Research of Data Destruction System in Marine Environmental Monitoring Buoy

Article Preview

Abstract:

To solve the problem how to prevent the marine environment monitoring feature data from leaking when an emergency occurs, a destruction of data used in marine environment monitoring buoy system is researched. The architecture design of the system is introduced; a data overwrite algorithm based on the data secret level of the marine work is proposed; through data overwrite technology and the high-pressure circuit to achieve the safe destruction of data elements in marine environmental monitoring. The study shows the data destruction system can trigger data destruction procedures in real time, it can solve data security issues for marine environmental monitoring buoy in the out of control situation, and the destroyed data is unrecoverable, thus preventing data loss and leakage.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

787-792

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Shandong academy of sciences institute of Marine instruments. SBF3-1 wave buoy specification.2009.05

Google Scholar

[2] The United States Endeco/YSI company. YSI Marine environmental monitoring buoy specification.

Google Scholar

[3] Tang Di, Wei Ying. Research on the Technology of Storage Medium Data Destruction. Information security and technology,2012,03(1).

Google Scholar

[4] Wang Jian-feng. Data destruction: an important branch of the data security field. Network & Computer Secturity,2006,(8):53-54.

Google Scholar

[5] KOMAKINE T,HONDA N,OUCHI K. Analysis of overwrite spectrum in perpendicular magnetic recording [J]. Journal of Magnetism and Magnetic Materials, 2005, 287:107-112.

DOI: 10.1016/j.jmmm.2004.10.016

Google Scholar

[6] PRC National StandardGB/T20984-2007 Information security technology _ information security risk assessment standard.

Google Scholar

[7] Marine work state secrets and categories of the provisions of the specific scope. The state oceanic administration/the state secrecy bureau.(1996)

Google Scholar

[8] US Department of Defense.DOD 5220.22-M national industrial security operating manual (NISPOM)[S]. Washington: GPO,1995:800-831.

Google Scholar

[9] Xu Jing, YU Jian-qiao, ZHU You-dian. Research and implementation of data destruction technologies based on remote control. COMPUTER ENGINEERING AND DESIGN,2008,29(9).

Google Scholar

[10] Standard DoD 5220.22-M, US DoD 5220.22-M (ECE). Information on http://www.killdisk.com/dod.htm

Google Scholar