期刊文献+
共找到2,364篇文章
< 1 2 119 >
每页显示 20 50 100
A Practical Study of Big Data Technology in Computer Network Information Security Processing
1
作者 Kongduo Xing 《Journal of Electronic Research and Application》 2023年第6期36-41,共6页
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in... In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology. 展开更多
关键词 big data technology Computer network information security
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
2
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
Which Aspects of Big Data Usage is Creating Information Security Concern?
3
作者 Hira Batool DU Rong 《Proceedings of Business and Economic Studies》 2018年第4期35-41,共7页
The present research study proposed some of the big data usage perspectives for testing either they have a role in creating information security concern or not.The researchers first dig out some of the theoretical sup... The present research study proposed some of the big data usage perspectives for testing either they have a role in creating information security concern or not.The researchers first dig out some of the theoretical support for filling the gap regarding big data and information security bridge that was previously noted in literature.The present researches approached big data analytics manager in the Pakistani banking industries for validating the proposed model.The data were analyzed using SPSS Andrews approach due to the nature of the research study.The findings revealed that the proposed perspective including perceived benefits,cloud storage,and online behavior monitoring should be tested in the future studies by proposing their indirect affect in the creation of information security issue.The study brings a new aspect in literature of management regarding big data usage practices. 展开更多
关键词 big data security cloud storage behavior monitoring
下载PDF
Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique
4
作者 Fawaz Alassery Ahmed Alzahrani +3 位作者 Asif Irshad Khan Kanika Sharma Masood Ahmad Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期859-872,共14页
In recent years,it has been observed that the disclosure of information increases the risk of terrorism.Without restricting the accessibility of information,providing security is difficult.So,there is a demand for tim... In recent years,it has been observed that the disclosure of information increases the risk of terrorism.Without restricting the accessibility of information,providing security is difficult.So,there is a demand for time tofill the gap between security and accessibility of information.In fact,security tools should be usable for improving the security as well as the accessibility of information.Though security and accessibility are not directly influenced,some of their factors are indirectly influenced by each other.Attributes play an important role in bridging the gap between security and accessibility.In this paper,we identify the key attributes of accessibility and security that impact directly and indirectly on each other,such as confidentiality,integrity,availability,and severity.The significance of every attribute on the basis of obtained weight is important for its effect on security during the big data security life cycle process.To calculate the proposed work,researchers utilised the Fuzzy Analytic Hierarchy Process(Fuzzy AHP).Thefindings show that the Fuzzy AHP is a very accurate mechanism for determining the best security solution in a real-time healthcare context.The study also looks at the rapidly evolving security technologies in healthcare that could help improve healthcare services and the future prospects in this area. 展开更多
关键词 information security big data big data security life cycle fuzzy AHP
下载PDF
Classification of Big Data Security Based on Ontology Web Language
5
作者 Alsadig Mohammed Adam Abdallah Amir Mohamed Talib 《Journal of Information Security》 2023年第1期76-91,共16页
A vast amount of data (known as big data) may now be collected and stored from a variety of data sources, including event logs, the internet, smartphones, databases, sensors, cloud computing, and Internet of Things (I... A vast amount of data (known as big data) may now be collected and stored from a variety of data sources, including event logs, the internet, smartphones, databases, sensors, cloud computing, and Internet of Things (IoT) devices. The term “big data security” refers to all the safeguards and instruments used to protect both the data and analytics processes against intrusions, theft, and other hostile actions that could endanger or adversely influence them. Beyond being a high-value and desirable target, protecting Big Data has particular difficulties. Big Data security does not fundamentally differ from conventional data security. Big Data security issues are caused by extraneous distinctions rather than fundamental ones. This study meticulously outlines the numerous security difficulties Large Data analytics now faces and encourages additional joint research for reducing both big data security challenges utilizing Ontology Web Language (OWL). Although we focus on the Security Challenges of Big Data in this essay, we will also briefly cover the broader Challenges of Big Data. The proposed classification of Big Data security based on ontology web language resulting from the protégé software has 32 classes and 45 subclasses. 展开更多
关键词 big data big data security information security data security Ontology Web Language PROTÉGÉ
下载PDF
DNACDS:Cloud IoE big data security and accessing scheme based on DNA cryptography 被引量:3
6
作者 Ashish SINGH Abhinav KUMAR Suyel NAMASUDRA 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期157-170,共14页
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE ... The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud.The IoE-based cloud computing services are located at remote locations without the control of the data owner.The data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security capabilities.The lack of knowledge about security capabilities and control over data raises several security issues.Deoxyribonucleic Acid(DNA)computing is a biological concept that can improve the security of IoE big data.The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher algorithms.This paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access issues.The experimental results illustrated that DNACDS performs better than other DNA-based security schemes.The theoretical security analysis of the DNACDS shows better resistance capabilities. 展开更多
关键词 IoE based cloud computing DNA cryptography IoE big data security StS KAP feistel cipher IoE big data access
原文传递
Application of Big Data Information Platform in Medical Equipment
7
作者 Meiyu Pang Cheng Liu 《Journal on Big Data》 2022年第2期113-123,共11页
The application of big data in the medical device industry mainly refers to the analysis and processing of various medical devices,so as to provide patients with better treatment and rehabilitation services.At present... The application of big data in the medical device industry mainly refers to the analysis and processing of various medical devices,so as to provide patients with better treatment and rehabilitation services.At present,our country already has a relatively mature and reliable large database system.This article studies the application of medical equipment in the big data information platform.The main methods used in this article are survey method,case analysis method,and interview method.The big data information platform and medical devices are studied from different aspects.The survey results show that 41%of people completely agree with the role of big data information platforms in medical devices. 展开更多
关键词 big data information platform medical equipment equipment application
下载PDF
Analysis on the Risks of Health Information Platform under the Environment of Big Data
8
作者 LIU JiaQi XUE Xia YU Ting 《International English Education Research》 2016年第1期41-43,共3页
Big Data applications in the health service field have gradually been paid more close attention. Based on big data technology, more and more health information platforms are beginning to take effects, such as disease ... Big Data applications in the health service field have gradually been paid more close attention. Based on big data technology, more and more health information platforms are beginning to take effects, such as disease prevention, precision medicine, reducing expenditures for medical care and public health, improving medicine research and development. Meanwhile, the platforms have to face a lot of risks, such as health data disclosure, dispute of health data ownership, implicit contradiction explicit, unsustainable platform operation and so on. With the solutions of these risks, the construction of the public platform can provide better service for the citizens, hospital, pharmaceutical company, R&D institutions or and other parties. 展开更多
关键词 big data health information platform RISKS
下载PDF
Secure Big Data Storage and Sharing Scheme for Cloud Tenants 被引量:10
9
作者 CHENG Hongbing RONG Chunming +2 位作者 HWANG Kai WANG Weihong LI Yanyan 《China Communications》 SCIE CSCD 2015年第6期106-115,共10页
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in... The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants. 展开更多
关键词 cloud computing big data stor-age and sharing security
下载PDF
High Security for De-Duplicated Big Data Using Optimal SIMON Cipher 被引量:3
10
作者 A.Muthumari J.Banumathi +4 位作者 S.Rajasekaran P.Vijayakarthik K.Shankar Irina V.Pustokhina Denis A.Pustokhin 《Computers, Materials & Continua》 SCIE EI 2021年第5期1863-1879,共17页
Cloud computing offers internet location-based affordable,scalable,and independent services.Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in th... Cloud computing offers internet location-based affordable,scalable,and independent services.Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events,for instance,pandemic situations.To handle massive information,clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data,with elevated velocity and modified configurations.Data deduplication model enables cloud users to efficiently manage their cloud storage space by getting rid of redundant data stored in the server.Data deduplication also saves network bandwidth.In this paper,a new cloud-based big data security technique utilizing dual encryption is proposed.The clustering model is utilized to analyze the Deduplication process hash function.Multi kernel Fuzzy C means(MKFCM)was used which helps cluster the data stored in cloud,on the basis of confidence data encryption procedure.The confidence finest data is implemented in homomorphic encryption data wherein the Optimal SIMON Cipher(OSC)technique is used.This security process involving dual encryption with the optimization model develops the productivity mechanism.In this paper,the excellence of the technique was confirmed by comparing the proposed technique with other encryption and clustering techniques.The results proved that the proposed technique achieved maximum accuracy and minimum encryption time. 展开更多
关键词 cloud security DEDUPLICATION CLUSTERING optimization big data dual encryption
下载PDF
Metaheuristics with Machine Learning Enabled Information Security on Cloud Environment
11
作者 Haya Mesfer Alshahrani Faisal S.Alsubaei +5 位作者 Taiseer Abdalla Elfadil Eisa Mohamed K.Nour Manar Ahmed Hamza Abdelwahed Motwakel Abu Sarwar Zamani Ishfaq Yaseen 《Computers, Materials & Continua》 SCIE EI 2022年第10期1557-1570,共14页
The increasing quantity of sensitive and personal data being gathered by data controllers has raised the security needs in the cloud environment.Cloud computing(CC)is used for storing as well as processing data.Theref... The increasing quantity of sensitive and personal data being gathered by data controllers has raised the security needs in the cloud environment.Cloud computing(CC)is used for storing as well as processing data.Therefore,security becomes important as the CC handles massive quantity of outsourced,and unprotected sensitive data for public access.This study introduces a novel chaotic chimp optimization with machine learning enabled information security(CCOML-IS)technique on cloud environment.The proposed CCOML-IS technique aims to accomplish maximum security in the CC environment by the identification of intrusions or anomalies in the network.The proposed CCOML-IS technique primarily normalizes the networking data by the use of data conversion and min-max normalization.Followed by,the CCOML-IS technique derives a feature selection technique using chaotic chimp optimization algorithm(CCOA).In addition,kernel ridge regression(KRR)classifier is used for the detection of security issues in the network.The design of CCOA technique assists in choosing optimal features and thereby boost the classification performance.A wide set of experimentations were carried out on benchmark datasets and the results are assessed under several measures.The comparison study reported the enhanced outcomes of the CCOML-IS technique over the recent approaches interms of several measures. 展开更多
关键词 information security cloud computing INTRUSION ANOMALIES data mining feature selection classification
下载PDF
Design and Implementation of Cloud Platform for Intelligent Logistics in the Trend of Intellectualization 被引量:9
12
作者 Mengke Yang Movahedipour Mahmood +2 位作者 Xiaoguang Zhou Salam Shafaq Latif Zahid 《China Communications》 SCIE CSCD 2017年第10期180-191,共12页
Intellectualization has become a new trend for telecom industry, driven by intelligent technology including cloud computing, big data, and Internet of things. In order to satisfy the service demand of intelligent logi... Intellectualization has become a new trend for telecom industry, driven by intelligent technology including cloud computing, big data, and Internet of things. In order to satisfy the service demand of intelligent logistics, this paper designed an intelligent logistics platform containing the main applications such as e-commerce, self-service transceiver, big data analysis, path location and distribution optimization. The intelligent logistics service platform has been built based on cloud computing to collect, store and handling multi-source heterogeneous mass data from sensors, RFID electronic tag, vehicle terminals and APP, so that the open-access cloud services including distribution, positioning, navigation, scheduling and other data services can be provided for the logistics distribution applications. And then the architecture of intelligent logistics cloud platform containing software layer(SaaS), platform layer(PaaS) and infrastructure(IaaS) has been constructed accordance with the core technology relative high concurrent processing technique, heterogeneous terminal data access, encapsulation and data mining. Therefore, intelligent logistics cloud platform can be carried out by the service mode for implementation to accelerate the construction of the symbiotic win-winlogistics ecological system and the benign development of the ICT industry in the trend of intellectualization in China. 展开更多
关键词 cloud platform cloud computing intelligent logistics big data intellectualization
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
13
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 cloud Computing information security cloud Infrastructure Offerings cloud Migration security Measures data Breaches cloud Service Providers CYBERsecurity cloud security Case Studies cloud Threat Landscape data Encryption COMPLIANCE cloud security Tools
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
14
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 cloud data information Model data Storage cloud Computing security System data Encryption
下载PDF
An overview of Hadoop applications in transportation big data
15
作者 Changxi Ma Mingxi Zhao Yongpeng Zhao 《Journal of Traffic and Transportation Engineering(English Edition)》 EI CSCD 2023年第5期900-917,共18页
As an open-source cloud computing platform,Hadoop is extensively employed in a variety of sectors because of its high dependability,high scalability,and considerable benefits in processing and analyzing massive amount... As an open-source cloud computing platform,Hadoop is extensively employed in a variety of sectors because of its high dependability,high scalability,and considerable benefits in processing and analyzing massive amounts of data.Consequently,to derive valuable insights from transportation big data,it is essential to leverage the Hadoop big data platform for analysis and mining.To summarize the latest research progress on the application of Hadoop to transportation big data,we conducted a comprehensive review of 98 relevant articles published from 2012 to the present.Firstly,a bibliometric analysis was performed using VOSviewer software to identify the evolution trend of keywords.Secondly,we introduced the core components of Hadoop.Subsequently,we systematically reviewed the98 articles,identified the latest research progress,and classified the main application scenarios of Hadoop and its optimization framework.Based on our analysis,we identified the research gaps and future work in this area.Our review of the available research highlights that Hadoop has played a significant role in transportation big data research over the past decade.Specifically,the focus has been on transportation infrastructure monitoring,taxi operation management,travel feature analysis,traffic flow prediction,transportation big data analysis platform,traffic event monitoring and status discrimination,license plate recognition,and the shortest path.Additionally,the optimization framework of Hadoop has been studied in two main areas:the optimization of the computational model of Hadoop and the optimization of Hadoop combined with Spark.Several research results have been achieved in the field of transportation big data.However,there is less systematic research on the core technology of Hadoop,and the breadth and depth of the integration development of Hadoop and transportation big data are not sufficient.In the future,it is suggested that Hadoop may be combined with other big data frameworks such as Storm and Flink that process real-time data sources to improve the real-time processing and analysis of transportation big data.Simultaneously,the research on multi-source heterogeneous transportation big data is still a key focus.Improving existing big data technology to enable the analysis and even data compression of transportation big data can lead to new breakthroughs for intelligent transportation. 展开更多
关键词 information technology Transportation big data HADOOP Intelligent transportation cloud computing
原文传递
Protecting Data Mobility in Cloud Networks Using Metadata Security
16
作者 R.Punithavathi M.Kowsigan +3 位作者 R.Shanthakumari Miodrag Zivkovic Nebojsa Bacanin Marko Sarac 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期105-120,共16页
At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement data.Data mobility in cloud environments uses protection protocols and algorith... At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement data.Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data.Sometimes,data may have highly sensitive information,lead-ing users to consider using big data and cloud processing regardless of whether they are secured are not.Threats to sensitive data in cloud systems produce high risks,and existing security methods do not provide enough security to sensitive user data in cloud and big data environments.At present,several security solu-tions support cloud systems.Some of them include Hadoop Distributed File Sys-tem(HDFS)baseline Kerberos security,socket layer-based HDFS security,and hybrid security systems,which have time complexity in providing security inter-actions.Thus,mobile data security algorithms are necessary in cloud environ-ments to avoid time risks in providing security.In our study,we propose a data mobility and security(DMoS)algorithm to provide security of data mobility in cloud environments.By analyzing metadata,data are classified as secured and open data based on their importance.Secured data are sensitive user data,whereas open data are open to the public.On the basis of data classification,secured data are applied to the DMoS algorithm to achieve high security in HDFS.The pro-posed approach is compared with the time complexity of three existing algo-rithms,and results are evaluated. 展开更多
关键词 data mobility data security cloud computing big data DMoS algorithm
下载PDF
Design and Application of Cloud Test Platform for Launch Vehicle Electrical System Based on Data-Driven Approach
17
作者 ZHANG Qian LIU Liang SHEN Xiang 《Aerospace China》 2022年第4期45-51,共7页
In order to improve efficiency of the integrated test of a launch vehicle electrical system while meeting the requirement of high-density,a cloud test platform for the electrical system was designed based on a data-dr... In order to improve efficiency of the integrated test of a launch vehicle electrical system while meeting the requirement of high-density,a cloud test platform for the electrical system was designed based on a data-driven approach,using secure private cloud technology and virtualization technology.The platform has a general hardware and software architecture,which integrates the functions of graphical editing,automated testing,data processing,fault diagnosis and so on.It can realize multi-task parallel testing.Compared with the traditional test mode,the platform has obvious advantages on testing eficiency and effectiveness. 展开更多
关键词 data driven secure private cloud cloud test platform VIRTUALIZATION
下载PDF
Realization and application of geological cloud platform
18
作者 Gaodian Zhou Xinqing Wang +2 位作者 Weitao Chen Xianju Li Zhanlong Chen 《Big Earth Data》 EI 2020年第4期464-478,共15页
In recent years,with the progress of computer technology,some traditional industries such as geology are facing changes in industrial structure and application mode.So we try to apply big data and virtualization techn... In recent years,with the progress of computer technology,some traditional industries such as geology are facing changes in industrial structure and application mode.So we try to apply big data and virtualization technology in the field of geoscience.This study aims at addressing the existing problems in geological applications,such as data sharing,data processing and computing performance.A Geological Cloud Platform has been designed and realized preliminarily with big data and virtualization technology.The application of the Geological Cloud Platform can be divided into two parts:1)to nest the geological computing model in cloud platform and visualize the results and 2)to use relevant software to conduct data analysis and processing in virtual machines of Windows or Linux system.Finally,we prospect Carlin-type deposits in Nevada by using the spatial data model ArcSDM in the virtual machine. 展开更多
关键词 Geological cloud platform virtualization technology big data technology geological application Carlin-type deposits ArcSDM
原文传递
Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments
19
作者 Saraswathi Shunmuganathan Sridharan Kannan +2 位作者 T.V.Madhusudhana Rao K.Ambika T.Jayasankar 《Computer Systems Science & Engineering》 SCIE EI 2022年第11期785-801,共17页
The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,acc... The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,accessing the data,and Data Sharing(DS).Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data.With the requirement of vast volumes of storage area in the CCEs,capturing a secured data access framework is an important issue.This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing(ISIMSDS)to hold the DS of big data in CCEs.The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs.An access control Encryption Method(EM)is used to improve the encryption.The Complexity is measured to increase the authentication standard.The active attack is protected using this ISIMSDS methodology.Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user’s population is increasing rapidly.The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText(PT)attack and provides more efficient computation and storage space than the related methods.The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption,decryption,and retrieval of the data. 展开更多
关键词 data sharing cloud environments big data chosen-plaintext attack security
下载PDF
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
20
作者 M. Mamun-Ibn-Abdullah M. Humayun Kabir 《Journal of Computer and Communications》 2021年第7期31-42,共12页
Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provi... Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily. 展开更多
关键词 cloud Computing data security Embedded platform FRAMEWORK security Threat
下载PDF
上一页 1 2 119 下一页 到第
使用帮助 返回顶部