期刊文献+
共找到3,095篇文章
< 1 2 155 >
每页显示 20 50 100
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
1
作者 Li-Woei Chen Kun-Lin Tsai +2 位作者 Fang-Yie Leu Wen-Cheng Jiang Shih-Ting Tseng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2779-2794,共16页
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G... Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices. 展开更多
关键词 Mobile application security AES data encryption time parameter mobile device
下载PDF
Data encryption based on a 9D complex chaotic system with quaternion for smart grid
2
作者 张芳芳 黄哲 +3 位作者 寇磊 李扬 曹茂永 马凤英 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期217-226,共10页
With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large a... With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid. 展开更多
关键词 9-dimensional complex chaotic system data encryption QUATERNION smart grid REAL-TIME
下载PDF
Novel Approach to Data Encryption Based on Matrix Computations 被引量:1
3
作者 Rosilah Hassan Selver Pepic +2 位作者 Muzafer Saracevic Khaleel Ahmad Milan Tasic 《Computers, Materials & Continua》 SCIE EI 2021年第2期1139-1153,共15页
In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square He... In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse. 展开更多
关键词 SECURITY data encryption matrix computations cloud computing machine learning
下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
4
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 加密方法 自适应 手机 数据加密算法 用户数据 硬件信息 起始位置 安全性
下载PDF
Fluorescence Behavior and Emission Mechanisms of Poly(ethylene succinamide)and Its Applications in Fe^(3+)Detection and Data Encryption 被引量:2
5
作者 Xubao Jiang Qinghui Wang +2 位作者 Bin Li Shusheng Li Xiang Zheng Kong 《Chinese Journal of Polymer Science》 SCIE EI CAS CSCD 2023年第1期129-142,共14页
Conventional fluorescent polymers are featured by large conjugation structures.In contrast,a new class of fluorescent polymers without any conjugations is gaining great interest in immerging applications.Polyamide is ... Conventional fluorescent polymers are featured by large conjugation structures.In contrast,a new class of fluorescent polymers without any conjugations is gaining great interest in immerging applications.Polyamide is a typical member of the conjugation-free fluorescent polymers.However,studies on their electrophotonic property are hardly available,although widely used in many fields.Herein,poly(ethylene succinamide),PA24,is synthesized;its chemical structure confirmed through multiple techniques(NMR,FTIR,XRD,etc.).PA24 is highly emissive as solid and in its solution at room temperature,and the emission is excitation and concentration dependant,with an unusual blue shift under excitation from 270 nm to 320 nm,a hardly observed phenomenon for all fluorescent polymers.Quite similar emission behavior is also observed under cryogenic condition at 77 K.Its emission behavior is thoroughly studied;the ephemeral emission blue-shift is interpreted through Förster resonance energy transfer.Based on its structures,the emission mechanism is ascribed to cluster-triggered emission,elucidated from multianalyses(NMR,FTIR,UV absorbance and DLS).In presence of a dozen of competitive metal ions,PA24 emission at 450 nm is selectively quenched by Fe^(3+).PA24 is used as probe for Fe^(3+)and H_(2)O_(2) detections and in data encryption.Therefore,this work provides a novel face of polyamide with great potential applications as sensors in different fields. 展开更多
关键词 POLYAMIDE Fluorescent emission Cluster formation Ferric ion detection data encryption
原文传递
Ultralong Organic Phosphorescence of Triazatruxene Derivatives for Dynamic Data Encryption and Anti-counterfeiting 被引量:1
6
作者 Baoshuai Liang Wei An +3 位作者 Jie Liu Yu Dong Shiyu Feng Weiguo Huang 《Chinese Journal of Chemistry》 SCIE CAS CSCD 2023年第18期2261-2268,共8页
Comprehensive Summary,Organic luminogens with persistent room temperature phosphorescence(RTP)have drawn tremendous attentions due to their promising potentials in optoelectronic devices,information storage,biological... Comprehensive Summary,Organic luminogens with persistent room temperature phosphorescence(RTP)have drawn tremendous attentions due to their promising potentials in optoelectronic devices,information storage,biological imaging,and anti-counterfeiting.In this work,six triazatruxene-based lumiogens with different peripheral substituents and configurations are synthesized and systematically studied.The results show that their fluorescence quantum yields in solid states range from 15.73%to 37.58%.Dispersing the luminogens as guest into the host(PPh_(3))could turn on the persistent RTP,where PPh_(3)acts as not only a rigid matrix to suppress the non-radiative transitions of the guest,but also provides energy transfer channels to the guest.The maximum phosphorescence efficiency and the longest lifetime could reach 29.35%and 0.99 s in co-crystal films of 6-TAT-CN/PPh_(3)and 5-TAT-H/PPh_(3),respectively.Moreover,these host-guest co-crystalline films exhibit great potentials in advanced dynamic data encryption and anti-counterfeiting.This work deepens the insight for low cost,halogen-free,and facile fabrication of all-organic persistent RTP materials. 展开更多
关键词 Room temperature phosphorescence Host-guest systems Energy transfer data encryption ANTI-COUNTERFEITING FLUOROPHORES
原文传递
Hadoop-based secure storage solution for big data in cloud computing environment
7
作者 Shaopeng Guan Conghui Zhang +1 位作者 Yilin Wang Wenqing Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期227-236,共10页
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose... In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average. 展开更多
关键词 Big data security data encryption HADOOP Parallel encrypted storage Zookeeper
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
8
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD data Information Model data Storage Cloud Computing Security System data encryption
下载PDF
Physical layer data encryption using two-level constellation masking in 3D-CAP-PON
9
作者 陈帅东 刘博 +8 位作者 毛雅亚 任建新 宋秀敏 赵德林 姜蕾 韩顺 赵建业 沈佳佳 刘雪阳 《Chinese Optics Letters》 SCIE EI CAS CSCD 2021年第1期1-6,共6页
A novel physical layer data encryption scheme using two-level constellation masking in three-dimensional(3D)carrier-less amplitude and phase modulation(CAP)passive optical network(PON)is proposed in this Letter.The ch... A novel physical layer data encryption scheme using two-level constellation masking in three-dimensional(3D)carrier-less amplitude and phase modulation(CAP)passive optical network(PON)is proposed in this Letter.The chaotic sequence generated by Chua’s circuit model realizes two-level encryption of displacement masking and constellation rotation for3 D constellations.We successfully conduct an experiment demonstrating 8.7 Gb/s 3 D-CAP-8 data transmission over25 km standard single-mode fiber.With two-level constellation masking,a key space size of 2.1×1085 is achieved to bring about high security and good encryption performance,suggesting broad application prospects in future short-range secure communications. 展开更多
关键词 physical layer data encryption constellation masking carrier-less amplitude and phase modulation passive optical network
原文传递
Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data
10
作者 Taek-Young Youn Nam-Su Jho 《Computers, Materials & Continua》 SCIE EI 2022年第10期151-164,共14页
Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services th... Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services that were difficult to provide in the past.One of the services made possible through this change is cloud-based collaboration.In order to support secure collaboration over cloud,encryption technology to securely manage dynamic data is essential.However,since the existing encryption technology is not suitable for encryption of dynamic data,a new technology that can provide encryption for dynamic data is required for secure cloudbased collaboration.In this paper,we propose a new encryption technology to support secure collaboration for dynamic data in the cloud.Specifically,we propose an encryption operation mode which can support data updates such as modification,addition,and deletion of encrypted data in an encrypted state.To support the dynamic update of encrypted data,we invent a new mode of operation technique named linked-block cipher(LBC).Basic idea of our work is to use an updatable random value so-called link to link two encrypted blocks.Due to the use of updatable random link values,we can modify,insert,and delete an encrypted data without decrypt it. 展开更多
关键词 data encryption cloud-based collaboration dynamic data update
下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
11
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
下载PDF
Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks 被引量:2
12
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第3期104-117,共14页
Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose ... Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose a secure data sharing scheme in OSNs based on ciphertext-policy attributebased proxy re-encryption and secret sharing.In order to protect users' sensitive data,our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider.Our scheme presents a multiparty access control model,which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy.Further,we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider.We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext.Moreover,our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy.The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 展开更多
关键词 加密数据 数据网络 共享数据 安全性 在线 数据共享系统 服务提供商 社会
下载PDF
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
13
作者 Ping Zhang Jianzhong Wang 《Journal of Computer and Communications》 2015年第9期90-98,共9页
A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The cl... A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The client uses the Chinese and English to achieve the synonym construction of the keywords, the establishment of the fuzzy-syllable words and synonyms set of keywords and the implementation of fuzzy search strategy over the encryption of cloud data based on keywords. The server side through the analysis of the user’s query request provides keywords for users to choose and topic words and secondary words are picked out. System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained. The analysis of the simulation experiment shows that the fuzzy search strategy can make better use of historical results on the basis of privacy protection for the realization of efficient data search, saving the search time and improving the efficiency of search. 展开更多
关键词 CLOUD data FUZZY SEARCH KEYWORDS SYNONYMS Searchable encryptION
下载PDF
基于MQTT协议的轻量化文本信息分发技术研究
14
作者 熊风光 陈霖 +3 位作者 韩慧妍 张元 庞敏 焦世超 《计算机技术与发展》 2024年第2期90-97,共8页
随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题... 随着卫星通信网络的发展,基于卫星通信网络实现手机、平板电脑等移动通信设备之间的通信成为研究的热点。由于其采用无线电波进行信号传输,且需要经过多个中继站进行信号的转发和处理,导致存在网络延时大、丢包率高以及信道狭窄等问题。针对文本信息在卫星通信网络下的分发过程存在效率低下、可靠性不高的问题,设计一种基于MQTT(Message Queuing Telemetry Transport)协议的轻量化文本信息分发技术。该技术使用MQTT协议作为消息传输协议,在文本信息分发前对MQTT协议进行主题设计、发布订阅机制设计、设备连接设计以及设备心跳设计,确保设备之间的连通性;在文本信息的分发过程中,设计数据校验加密算法、文本信息轻量化处理方法和离线消息存储机制,保证文本信息分发的安全性、可靠性。实验结果表明:相较于传统的基于JSON数据的文本信息分发技术,该技术在提高文本信息分发效率的同时,可确保信息分发的安全性、完整性和稳定性。 展开更多
关键词 MQTT协议 轻量化 文本信息分发 数据加密 离线消息存储
下载PDF
基于区块链及IPFS的农产品多链追溯系统研究
15
作者 张净 唐恒睿 刘晓梅 《中国农机化学报》 北大核心 2024年第7期127-134,共8页
面对农产品供应市场日益庞大以及现存追溯系统中心化结构严重、溯源信息模糊简陋、数据安全难以得到有效保障等问题,通过分析供应链的业务流程及相关特点,融合区块链及IPFS技术设计灵活的多链分布式追溯系统以应对错综复杂多变的市场情... 面对农产品供应市场日益庞大以及现存追溯系统中心化结构严重、溯源信息模糊简陋、数据安全难以得到有效保障等问题,通过分析供应链的业务流程及相关特点,融合区块链及IPFS技术设计灵活的多链分布式追溯系统以应对错综复杂多变的市场情况中的精准溯源及监管的需求。充分利用星际文件系统IPFS的去重存储以及分布式存储特性提高存储资源的利用率,解决以往溯源数据存储中心化严重、数据类型单一、负载过大等问题;区块链多链与IPFS私有网络的结合以及CBC、ECC两个加密算法的采用可以支持全面的市场监管,并可以满足企业隐私数据的加密保护需求。为验证模型有效性,以水培蔬菜溯源项目作为应用案例进行分析测试,其中区块链多链系统吞吐量达到上链500 TPS、查询400 TPS;CBC加密算法的相关性、扩展性分析中密文改变率分别达到96.727%、97.136%。测试结果表明:本追溯系统在实现溯源数据高效记录存储和精准监管溯源的基础上,也能够给予供应链内各方合法权益及隐私数据有效的安全保护,亦可以面对业务交错复杂的市场供应链,为完整可靠的农产品区块链追溯监管系统研究发展与落地实现提供借鉴与参考。 展开更多
关键词 农产品 追溯 区块链 数据加密 数据安全 IPFS
下载PDF
基于商用密码的水利重要数据点面结合安全保护方法
16
作者 付静 周维续 +1 位作者 詹全忠 张潮 《水利信息化》 2024年第1期1-5,共5页
为保障数字孪生流域建设过程中的重要数据安全,针对破解海量高精度数据汇集面临的数据窃取、泄露、损毁等问题隐患开展研究,提出网络安全基础—数据分类分级—数据安全防护的数字孪生流域数据安全总体防护方案。针对数据安全传输、存储... 为保障数字孪生流域建设过程中的重要数据安全,针对破解海量高精度数据汇集面临的数据窃取、泄露、损毁等问题隐患开展研究,提出网络安全基础—数据分类分级—数据安全防护的数字孪生流域数据安全总体防护方案。针对数据安全传输、存储、使用中的安全薄弱点,提出全面通用防护和应用内加密相结合的点面结合加密保护方法,利用商用密码技术对数据进行机密性、完整性、可用性保护。本研究方法已在全国水利一张图等重要系统中得到应用,可实现数据安全保护和便捷高效应用平衡,广泛适用于数字孪生流域建设中的水利重要数据全生命周期保护。 展开更多
关键词 水利数据 重要数据 商用密码 点面结合 数字孪生 数据安全 网络安全
下载PDF
基于混沌序列和AES算法的数据库外层数据传输同步加密方法
17
作者 陈琳 《黑龙江工程学院学报》 CAS 2024年第4期38-43,共6页
为保障数据库外层数据的安全传输,提出一种基于混沌序列和AES算法的数据库外层数据传输同步加密方法。该方法结合AES算法的加密安全性和混沌序列的加密速度优势,通过加密代理服务器和应用服务器对数据库外层数据进行处理,利用混沌序列lo... 为保障数据库外层数据的安全传输,提出一种基于混沌序列和AES算法的数据库外层数据传输同步加密方法。该方法结合AES算法的加密安全性和混沌序列的加密速度优势,通过加密代理服务器和应用服务器对数据库外层数据进行处理,利用混沌序列logistic映射参数初始化、混沌序列二进制量化、AES动态加密和尾端处理实现数据库外层数据传输同步加密。实验结果表明,该方法能够成功地对文本和图像数据进行加密和隐藏,同时提高加密效率,并兼顾了数据的安全性和传输效率。 展开更多
关键词 混沌序列 AES算法 数据库 数据传输 数据加密 外层数据
下载PDF
基于SDES和双轮差错控制的大数据集成安全系统
18
作者 宁光芳 《计算机应用与软件》 北大核心 2024年第1期310-314,共5页
针对大数据传输中的数据机密性、完整性和数据丢失等问题,提出一种基于简化数据加密标准(Simplified Data Encryption Standard,SDES)和双轮差错控制的大数据集成安全系统。使用SDES加密算法生成加密字符串,并设计意外数据丢失备份系统... 针对大数据传输中的数据机密性、完整性和数据丢失等问题,提出一种基于简化数据加密标准(Simplified Data Encryption Standard,SDES)和双轮差错控制的大数据集成安全系统。使用SDES加密算法生成加密字符串,并设计意外数据丢失备份系统以提高机密性和防止意外数据丢失。基于双轮差错控制以较低的空间开销控制传输过程中包含的任意数量的离散或连续错误位,基于固定长度编码(Fixed Length Coding,FLC)的无损压缩技术来减少数据开销。该算法具有较高的AE值、熵和压缩百分比,具有提供更高的数据机密性和完整性的潜力。 展开更多
关键词 大数据传输安全 简化数据加密标准 无损数据压缩 双轮异或运算控制传输错误
下载PDF
基于密文域敏感信息表征的隐私保护算法
19
作者 董冰 《河南科学》 2024年第2期209-215,共7页
网络中提供身份信息的网络资源容易导致个人身份数据的泄露,为了保障身份信息安全,需要进行信息隐私保护设计,提出一种基于密文域敏感信息表征的隐私保护算法.采用双线性映射编码技术构建表征个人隐私信息的比特序列信息模型,提取比特... 网络中提供身份信息的网络资源容易导致个人身份数据的泄露,为了保障身份信息安全,需要进行信息隐私保护设计,提出一种基于密文域敏感信息表征的隐私保护算法.采用双线性映射编码技术构建表征个人隐私信息的比特序列信息模型,提取比特序列信息的信息熵特征量,在密文域中对提取的特征量进行混沌加密设计.设计隐私保护敏感信息的密钥构造方案,运用到数字签名中,对每组信息进行分块加密和身份认证,实现隐私保护设计.仿真结果表明,采用该算法进行隐私保护,对用户敏感信息加密后的抗攻击性能较好,模型的可信度较高,具有较好的隐私保护能力. 展开更多
关键词 隐私保护 密文域 敏感信息 数据加密 密钥
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
20
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information Security Cloud Infrastructure Offerings Cloud Migration Security Measures data Breaches Cloud Service Providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape data encryption COMPLIANCE Cloud Security Tools
下载PDF
上一页 1 2 155 下一页 到第
使用帮助 返回顶部