检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:米捷[1] 张凌超 高彦伟 张昕 阎永华 李政伟 MI Jie;ZHANG Lingchao;GAO Yanwei;ZHANG Xin;YAN Yonghua;LI Zhengwei(College of Computer,Henan University of Engineering,Zhengzhou 451191,China;SIPPR Engineering Group Co.,Ltd.,Zhengzhou 450007,China;Zhengzhou Education Bureau of Zhongyuan District,Zhengzhou 450000,China)
机构地区:[1]河南工程学院计算机学院,河南郑州451191 [2]机械工业第六设计研究院有限公司,河南郑州450007 [3]郑州市中原区教育局,河南郑州450000
出 处:《河南工程学院学报(自然科学版)》2022年第3期48-53,共6页Journal of Henan University of Engineering:Natural Science Edition
摘 要:为提升网络密文数据的安全性、避免密文数据信息泄露,设计了基于私有云安全防护的网络密文数据防泄露方法。首先分析了私有云平台内各虚拟服务节点之间流入和流出的数据量,从而保证网络内部密文数据安全传输;然后利用虚拟机实现对密文数据的杀毒处理及灵活调配;最后采用差分隐私和防泄露追踪防护方法,保护网络密文数据的隐私性、用户权限认证匹配及攻击源的追踪和标记,避免网络密文数据泄露。测试结果表明:该方法的数据分布程度和离散度均在95.5%以上,隐私保护效果良好;转换后的数据分布程度和离散度均高于96.5%,可靠地完成了权限认证匹配,且能够准确识别攻击节点并完成攻击源标记。In order to improve the security of network ciphertext data and avoid the leakage of ciphertext data, this study designed a network ciphertext data leakage prevention method based on private cloud security protection. The method firstly analyzes the inflow and outflow of the private cloud platform and the data traffic between each virtual service node in the platform, so as to control the secure transmission of ciphertext data within the network. Then the virtual machine is used to implement antivirus processing and flexible deployment of ciphertext data. On this basis, differential privacy and anti-leak tracing protection are adopted to protect the privacy of network ciphertext data, user authority authentication matching, and attack source tracing and marking to avoid network ciphertext data leakage. The test results show that the data distribution degree and dispersion degree of this method are more than 95.5%, and the privacy protection effect is good. The distribution degree and dispersion degree of the transformed data are both higher than 96.5%, and the authority authentication matching is completed reliably. Moreover, the method can accurately identify the attack nodes in the nodes and complete the attack source labeling.
关 键 词:私有云 安全防护 网络密文数据 防泄露 攻击源 泄露追踪
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.3