Study on Protection Mechanism of Information Security in an Intranet Based on Trusted Computing

The leak of information in the intranet has been increasing more and more with each passing day, the securities of intranet information have been under severe threat. According to the demand of intranet information security and the intranet security model, this paper studies the protection mechanisms of the information security for a trusted intranet, including the establishment of trust chain, the trust protection of processes, the dynamic encryption and decryption, and the security of data storage. Based on the trusted computing theory, this paper puts forward the solutions for establishing trust chain, trust protection of process, storage security and access authentication of user terminal etc.; thus a trinity information security system for an intranet, including the computer terminals, files, and the users, has been developed. The intranet information security will be improved by the comprehensive protection system.

[1]  Erdem Uçar,et al.  The positive outcomes of information security awareness training in companies - A case study , 2009, Inf. Secur. Tech. Rep..

[2]  Yue Yu,et al.  Optimization of Program Behavior Model for Trusted Computing Dynamic Attestation , 2011 .

[3]  Said Gharout,et al.  Trusted Platform Module as an Enabler for Security in Cloud Computing , 2011, 2011 Conference on Network and Information Systems Security.

[4]  Jiang Zhi-xiang Design and implementation of hardware platform for trusted computing , 2011 .

[5]  Chao Yang,et al.  Anonymous Authentication Scheme for Wireless IP Networks under Trusted Computing , 2011 .

[6]  R. Russell,et al.  Species at risk: Data and knowledge management within the WILDSPACETM Decision Support System , 2007, Environ. Model. Softw..

[7]  Fang Ming-wei,et al.  A Trusted Portable Computing Device , 2012 .

[8]  Cédric Fournet,et al.  Compiling Information-Flow Security to Minimal Trusted Computing Bases , 2011, ESOP.

[9]  Hao Tian,et al.  A New Anonymous Authentication Method Based on One-way Accumulator , 2010, J. Convergence Inf. Technol..

[10]  Shibin Zhang,et al.  Study on Terminal Trusted Model Based on Trusted Computing , 2011 .

[11]  Andreas Leicher,et al.  Trusted computing enhanced user authentication with OpenID and trustworthy user interface , 2011 .

[12]  Yeu-Pong Lai,et al.  The implementation guidance for practicing network isolation by referring to ISO-17799 standard , 2009, Comput. Stand. Interfaces.

[13]  K. Nikus,et al.  The role of continuous monitoring in a 24/7 telecardiology consultation service--a feasibility study. , 2009, Journal of electrocardiology.