用户恶意跨域数据安全加密共享算法仿真  

Simulation of Malicious Cross Domain Data Security Encryption and Sharing Algorithm for User

在线阅读下载全文

作  者:王葵[1] 吴玲红[1] 戴仕明[2] WANG Kui;WU Ling-hong;DAI Shi-ming(School of Computer Information Engineering,Nanchang Institute of Technology,Nanchang Jiangxi 330044,China;School of Software,Jiangxi Agricultural University,Nanchang Jiangxi 330044,China)

机构地区:[1]南昌理工学院计算机信息工程学院,江西南昌330044 [2]江西农业大学软件学院,江西南昌330044

出  处:《计算机仿真》2024年第10期200-203,361,共5页Computer Simulation

摘  要:在跨域数据共享场景下,涉及到多个组织或多个域的用户参与,为了保证数据安全,避免隐私信息泄露,提出了支持恶意用户追踪的跨域数据安全共享算法。将基于密文策略的属性基加密方法与白盒追踪算法和黑盒追踪算法结合。设计恶意用户追踪机制,实现对恶意用户的有效追踪。将对称加密算法和非对称加密算法相结合,生成公钥、私钥和密钥,对数据展开加解密处理,实现跨域数据安全共享。实验结果表明,所提算法的数据安全共享效果较高,在不同实验环境下均能够保持较低的内存,且信息熵较高,能够确保数据的安全性。In the scenario of cross domain data sharing,involving the participation of multiple organizations or users from multiple domains,in order to ensure data security and avoid privacy information leakage,a cross domain data security sharing algorithm that supports malicious user tracking is proposed.The attribute-based encryption method based on ciphertext policy is combined with white-box tracking algorithm and black-box tracking algorithm.The malicious user tracking mechanism is designed to realize the effective tracking of malicious users.The symmetric encryption algorithm and asymmetric encryption algorithm are combined to generate public key,private key and key to encrypt and decrypt the data to realize the cross-domain data security sharing.The experimental results show that the proposed algorithm has high data security sharing effect,and can maintain low memory and high information entropy under different experimental environments to ensure the security of data.

关 键 词:恶意用户追踪 跨域数据 数据安全共享 对称加密算法 非对称加密算法 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象