融合矩阵分析模型的跨域虚拟网络源节点隐私位置信息保护方法  被引量:1

A Method for Protecting Private Location Information of Source Nodes in Cross Domain Virtual Networks Based on Matrix Analysis Model

在线阅读下载全文

作  者:金玮[1] 孙新 JIN Wei;SUN Xin(Xinhua Hospital Affiliated to Shanghai Jiaotong University School of Medicine,Shanghai 200092,China)

机构地区:[1]上海交通大学医学院附属新华医院,上海200092

出  处:《微型电脑应用》2023年第10期126-129,137,共5页Microcomputer Applications

摘  要:为了提升跨域虚拟网络安全性,提出融合矩阵分析模型的跨域虚拟网络源节点隐私位置信息保护方法。该方法使用用户网络源节点隐私位置信息,生成跨域虚拟网络源节点隐私位置信息矩阵,建立维度相同秩为1的矩阵;利用融合矩阵分析方式,将矩阵与跨域虚拟网络源节点隐私位置信息矩阵进行融合后,生成跨域虚拟网络源节点隐私位置信息可逆矩阵,并将该矩阵看做网络源节点隐私位置信息保护密钥;同时以该密钥为基础,利用跨域虚拟网络源节点隐私位置信息保护方案,对需要保护的用户网络源节点位置隐私信息矩阵进行加密、云服务器解密等操作,实现网络源节点隐私位置信息保护。实验结果表明:该方法可有效保护跨域虚拟网络源节点隐私位置信息,提升跨域虚拟网络的安全性。In order to improve the security of cross domain virtual networks,a method for protecting the private location information of source nodes in cross domain virtual networks based on matrix analysis model is proposed.This method uses the private location information of the user network source node to generate a cross domain virtual network source node private location information matrix,and then establishes a matrix with the same dimension and rank 1.Using the fusion matrix analysis method,the matrix is fused with the cross domain virtual network source node private location information matrix to generate a cross domain virtual network source node private location information invertible matrix.The matrix is regarded as a privacy location information protection key for network source nodes.Based on this key,a cross domain virtual network source node privacy location information protection scheme is used to encrypt and decrypt the user network source node location privacy information matrix that needs to be protected,to achieve privacy location information protection for network source nodes.Experimental results show that this method can effectively protect the private location information of source nodes in cross domain virtual networks,and improve the security of cross domain virtual networks.

关 键 词:矩阵分析模型 网络源节点 隐私位置 信息保护 可逆矩阵 加密方案 

分 类 号:TP391[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象