期刊文献+

网络数据传输高密度信息安全存储仿真 被引量:8

Simulation of Secure Storage of High Density Information for Network Data Transmission
下载PDF
导出
摘要 对网络数据传输中高密度信息存储问题的研究,能够保证高密度信息的安全性。对高密度信息的安全存储,需要对数据存储过程中指纹梯度进行优化,实现高密度信息数据的流量分离,完成高密度信息的安全存储。传统方法对划分处理后的高密度信息进行统一编码,建立三维高密度信息存储模型,但忽略了高密度信息数据的流量分离,导致存储安全性偏低。提出基于压缩感知的网络数据传输中心高密度信息安全存储方法。对网络数据传输中心的高密度信息基于压缩感知进行测量,通过优化高密度信息存储节点测量矩阵和转发概率实现数据压缩重构,考虑高密度信息数据存储中使用强度,最小传输粒度等数字特征,对压缩重构数据存储过程中的指纹梯度进行优化,实现高密度信息数据的流量分离。实验结果表明,所提方法能够实现高密度信息高效存储,能够在流量分离的前提下降低信息安全存储时延。 This article proposes a secure storage method of high -density information in network data transmission center based on compressive sensing. Firstly, our method measures high density information of network data transmission center based on compressive sensing and realizes data compression reconstruction through optimization of measured matrix and forwarding probability of high density information storage node, then considers the digital characteristics such as the use of intensity in high density information data storage and the minimum transport granularity. Moreover, this method optimizes fingerprint gradient in process of data storage of compression reconstruction. Thus, we realize the traffic separation of high density information data. Simulation result shows that the proposed method can achieve the efficient storage of high density information and reduce the time delay of security storage of information under the premise of traffic separation.
出处 《计算机仿真》 北大核心 2017年第12期153-156,236,共5页 Computer Simulation
关键词 网络数据传输 高密度信息 安全存储 Network data transmission High - density information Secure storage
  • 相关文献

参考文献10

二级参考文献98

  • 1戴志敏,王倩莉,胡越明,尤晋元.iSCSI协议研究与实现[J].计算机应用与软件,2005,22(8):83-85. 被引量:6
  • 2DUTCH M, FREEMAN L. Understanding data de-duplication ra- tios[EB/OL], http://www.sina.org/.2012.
  • 3CNET. Who owns your files on google drive[EB/OL], http://news. cnet.com/8301 - 10233-57420551-93/who-owns-your-files-on-google-d rive/.2016.2013.
  • 4Dropbox. Dropbox privacy policy[EB/OL], https://www.dropbox. com/privacy.2013.
  • 5Google. Google terms of service[EB/OL], http://www.google.com/ policies/terms/. 2013.
  • 6Apple Inc. Apple privacy policy (Covering iCloud)[ EB/OL]. http://www. apple.com/privacy/.2013.
  • 7Microsoft. Microsoft services agreement[EB/OL], http://windows. microsofl.com/en-US/windows-live/microsoft-service-agreement. 2013.
  • 8Wired.com. Dropbox left user accounts unlocked for 4 hours sun- day[EB/OL].http://www.wired.com/threatlevel/2011/06/dropbox/. 2013.
  • 9Twitter. Tweetdeck[EB/OL]. http://money.cnn.com/2012/03/30/tech-nology/tweetdeck-bug-twitter/.2013.
  • 10DOUCEUR J R, ADYA A, BOLOSKY W J, et al. Reclaiming space from duplicate files in a serverless distributed file system[A]. Proc. of ICDCS'02[C]. 2002.617-624.

共引文献85

同被引文献93

引证文献8

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部