Advertisement

Research and Design of Mobile Storage Monitoring Based on File Filter Driver

  • Bo HeEmail author
  • An Zhou
  • Chao Hu
  • Duan Liang
  • Zhizhong Qiao
  • Zhangguo Chen
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 905)

Abstract

In order to deal with the problem that the confidential information in the intranet is easily leaked, the method based on file filter driver is used for mobile storage monitoring to solve such problem. Through the close relationship between the file filter driver and other components of the operating system, we expound the principle of file filter driver. Except that, we discuss about the reason why the file filter driver is applied to the control of mobile storage device. Besides, the file filter technology related to this is elaborated. On this basis, we probably design a mobile storage monitoring system based on file filter driver.

Keywords

Mobile storage monitoring File filter driver Intranet 

References

  1. 1.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRefGoogle Scholar
  2. 2.
    Yu, J., Yang, Y.J., Zhao, X.Y.: Based filter driver design and implementation. Microcomputer 23(9), 97–98 (2007). (In Chinese)Google Scholar
  3. 3.
    Qin, J., Wang, B.L.: Drive-based mobile media management system. Comput. Digit. Eng. 38(4), 113–114 (2010). (In Chinese)Google Scholar
  4. 4.
    Zhou, J.X., Cai, W.D.: USB storage device monitoring system based on WDF filter driver. Comput. Digit. Eng. 32(3), 42–44 (2010). (In Chinese)Google Scholar
  5. 5.
    Li, J.S., Shu, H., Dong, W.Y.: Driveline based storage device security monitoring technology. Comput. Eng. 34(8), 255–257 (2008). (In Chinese)Google Scholar
  6. 6.
    Zhang, J.W., Luo, H., Qiao, X.D.: Design and implementation of real-time monitoring system for mobile storage devices based on file filtering. Commun. Technol. 42(2), 283–285 (2009). (In Chinese)Google Scholar
  7. 7.
    Frincke, D.: Balancing cooperation and risk in intrusion detection. ACM Trans. Inf. Syst. Secur. 3(1), 1–29 (2000)CrossRefGoogle Scholar
  8. 8.
    Liu, H.X., Xiao, S.: Designing WDM device driver I/O Synchronized sampler time-code generator. Chin. J. Sens. Actuators 17(4), 700–703 (2004)MathSciNetGoogle Scholar
  9. 9.
    Jandura, P., Cernohorsky, J., Richter, A.: Electric drive and energy storage system for industry modular mobile container platform, feasibility study. IFAC Papers On Line 49(25), 448–453 (2016)CrossRefGoogle Scholar
  10. 10.
    Wang, A., Li, Z., Yang, X.: New attacks and security model of the secure flash disk. Math. Comput. Model. 57(11–12), 2605–2612 (2013)CrossRefGoogle Scholar
  11. 11.
    Gorman, M.: Mobile storage set up helps these A/C techs in the field. Prof. Tool Equipment News 27(5), 54 (2016)Google Scholar
  12. 12.
    He, D., Kumar, N., Lee, J.H.: Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consum. Electron. 60(1), 30–37 (2014)CrossRefGoogle Scholar
  13. 13.
    Aminzadeh, N., Sanaei, Z., Ab Hamid, S.H.: Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues. Simul. Model. Pract. Theory 50, 96–108 (2015)CrossRefGoogle Scholar
  14. 14.
    Wenge, C., Guo, H., Roehrig, C.: Measurement-based harmonic current modeling of mobile storage for power quality study in the distribution system. Arch. Electr. Eng. 66(4), 801–814 (2015)CrossRefGoogle Scholar
  15. 15.
    Vasiliev, L.L., Kanonchik, L.E., Tsitovich, A.P.: Adsorption system with heat pipe thermal control for mobile storage of gaseous fuel. Int. J. Therm. Sci. 120, 252–262 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Bo He
    • 1
    Email author
  • An Zhou
    • 1
  • Chao Hu
    • 2
  • Duan Liang
    • 3
  • Zhizhong Qiao
    • 2
  • Zhangguo Chen
    • 2
  1. 1.China Southern Power Grid Co., Ltd.GuangzhouChina
  2. 2.NARI Information & Communication Technology Co., Ltd.NanjingChina
  3. 3.Dingxin Information Technology Co., Ltd.GuangzhouChina

Personalised recommendations