str_mv | AT youyu destructionstrategyfordisksbasedonaesencryptedstorage AT yufu destructionstrategyfordisksbasedonaesencryptedstorage AT xiaopingwu destructionstrategyfordisksbasedonaesencryptedstorage |