期刊文献+
共找到605篇文章
< 1 2 31 >
每页显示 20 50 100
Analysis of Secured Cloud Data Storage Model for Information
1
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD DATA information Model Data storage Cloud Computing Security system Data Encryption
下载PDF
ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems
2
作者 CHEN Zhao YAO Wenbin XIAO Da WU Chunhua LIU Jianyi WANG Cong 《China Communications》 SCIE CSCD 2010年第4期89-95,共7页
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente... The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing. 展开更多
关键词 Distributed system secure storage information Dispersal knight's tour problem
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical systems Critical Infrastructure Data Protection privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
4
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 information security data privacy epidemic prevention and control personal privacy protection
下载PDF
Enhanced Information Systems Success Model for Patient Information Assurance
5
作者 Lilian Adhiambo Agunga Joshua Agola Paul Abuonji 《Journal of Computer Science Research》 2021年第4期31-42,共12页
The current health information systems have many challenges such as lack of standard user interfaces,data security and privacy issues,inability to uniquely identify patients across multiple hospital information system... The current health information systems have many challenges such as lack of standard user interfaces,data security and privacy issues,inability to uniquely identify patients across multiple hospital information systems,probable misuse of patient data,high technological costs,resistance to technology deployments in hospital management,lack of data gathering,processing and analysis standardization.All these challenges,among others hamper either the acceptance of the health information systems,operational efficiency or expose patient information to cyber attacks.In this paper,an enhanced information systems success model for patient information assurance is developed using an amalgamation of Technology Acceptance Model(TAM)and Information Systems Success Model(ISS).This involved the usage of Linear Structured Relationship(LISREL)software to model a combination of ISS and Intention to Use(ITU),TAM and ITU,ISS and user satisfaction(US),and finally TAM and US.The sample size of 110 respondents was obtained based on the total population of 221 using the Conhrans formula.Thereafter,simple random sampling was employed to select members within each category of employees to take part in the study.The questionnaire as a research tool was checked for reliability via Cronbach’s Alpha.The results obtained showed that for ISS and ITU modeling,only perceived ease of use,system features,response time,flexibility,timeliness,accuracy,responsiveness and user training positively influenced the intention to use.However,for the TAM and ITU modeling,only TAM’s measures such as timely information,efficiency,increased transparency,and proper patient identification had a positive effect on intension to use.The ISS and US modeling revealed that perceived ease of use had the greatest impact on user satisfaction while response time had the least effect on user satisfaction.On its part,the TAM and US modeling showed that timely information,effectiveness,consistency,enhanced communication,and proper patients identification had a positive influence on user satisfaction. 展开更多
关键词 information assurance ISS Modeling privacy SECURITY TAM User satisfaction
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
6
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information Protection Law privacy security privacy protection will
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
7
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
8
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Xin Liu Xiu-Bo Chen Yiying Yu Xiaojun Wang 《Computers, Materials & Continua》 SCIE EI 2022年第9期5429-5441,共13页
With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.Howe... With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search(PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further,the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly,we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result,which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least,through security analysis,our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others. 展开更多
关键词 Lattice cryptography searchable encryption blockchain privacy protection log system information security applied cryptography
下载PDF
Data Security and Privacy in Cloud Storage
9
作者 Xinhua Dong Ruixuan Li +2 位作者 Wanwan Zhou Dongjie Liao Shuoyi Zhao 《ZTE Communications》 2013年第2期18-23,共6页
In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and ... In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and security of data stored in the cloud. We discuss policies for access control and data integrity, availability, and privacy. We also discuss several key solutions proposed in current literature and point out future research directions. 展开更多
关键词 cloud storage cloud computing data security privacy-PRESERVING
下载PDF
MobiGemini:Sensitive-Based Data and Resource Protection Framework for Mobile Device 被引量:1
10
作者 Shuangxi Hong Chuanchang Liu +2 位作者 Bo Cheng Bingfei Ren Junliang Chen 《China Communications》 SCIE CSCD 2017年第7期67-77,共11页
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. I... With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP(Ali Pay) on mobile device. Therefore, only encryption cannot protect sensitive APP and privacy data stored on user's smartphone. To address these obstacles, we design a protection system called Mobi Gemini. It enables automatic uninstalling service that can immediately uninstall multiple APP at same time, and also enabling plausibly deniable encryption(PDE) on mobile devices by hiding encrypted volume within random data in free space of cache partition. We improve the key store way of previous PDE schemes on mobile device. The evaluation results show that the scheme introduces a few overhead compared with original android system enabling full disk encryption. 展开更多
关键词 mobile security privacy protection storage encryption deniable encryption
下载PDF
NVM Storage in IoT Devices:Opportunities and Challenges 被引量:1
11
作者 Yang Liu Shan Zhao +4 位作者 Wenhan Chen Xuran Ge Fang Liu Shuo Li Nong Xiao 《Computer Systems Science & Engineering》 SCIE EI 2021年第9期393-409,共17页
Edge storage stores the data directly at the data collection point,and does not need to transmit the collected data to the storage central server through the network.It is a critical technology that supports applicati... Edge storage stores the data directly at the data collection point,and does not need to transmit the collected data to the storage central server through the network.It is a critical technology that supports applications such as edge computing and 5G network applications,with lower network communication overhead,lower interaction delay and lower bandwidth cost.However,with the explosion of data and higher real-time requirements,the traditional Internet of Things(IoT)storage architecture cannot meet the requirements of low latency and large capacity.Non-volatile memory(NVM)presents new possibilities regarding this aspect.This paper classifies the different storage architectures based on NVM and compares the system goals,architectures,features,and limitations to explore new research opportunities.Moreover,the existing solutions to reduce the write latency and energy consumption and increase the lifetime of NVM IoT storage devices are analyzed.Furthermore,we discuss the security and privacy issues of IoT devices and compare the mainstream solutions.Finally,we present the opportunities and challenges of building IoT storage systems based on NVM. 展开更多
关键词 IOT NVM storage system energy efficiency security and privacy
下载PDF
HealthyBlockchain for Global Patients
12
作者 Shada A.Alsalamah Hessah A.Alsalamah +1 位作者 Thamer Nouh Sara A.Alsalamah 《Computers, Materials & Continua》 SCIE EI 2021年第8期2431-2449,共19页
An emerging healthcare delivery model is enabling a new era of clinical care based on well-informed decision-making processes.Current healthcare information systems(HISs)fall short of adopting this model due to a conf... An emerging healthcare delivery model is enabling a new era of clinical care based on well-informed decision-making processes.Current healthcare information systems(HISs)fall short of adopting this model due to a conflict between information security needed to implement the new model and those already enforced locally to support traditional care models.Meanwhile,in recent times,the healthcare sector has shown a substantial interest in the potential of using blockchain technology for providing quality care to patients.No blockchain solution proposed so far has fully addressed emerging cross-organization information-sharing needs in healthcare.In this paper,we aim to study the use of blockchain in equipping struggling HISs to cope with the demands of the new healthcare delivery model,by proposing HealthyBlockchain as a granular patient-centered ledger that digitally tracks a patient’s medical transactions all along the treatment pathway to support the care teams.The patient-centered ledger is a neutral tamper-proof trail timestamp block sequence that governs distributed patient information across the decentralized discrete HISs.HealthyBlockchain connects patients,clinicians,and healthcare providers to facilitate a transparent,trustworthy,and secure supporting platform. 展开更多
关键词 Blockchain EHEALTH electronic health record global patient healthcare information system information security legacy system patient-centered care privacy smart contract trust
下载PDF
Efficient Security Sequencing Problem over Insecure Channel Based on Homomorphic Encryption
13
作者 Mingxu Yi Lifeng Wang Yunpeng Ma 《China Communications》 SCIE CSCD 2016年第9期195-202,共8页
In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure mult... In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure multipart computation is more and more popular in anonymous voting and online auction.In the present study,related secure computation protocol for sequencing problem is not many by far.In order to improve the efficiency and safety,we propose a security sequencing protocol based on homomorphic encryption.We also give analysis of correctness and security to highlight its feasibility. 展开更多
关键词 homomorphic encryption privacy sequencing problem secure multipart compu- tation information transformation
下载PDF
Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography
14
作者 B.Murugeshwari D.Selvaraj +1 位作者 K.Sudharson S.Radhika 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期839-851,共13页
Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from... Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from numerous remote databases.Mining algorithms can obtain sensitive information once the data is in the data warehouse.Many traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud platform.These strategies are primarily concerned with protecting the privacy of user data.This study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve infinitefields.This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques.Also,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data.Average approximation error,computational cost,anonymizing time,and data loss are considered performance measures.The suggested approach is practical and applicable in real-world situations according to the experimentalfindings. 展开更多
关键词 Data mining CRYPTOGRAPHY privacy preserving elliptic curve information security
下载PDF
Route Planning for Autonomous Transmission of Large Sport Utility Vehicle
15
作者 V.A.Vijayakumar J.Shanthini +1 位作者 S.Karthik K.Srihari 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期659-669,共11页
The autonomous driving aims at ensuring the vehicle to effectively sense the environment and use proper strategies to navigate the vehicle without the interventions of humans.Hence,there exist a prediction of the back... The autonomous driving aims at ensuring the vehicle to effectively sense the environment and use proper strategies to navigate the vehicle without the interventions of humans.Hence,there exist a prediction of the background scenes and that leads to discontinuity between the predicted and planned outputs.An optimal prediction engine is required that suitably reads the background objects and make optimal decisions.In this paper,the author(s)develop an autonomous model for vehicle driving using ensemble model for large Sport Utility Vehicles(SUVs)that uses three different modules involving(a)recognition model,(b)planning model and(c)prediction model.The study develops a direct realization method for an autonomous vehicle driving.The direct realization method is designed as a behavioral model that incorporates three different modules to ensure optimal autonomous driving.The behavioral model includes recognition,planning and prediction modules that regulates the input trajectory processing of input video datasets.A deep learning algorithm is used in the proposed approach that helps in the classification of known or unknown objects along the line of sight.This model is compared with conventional deep learning classifiers in terms of recall rate and root mean square error(RMSE)to estimate its efficacy.Simulation results on different traffic environment shows that the Ensemble Convolutional Network Reinforcement Learning(E-CNN-RL)offers increased accuracy of 95.45%,reduced RMSE and increased recall rate than existing Ensemble Convolutional Neural Networks(CNN)and Ensemble Stacked CNN. 展开更多
关键词 Artificial intelligence information system security and privacy fuzzy modelling deep neural networks machine learning reinforcement learning CNN SUV
下载PDF
基于区块链的农产品供应链溯源研究综述 被引量:1
16
作者 胡祥培 都牧 +2 位作者 孔祥维 朱姗 张源凯 《管理科学学报》 CSSCI CSCD 北大核心 2024年第5期1-12,共12页
中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块... 中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块链的农产品供应链溯源系统的实际需求以及应用实践出发,对区块链技术及应用、区块链中的隐私保护与农产品信息安全、信任传递与融合方法这三个方面对国内外相关研究进行综述,并据此提出我国建设这类溯源系统的两个核心难题--“如何建”和“如何查”.针对这两个难题,从管理科学视角各提出四类关键科学问题,展望未来研究的发展趋势,并从应用实践层面提出基于区块链的农产品供应链溯源系统的发展建议. 展开更多
关键词 农产品供应链 区块链 质量追溯 隐私保护与信息安全 信任传递与融合
下载PDF
物联网技术下电网标识信息未授权窃取风险预测
17
作者 吕华辉 杨航 +2 位作者 林志达 李慧娟 付志博 《中国电力》 CSCD 北大核心 2024年第12期206-212,共7页
电网领域通常具有复杂的网络拓扑结构。为了降低电网安全风险,提出物联网技术下电网标识信息未授权窃取风险预测方法。通过物联网技术和漏洞扫描工具,量化电网标识信息未授权窃取的风险,并考虑不同漏洞的严重性,采用模糊层次分析法进行... 电网领域通常具有复杂的网络拓扑结构。为了降低电网安全风险,提出物联网技术下电网标识信息未授权窃取风险预测方法。通过物联网技术和漏洞扫描工具,量化电网标识信息未授权窃取的风险,并考虑不同漏洞的严重性,采用模糊层次分析法进行分险评估。研究结果表明:所提方法预测误差数值较小,设备认证强度高。 展开更多
关键词 物联网技术 电网标识信息 隐私泄露 安全漏洞
下载PDF
密码应用:从安全通信到数据可用不可见
18
作者 任奎 张秉晟 张聪 《密码学报(中英文)》 CSCD 北大核心 2024年第1期22-44,共23页
随着信息革命的浪潮,计算机、互联网、物联网、人工智能等领域飞速发展,网络空间已成为现代社会的重要组成部分,并在各个方面改变着人们的生活生产方式.另一方面,网络空间快速发展导致的信息泄漏、隐私侵犯等问题愈发严峻,人们对数据安... 随着信息革命的浪潮,计算机、互联网、物联网、人工智能等领域飞速发展,网络空间已成为现代社会的重要组成部分,并在各个方面改变着人们的生活生产方式.另一方面,网络空间快速发展导致的信息泄漏、隐私侵犯等问题愈发严峻,人们对数据安全与隐私保护的需求也日益高涨.面向不断增加的安全与隐私需求,相关密码技术持续演进,并广泛应用于金融、医疗、教育、政务等各个领域,以确保对敏感信息和数据资产的安全保护.本文围绕信息技术在不同发展阶段下的重要应用场景及研究热点,聚焦互联网信息传输、云端存储、区块链加密货币、电子投票、Web3.0以及隐私计算,阐释密码技术在相关领域典型应用示范. 展开更多
关键词 密码应用 隐私保护 信息安全
下载PDF
元宇宙环境下的身份认证综述
19
作者 邓淼磊 翟浩南 +1 位作者 马米米 左志斌 《计算机工程与应用》 CSCD 北大核心 2024年第11期1-16,共16页
传统网络环境中的身份认证方案是按照自身环境的特点进行设计,难以满足元宇宙环境中的设计需求。为解决元宇宙环境中的身份认证问题,对元宇宙的特征、属性、应用场景特点和面临的主要攻击威胁进行了研究;对元宇宙中的用户、化身、平台... 传统网络环境中的身份认证方案是按照自身环境的特点进行设计,难以满足元宇宙环境中的设计需求。为解决元宇宙环境中的身份认证问题,对元宇宙的特征、属性、应用场景特点和面临的主要攻击威胁进行了研究;对元宇宙中的用户、化身、平台、可穿戴设备以及通信相关的身份隐私和安全风险进行了讨论;梳理元宇宙环境下与身份认证相关的工作,并将其归纳为用户与化身、用户与平台服务器、用户与可穿戴设备的认证。最后,讨论了元宇宙环境下身份认证机制的研究方向。 展开更多
关键词 身份认证 元宇宙 身份信息 身份隐私 安全风险
下载PDF
无人值守能源平台数据库信息安全存储算法
20
作者 刘鹏 张辉 《微型电脑应用》 2024年第8期198-202,共5页
数据库中存储着大量的敏感数据,而无人值守能源平台通常需要通过公共网络进行数据传输和远程访问,这增加了被黑客攻击的风险。针对无人值守能源平台信息存储过程中可能受到安全威胁的问题,提出无人值守能源平台数据库信息安全存储算法... 数据库中存储着大量的敏感数据,而无人值守能源平台通常需要通过公共网络进行数据传输和远程访问,这增加了被黑客攻击的风险。针对无人值守能源平台信息存储过程中可能受到安全威胁的问题,提出无人值守能源平台数据库信息安全存储算法。根据按需压缩思想建立自适应压缩算法,计算采样时段内能源平台数据变化量均值,以判定采样频率的变化情况。引入A^(*)算法寻优采样频率,自适应采集并压缩能源平台数据。结合动态密钥选择技术和混沌加密算法构建双重加密算法,用于数据库信息的加密,保障能源平台数据库信息的安全。通过使用强度和带宽占用概率控制超带宽存储并依据最小传输粒度控制超带宽梯度传输,实现无人值守能源平台数据库信息安全存储。实验结果表明,所提算法存储安全性高、存储耗时短、通信开支低和读写平均延迟短,且数据完整性高。 展开更多
关键词 无人值守能源平台 A^(*)算法 信息安全存储 信息压缩 信息加密
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部