期刊文献+
共找到3,100篇文章
< 1 2 155 >
每页显示 20 50 100
Data encryption based on a 9D complex chaotic system with quaternion for smart grid
1
作者 张芳芳 黄哲 +3 位作者 寇磊 李扬 曹茂永 马凤英 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期217-226,共10页
With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large a... With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid. 展开更多
关键词 9-dimensional complex chaotic system data encryption QUATERNION smart grid REAL-TIME
下载PDF
Hadoop-based secure storage solution for big data in cloud computing environment
2
作者 Shaopeng Guan Conghui Zhang +1 位作者 Yilin Wang Wenqing Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期227-236,共10页
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose... In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average. 展开更多
关键词 Big data security data encryption HADOOP Parallel encrypted storage Zookeeper
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
3
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD data Information Model data Storage Cloud Computing Security System data encryption
下载PDF
Novel Approach to Data Encryption Based on Matrix Computations 被引量:1
4
作者 Rosilah Hassan Selver Pepic +2 位作者 Muzafer Saracevic Khaleel Ahmad Milan Tasic 《Computers, Materials & Continua》 SCIE EI 2021年第2期1139-1153,共15页
In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square He... In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse. 展开更多
关键词 SECURITY data encryption matrix computations cloud computing machine learning
下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
5
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 加密方法 自适应 手机 数据加密算法 用户数据 硬件信息 起始位置 安全性
下载PDF
Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data
6
作者 Taek-Young Youn Nam-Su Jho 《Computers, Materials & Continua》 SCIE EI 2022年第10期151-164,共14页
Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services th... Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services that were difficult to provide in the past.One of the services made possible through this change is cloud-based collaboration.In order to support secure collaboration over cloud,encryption technology to securely manage dynamic data is essential.However,since the existing encryption technology is not suitable for encryption of dynamic data,a new technology that can provide encryption for dynamic data is required for secure cloudbased collaboration.In this paper,we propose a new encryption technology to support secure collaboration for dynamic data in the cloud.Specifically,we propose an encryption operation mode which can support data updates such as modification,addition,and deletion of encrypted data in an encrypted state.To support the dynamic update of encrypted data,we invent a new mode of operation technique named linked-block cipher(LBC).Basic idea of our work is to use an updatable random value so-called link to link two encrypted blocks.Due to the use of updatable random link values,we can modify,insert,and delete an encrypted data without decrypt it. 展开更多
关键词 data encryption cloud-based collaboration dynamic data update
下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
7
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
下载PDF
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
8
作者 Ping Zhang Jianzhong Wang 《Journal of Computer and Communications》 2015年第9期90-98,共9页
A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The cl... A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The client uses the Chinese and English to achieve the synonym construction of the keywords, the establishment of the fuzzy-syllable words and synonyms set of keywords and the implementation of fuzzy search strategy over the encryption of cloud data based on keywords. The server side through the analysis of the user’s query request provides keywords for users to choose and topic words and secondary words are picked out. System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained. The analysis of the simulation experiment shows that the fuzzy search strategy can make better use of historical results on the basis of privacy protection for the realization of efficient data search, saving the search time and improving the efficiency of search. 展开更多
关键词 CLOUD data FUZZY SEARCH KEYWORDS SYNONYMS Searchable encryptION
下载PDF
Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks 被引量:2
9
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第3期104-117,共14页
Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose ... Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose a secure data sharing scheme in OSNs based on ciphertext-policy attributebased proxy re-encryption and secret sharing.In order to protect users' sensitive data,our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider.Our scheme presents a multiparty access control model,which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy.Further,we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider.We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext.Moreover,our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy.The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 展开更多
关键词 加密数据 数据网络 共享数据 安全性 在线 数据共享系统 服务提供商 社会
下载PDF
基于区块链及IPFS的农产品多链追溯系统研究
10
作者 张净 唐恒睿 刘晓梅 《中国农机化学报》 北大核心 2024年第7期127-134,共8页
面对农产品供应市场日益庞大以及现存追溯系统中心化结构严重、溯源信息模糊简陋、数据安全难以得到有效保障等问题,通过分析供应链的业务流程及相关特点,融合区块链及IPFS技术设计灵活的多链分布式追溯系统以应对错综复杂多变的市场情... 面对农产品供应市场日益庞大以及现存追溯系统中心化结构严重、溯源信息模糊简陋、数据安全难以得到有效保障等问题,通过分析供应链的业务流程及相关特点,融合区块链及IPFS技术设计灵活的多链分布式追溯系统以应对错综复杂多变的市场情况中的精准溯源及监管的需求。充分利用星际文件系统IPFS的去重存储以及分布式存储特性提高存储资源的利用率,解决以往溯源数据存储中心化严重、数据类型单一、负载过大等问题;区块链多链与IPFS私有网络的结合以及CBC、ECC两个加密算法的采用可以支持全面的市场监管,并可以满足企业隐私数据的加密保护需求。为验证模型有效性,以水培蔬菜溯源项目作为应用案例进行分析测试,其中区块链多链系统吞吐量达到上链500 TPS、查询400 TPS;CBC加密算法的相关性、扩展性分析中密文改变率分别达到96.727%、97.136%。测试结果表明:本追溯系统在实现溯源数据高效记录存储和精准监管溯源的基础上,也能够给予供应链内各方合法权益及隐私数据有效的安全保护,亦可以面对业务交错复杂的市场供应链,为完整可靠的农产品区块链追溯监管系统研究发展与落地实现提供借鉴与参考。 展开更多
关键词 农产品 追溯 区块链 数据加密 数据安全 IPFS
下载PDF
基于MQTT协议的轻量化文本信息分发技术研究
11
作者 熊风光 陈霖 +3 位作者 韩慧妍 张元 庞敏 焦世超 《计算机技术与发展》 2024年第2期90-97,共8页
随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题... 随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题。针对文本信息在卫星通信网络下的分发过程存在效率低下、可靠性不高的问题,设计一种基于MQTT(Message Queuing Telemetry Transport)协议的轻量化文本信息分发技术。该技术使用MQTT协议作为消息传输协议,在文本信息分发前对MQTT协议进行主题设计、发布订阅机制设计、设备连接设计以及设备心跳设计,确保设备之间的连通性;在文本信息的分发过程中,设计数据校验加密算法、文本信息轻量化处理方法和离线消息存储机制,保证文本信息分发的安全性、可靠性。实验结果表明:相较于传统的基于JSON数据的文本信息分发技术,该技术在提高文本信息分发效率的同时,可确保信息分发的安全性、完整性和稳定性。 展开更多
关键词 MQTT协议 轻量化 文本信息分发 数据加密 离线消息存储
下载PDF
基于混沌序列和AES算法的数据库外层数据传输同步加密方法
12
作者 陈琳 《黑龙江工程学院学报》 CAS 2024年第4期38-43,共6页
为保障数据库外层数据的安全传输,提出一种基于混沌序列和AES算法的数据库外层数据传输同步加密方法。该方法结合AES算法的加密安全性和混沌序列的加密速度优势,通过加密代理服务器和应用服务器对数据库外层数据进行处理,利用混沌序列lo... 为保障数据库外层数据的安全传输,提出一种基于混沌序列和AES算法的数据库外层数据传输同步加密方法。该方法结合AES算法的加密安全性和混沌序列的加密速度优势,通过加密代理服务器和应用服务器对数据库外层数据进行处理,利用混沌序列logistic映射参数初始化、混沌序列二进制量化、AES动态加密和尾端处理实现数据库外层数据传输同步加密。实验结果表明,该方法能够成功地对文本和图像数据进行加密和隐藏,同时提高加密效率,并兼顾了数据的安全性和传输效率。 展开更多
关键词 混沌序列 AES算法 数据库 数据传输 数据加密 外层数据
下载PDF
基于SDES和双轮差错控制的大数据集成安全系统
13
作者 宁光芳 《计算机应用与软件》 北大核心 2024年第1期310-314,共5页
针对大数据传输中的数据机密性、完整性和数据丢失等问题,提出一种基于简化数据加密标准(Simplified Data Encryption Standard,SDES)和双轮差错控制的大数据集成安全系统。使用SDES加密算法生成加密字符串,并设计意外数据丢失备份系统... 针对大数据传输中的数据机密性、完整性和数据丢失等问题,提出一种基于简化数据加密标准(Simplified Data Encryption Standard,SDES)和双轮差错控制的大数据集成安全系统。使用SDES加密算法生成加密字符串,并设计意外数据丢失备份系统以提高机密性和防止意外数据丢失。基于双轮差错控制以较低的空间开销控制传输过程中包含的任意数量的离散或连续错误位,基于固定长度编码(Fixed Length Coding,FLC)的无损压缩技术来减少数据开销。该算法具有较高的AE值、熵和压缩百分比,具有提供更高的数据机密性和完整性的潜力。 展开更多
关键词 大数据传输安全 简化数据加密标准 无损数据压缩 双轮异或运算控制传输错误
下载PDF
基于商用密码的水利重要数据点面结合安全保护方法
14
作者 付静 周维续 +1 位作者 詹全忠 张潮 《水利信息化》 2024年第1期1-5,共5页
为保障数字孪生流域建设过程中的重要数据安全,针对破解海量高精度数据汇集面临的数据窃取、泄露、损毁等问题隐患开展研究,提出网络安全基础—数据分类分级—数据安全防护的数字孪生流域数据安全总体防护方案。针对数据安全传输、存储... 为保障数字孪生流域建设过程中的重要数据安全,针对破解海量高精度数据汇集面临的数据窃取、泄露、损毁等问题隐患开展研究,提出网络安全基础—数据分类分级—数据安全防护的数字孪生流域数据安全总体防护方案。针对数据安全传输、存储、使用中的安全薄弱点,提出全面通用防护和应用内加密相结合的点面结合加密保护方法,利用商用密码技术对数据进行机密性、完整性、可用性保护。本研究方法已在全国水利一张图等重要系统中得到应用,可实现数据安全保护和便捷高效应用平衡,广泛适用于数字孪生流域建设中的水利重要数据全生命周期保护。 展开更多
关键词 水利数据 重要数据 商用密码 点面结合 数字孪生 数据安全 网络安全
下载PDF
基于属性加密的联盟区块链数据共享方法
15
作者 朱丽丽 《武汉职业技术学院学报》 2024年第1期115-120,共6页
在保证区块链内数据安全的前提下,数据共享的速度通常较慢,为减少数据共享所需时间,基于属性加密算法设计联盟区块链数据共享方法。构建分层访问树,在无密钥托管模式中完成对用户代理加密的分类,使用哈希函数简单处理分层模型;基于属性... 在保证区块链内数据安全的前提下,数据共享的速度通常较慢,为减少数据共享所需时间,基于属性加密算法设计联盟区块链数据共享方法。构建分层访问树,在无密钥托管模式中完成对用户代理加密的分类,使用哈希函数简单处理分层模型;基于属性加密构造数据访问共享模型,定义数据库域值,设置系统公共参数,建立主密钥与公密钥,完成集中式的数据共享管理;设计区块链数据共享算法,依据公钥格式生成用户私钥,完成区块链内的数据共享。分别计算数据共享过程中安全索引、陷门生成、关键字搜索三个步骤的用时,由数据可知,在安全索引与关键字搜索时,属性加密算法的运算效率更高,在陷门生成过程中,属性加密算法的运算效率相对较高。该方法的数据共享总用时为991 ms,共享时间更短,速度更快。 展开更多
关键词 属性加密 区块链数据 数据共享 优化算法 分层访问 访问权限
下载PDF
一种干部培训电子证书的生成方法与系统
16
作者 钱哨 李挥剑 孙瑶 《现代信息科技》 2024年第11期76-80,共5页
在干部教育培训过程中,传统培训证书信息收集、制作、核对和分发效率低、出错率高、成本高。文章提出一种干部培训电子证书的生成方法与系统,通过报名系统获取学员数据,经Web API接口完成数据集成,并对已有电子证书中电子照片进行面部... 在干部教育培训过程中,传统培训证书信息收集、制作、核对和分发效率低、出错率高、成本高。文章提出一种干部培训电子证书的生成方法与系统,通过报名系统获取学员数据,经Web API接口完成数据集成,并对已有电子证书中电子照片进行面部识别算法纠错预处理;进一步对电子证书加密生成PDF文件,并发布至学员终端。证书认证为数据加密逆操作,可实现对证书真伪的校验,彻底解决了干部培训证书分类整理、核对、验证、归档等一系列技术问题。 展开更多
关键词 干部培训 电子证书 面部识别 数据加/解密 PDF 数据交换
下载PDF
基于密文域敏感信息表征的隐私保护算法
17
作者 董冰 《河南科学》 2024年第2期209-215,共7页
网络中提供身份信息的网络资源容易导致个人身份数据的泄露,为了保障身份信息安全,需要进行信息隐私保护设计,提出一种基于密文域敏感信息表征的隐私保护算法.采用双线性映射编码技术构建表征个人隐私信息的比特序列信息模型,提取比特... 网络中提供身份信息的网络资源容易导致个人身份数据的泄露,为了保障身份信息安全,需要进行信息隐私保护设计,提出一种基于密文域敏感信息表征的隐私保护算法.采用双线性映射编码技术构建表征个人隐私信息的比特序列信息模型,提取比特序列信息的信息熵特征量,在密文域中对提取的特征量进行混沌加密设计.设计隐私保护敏感信息的密钥构造方案,运用到数字签名中,对每组信息进行分块加密和身份认证,实现隐私保护设计.仿真结果表明,采用该算法进行隐私保护,对用户敏感信息加密后的抗攻击性能较好,模型的可信度较高,具有较好的隐私保护能力. 展开更多
关键词 隐私保护 密文域 敏感信息 数据加密 密钥
下载PDF
考虑信息泄露影响的光纤传感网络传输数据安全导入方法
18
作者 翟广辉 李娟 《激光杂志》 CAS 北大核心 2024年第7期193-198,共6页
为了提高对光纤传感网络传输数据安全传输能力,提出基于信息泄漏加密传输的光纤传感网络传输数据安全导入方法。采用离散混沌时间序列同步调制方法实现对光纤传感网络传输数据导入过程中调制编码处理,根据混沌随机编码特性实现对光纤传... 为了提高对光纤传感网络传输数据安全传输能力,提出基于信息泄漏加密传输的光纤传感网络传输数据安全导入方法。采用离散混沌时间序列同步调制方法实现对光纤传感网络传输数据导入过程中调制编码处理,根据混沌随机编码特性实现对光纤传感网络传输数据过程中的同步输出稳定性调节和自主随机编码,构建光纤传感网络信息传输泄漏抑制的加密密钥,通过Logistics映射实现对光纤传感网络传输数据导入过程中的信息泄漏加密重传,根据光纤传感网络传输数据的混合敏感密钥表征和算术编码,实现信息泄漏控制和数据安全导入。实验结果表明,采用该方法进行光纤传感网络传输数据导入的加密性能较好,其光纤传感网络传输数据已加密比特序列的识别率为98%,误码率仅为2.7∗10-9%,抗泄漏能力达到了0.970,并且导入后的数据完整度达到了0.996,说明该方法具备了较强的加密效果、抗泄漏能力,实现数据的安全导入和加密传输。 展开更多
关键词 信息泄露 光纤传感网络 传输数据 安全导入 加密 编码
下载PDF
基于区块链加密技术的云会计数据安全探究
19
作者 吴花平 刘自豪 《重庆理工大学学报(社会科学)》 CAS 2024年第2期96-105,共10页
云会计因投入成本低、数据处理高效和业务效率高等优势而受到用户的青睐,但储在云端的数据所面临的安全问题已经成为云会计发展亟待解决的问题之一。为应对云会计数据安全问题,构建了基于区块链加密技术的云会计数据安全模型。首先,通... 云会计因投入成本低、数据处理高效和业务效率高等优势而受到用户的青睐,但储在云端的数据所面临的安全问题已经成为云会计发展亟待解决的问题之一。为应对云会计数据安全问题,构建了基于区块链加密技术的云会计数据安全模型。首先,通过对云会计与区块链的回顾,明确云会计发展所面临的数据安全问题以及区块链技术与云会计融合发展的可行性;然后,引入非对称加密技术和哈希算法,以实现对云会计数据的加密安全存储和完整性检查;最后,通过分析得出区块链技术能够加强用户对其数据的控制、保障数据传输安全和增进用户与云会计服务提供商之间信任的结论。 展开更多
关键词 区块链 云会计 数据安全 非对称加密 哈希算法
下载PDF
可撤销属性加密的区块链数据访问控制方法 被引量:1
20
作者 李健 戚湧 《计算机工程与设计》 北大核心 2024年第2期348-355,共8页
针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进... 针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进行安全性证明;基于超级账本Fabric进行系统设计,结合星际文件系统采用链上链下存储方式解决区块链容量不足和系统效率问题。实验结果表明,所提方案撤销属性时无需更新密钥密文重复上链,仅需要6次Pairing操作进行预解密和解密,且在大规模属性集下,预解密时间和解密时间平均保持在百毫秒左右的常量级上,实现区块链数据高效、细粒度的访问控制。 展开更多
关键词 区块链 数据共享 访问控制 属性基加密 预解密 属性撤销 星际文件系统
下载PDF
上一页 1 2 155 下一页 到第
使用帮助 返回顶部