Welcome to Francis Academic Press

The Frontiers of Society, Science and Technology, 2024, 6(1); doi: 10.25236/FSST.2024.060128.

A Management System for Remote Utilization of Student Files Based on Trusted Storage

Author(s)

Ying Li

Corresponding Author:
Ying Li
Affiliation(s)

Xuzhou College of Industrial Technology, Xuzhou, Jiangsu, China

Abstract

The development of archives digitization makes the remote utilization a trend. The remote utilization of Students' archives can break through the limitation of time and space, so that students can query their own archives information at anytime and anywhere, better play the value of archives. However, the trustworthiness of electronic archives is facing more challenges in the digital environment. The realization of trustworthiness storage provides strong guarantee for the trustworthiness of long-term preservation of electronic archives. Remote utilization system should have perfect security mechanism, including user authentication, data encryption transmission, access control and so on, to ensure the security and stability of remote utilization system data. The purpose of this paper is to discuss the design and use of the remote utilization system of college students' archives under the premise of ensuring the security and authenticity.

Keywords

Trusted Storage, Electronic Archives, Remote Access, Data Security

Cite This Paper

Ying Li. A Management System for Remote Utilization of Student Files Based on Trusted Storage. The Frontiers of Society, Science and Technology (2024), Vol. 6, Issue 1: 173-179. https://doi.org/10.25236/FSST.2024.060128.

References

[1] Jane G. A probe into the digitalization of university student records and its remote utilization service -- taking the utilization service practice of National Sun Yat-sen University archives as an example. Lan Tai inside and outside, 2020(30): 53-54. 

[2] Wang Xiaohui, Li Guohong, Li Qingzhao. A brief talk on the remote utilization of university student status archives: Taking the Yunnan University Archives as an example. Lan Tai inside and outside, 2020(2): 75-76. 

[3] Liu Zixia, Xu Zhenzhe. Discussion on the optimization and upgrading of student archives management system in the background of intelligent campus. Landai world, 2022(1): 69-71. 

[4] Zhou Xuefen. Analysis on the necessity and feasibility of comprehensive informationization of college student files. Lan Tai inside and outside, 2021(05): 1-3.

[5] Ma Renjie, Li Mengyun. Some problems about the application of block chain technology in the utilization of archives in our country. China archives, 2020(11): 76.

[6] Yu Caixia, Yao Ye. Analysis of the security policy of electronic file transfer based on Invisible Watermark. Archives newsletter, 2019(1): 40-46. 

[7] He Shun, Yao Jianbo, Liang Haiying. An improved reversible watermarking algorithm based on JPEG image. Computer Simulation, 2020, 37(8): 219-223.

[8] Song Yong, Zhang Meng. Research on the technology of network trusted identity authentication. Cyberspace security, 2018, 09(3): 69-77.

[9] Peng Yongyong, Zhang Xiaotao. Research on key technologies of trusted identity authentication based on blockchain application pattern. Network security technology and Applications, 2018(2): 36 -37.

[10] Mao Runxia. Application of face recognition in new intelligent city construction. Technology and markets, 26(12): 35-39. 

[11] Chen Jian, Lv Zhihan and Song Houbing. Design of personnel big data management system based on blockchain. Future Generation Computer Systems, 2019(101): 1122-1129.