학술논문

The Secure Computing Architecture for Dual Hard Disk and Dual System Switching
Document Type
Conference
Source
2022 IEEE 5th International Conference on Big Data and Artificial Intelligence (BDAI) Big Data and Artificial Intelligence (BDAI), 2022 IEEE 5th International Conference on. :125-129 Jul, 2022
Subject
Computing and Processing
Computer hacking
Simulation
Computer architecture
Switches
Resists
Big Data
Hard disks
secure computing architecture
the dual hard disk and dual system switching
sensitive data
secure transmission
sensitive file copy and output
Language
Abstract
This paper proposes a secure computing architecture based on the dual hard disk and dual system switching (D 3 S), and provide the mechanism of sensitive data copy and transmission processing for the two operating environments of the computer. It can not only provide a secure computing environment for all processing links involving sensitive files, but also resist various possible malicious attacks. The experimental simulation results show that the D3S architecture has obvious performance advantages in both the data delivery ratio and the memory computing overhead. When the size of the copied sensitive file is 50MB, the copy time overhead of D 3 S is 1.12s. The secure transmission rate of sensitive data of D 3 S architecture is significantly better than that of other existing architectures, which has been maintained at about 8.5 Mbps.