翻訳と辞書
Words near each other
・ Encyclopedia of Motherhood
・ Encryphodes aenictopa
・ Encryphodes ethiopella
・ Encrypt (film)
・ Encrypted filesystem
・ Encrypted function
・ Encrypted key exchange
・ Encrypted Media Extensions
・ Encrypted Title Key
・ Encrypting File System
・ Encrypting PIN Pad
・ Encryption
・ Encryption (album)
・ Encryption ban proposal in the United Kingdom
・ Encryption by date
Encryption layer in storage stack
・ Encryption software
・ Encryptr
・ Encs
・ Encsencs
・ Encuentra24
・ Encuentro
・ Encuentro (album)
・ Encuentro Amplio
・ Encuentro Beach, Dominican Republic
・ Encuentro Con El Milenio
・ Encuentro Internacional de Escultura en Madera-Piedra-Hierro de Rosario
・ Encuentro por Guatemala
・ Encuentro y Fiesta Nacional de Colectividades
・ Encuentros del Otro Cine


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Encryption layer in storage stack : ウィキペディア英語版
Encryption layer in storage stack

There is a plurality of terms that are used to describe implementations of disk encryption: on-the-fly encryption (OTFE); full disk encryption (FDE), whole disk encryption; filesystem-level encryption, encrypted filesystem, cryptographic filesystem, etc. All of them refer to an encryption layer in the storage stack. This article describes these techniques and explains their pros and cons. This article does not reference any software or hardware implementing these techniques (see disk encryption software and hardware), and it does not describe cryptographic theory behind it (see disk encryption theory).
==Storage stack==
To fully understand the techniques listed above we first need to consider the stack of software and hardware in the computer storage subsystem. Let us give an example of such a stack in a PC: hard disk hardware provides an interface to read and write sectors using logical block addressing (LBA) or cylinder-head-sector (CHS) address; on top of it there is a software layer that interprets the partition table stored in the master boot record (MBR) and represents a single hard disk as a set of logical disks; on top of it there is another software layer (filesystem) that represent a logical disk as a collection of files organized into directories; on top of it there may be software (a text editor) that interprets a file as a list of text lines. Each layer in this stack provides its own interface using the interface provided by the layer below it, for example, an LBA-accessible disk or a logical disk allow to read and write sectors of fixed size given the sector number (such layers are called sector-addressable); a filesystem allows to read and write data of arbitrary length given the name of a file and offset inside the file; and a text editor allows to delete and insert characters in a text file.
Similar to a communication protocol stack, this modularity provides great flexibility: each layer can be easily replaced with another as far as it provides the same interface. For example, a hard disk can be replaced with flash memory while all the rest of the stack stays unchanged. It is also possible to introduce an additional layer that provides the same interface as the layer below, but change the data along the way, for example, to provide on-the-fly encryption and decryption. This encryption layer can be integrated with any layer in our example: encryption can be implemented by hardware of the hard disk; a single logical disk can be encrypted; a file can be encrypted by the filesystem; and even the text editor itself can transparently encrypt data before storing it into a file.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Encryption layer in storage stack」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.