期刊文献+
共找到207篇文章
< 1 2 11 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 data encryption data decryption Communication security data storage encryption Key management
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
2
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
Research on the File Encryption and Programming based on Matrix Transformation
3
作者 Jiangtao Geng Qi Huang 《International Journal of Technology Management》 2013年第1期24-26,共3页
Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt f... Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software. 展开更多
关键词 linear transformation file encryption and decryption matrix vc source code
在线阅读 下载PDF
Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption
4
作者 Xi Lin Yiliang Han 《国际计算机前沿大会会议论文集》 2017年第1期54-55,共2页
To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access c... To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is too single and soon on,we design a hierarchical access control scheme of private data based on attribute encryption.First,we construct a new algorithm based on attribute encryption,which divides encryption into two phases,and we can design two types of attributes encryption strategy to make sure that different users could get their own decryption keys corresponding to their permissions.We encrypt the private data hierarchically with our algorithm to realize“precise”,“more accurate”,“fuzzy”and“private”four management modes,then users with higher permissions can access the private data inferior to their permissions.And we outsource some complex operations of decryption to DSP to ensure high efficiency on the premise of privacy protection.Finally,we analyze the efficiency and the security of our scheme. 展开更多
关键词 data SHARING HIERARCHICAL access control ATTRIBUTE encryption OUTSOURCING decryption
在线阅读 下载PDF
基于ZYNQ的图像采集加密传输系统设计与实现
5
作者 于波 刘双进 +1 位作者 张海涛 李庆松 《化工自动化及仪表》 2025年第5期744-753,共10页
为了保障图像数据采集与传输过程中的数据安全,基于ZYNQ平台设计图像采集加密传输系统。系统以ZYNQ异构多核处理器为核心,结合可编程逻辑(PL)与处理系统(PS)的优势,利用PL高速并行能力配置图像传感器接口,实现图像实时采集与SM4算法加... 为了保障图像数据采集与传输过程中的数据安全,基于ZYNQ平台设计图像采集加密传输系统。系统以ZYNQ异构多核处理器为核心,结合可编程逻辑(PL)与处理系统(PS)的优势,利用PL高速并行能力配置图像传感器接口,实现图像实时采集与SM4算法加速加密,加密图像数据经PS端以太网传至上位机,由上位机软件接收解密。实验证明该系统可以完成图像实时采集与加密传输以及解密任务,提升了图像采集传输的实时性和安全性,具有实用价值与良好前景。 展开更多
关键词 数据安全 ZYNQ SM4 QT 图像 加密 解密
在线阅读 下载PDF
人工智能技术在计算机通信数据加密中的应用
6
作者 乔亚丽 《通信电源技术》 2025年第17期192-194,共3页
基于计算机通信系统中加密处理性能瓶颈与密钥管理难题,对智能技术在加密算法优化、密钥动态调度与解密策略自适应调整中的应用机制进行系统研究。阐述相关模型在多类型网络数据中的训练方式与决策逻辑,介绍其在5G边缘通信与高并发场景... 基于计算机通信系统中加密处理性能瓶颈与密钥管理难题,对智能技术在加密算法优化、密钥动态调度与解密策略自适应调整中的应用机制进行系统研究。阐述相关模型在多类型网络数据中的训练方式与决策逻辑,介绍其在5G边缘通信与高并发场景下的部署架构与运行流程。人工智能技术的应用在加密处理效率、安全性和资源调度优化方面相较传统方案取得了显著提升,特别在高并发和复杂通信环境中展现出更强的适应性和实际部署潜力。 展开更多
关键词 计算机通信 数据加密 智能密钥管理 解密调度 性能优化
在线阅读 下载PDF
车辆社交网络中可撤销的数据共享方案
7
作者 许艳 潘雨桐 +1 位作者 张经纬 施俊 《西安邮电大学学报》 2025年第4期97-105,共9页
为了降低车辆社交网络(Vehicular Social Networks,VSNs)中数据共享方案的通信和计算开销,实现车辆间的实时通信,提出一个轻量级可撤销的VSNs数据共享方案(Revocable Data Sharing Scheme,RDSS)。该方案通过基于属性加密的与门访问结构... 为了降低车辆社交网络(Vehicular Social Networks,VSNs)中数据共享方案的通信和计算开销,实现车辆间的实时通信,提出一个轻量级可撤销的VSNs数据共享方案(Revocable Data Sharing Scheme,RDSS)。该方案通过基于属性加密的与门访问结构,使得密文及密钥长度固定,从而减少用户的计算开销,实现轻量级且细粒度的数据共享。此外,当有用户被撤销时,通过将撤销列表嵌入密文,使得未撤销的用户无需更新密钥仍可有效地访问数据,减小用户的计算开销。安全性分析结果表明,在判定性双线性Diffie-Hellman困难假设下RDSS能够抵抗选择明文攻击。性能分析结果表明,即使属性数量增加,RDSS仍保持常数级的计算开销和通信开销,更适用于VSNs中资源受限的车辆终端。 展开更多
关键词 数据共享 基于属性加密 撤销机制 可验证外包解密 隐私保护
在线阅读 下载PDF
基于区块链的政务数据共享方案研究
8
作者 罗振华 唐寅 《现代电子技术》 北大核心 2025年第18期22-28,共7页
随着国家数字政府的发展,政府部门间安全可靠的数据共享已成为研究热点。政务部门间的信息共享有助于强化政府机构的管理,提高政府机构的治理和服务水平,发掘政务数据中的经济价值和社会价值。在传统的政务数据管理体系中,数据往往通过... 随着国家数字政府的发展,政府部门间安全可靠的数据共享已成为研究热点。政务部门间的信息共享有助于强化政府机构的管理,提高政府机构的治理和服务水平,发掘政务数据中的经济价值和社会价值。在传统的政务数据管理体系中,数据往往通过集中式的存储方式进行保存,但这容易造成数据隐私泄露、单点故障、“数据孤岛”等问题。为解决该问题,提出一种基于区块链的政务数据共享方案。该方案用属性基加密方案加密政务数据,对数据请求者的属性进行了限制;改进了属性基加密方案,增加了访问控制中的细粒度和减少了计算开销;采用星际文件系统存储数据,缓解了区块链系统的存储压力。安全性分析和仿真实验结果表明,所提方案可满足政务数据安全共享的需求,为跨部门数据安全共享提供了一种可行方案。 展开更多
关键词 政务数据共享 区块链 属性基加密 访问控制 星际文件系统 数据存储
在线阅读 下载PDF
基于商用密码算法的水利工控协议安全加固技术
9
作者 葛创杰 荆芳 +1 位作者 王戈飞 袁世冲 《人民长江》 北大核心 2025年第5期210-215,共6页
针对水利工控系统面临的数据监听、数据篡改、数据伪造等安全风险,基于商用密码算法,开展数据安全传输技术研究,确保水利系统中工业以太网数据和现场总线数据传输的机密性、完整性和真实性。在分析当前水利工控系统面临的数据传输风险... 针对水利工控系统面临的数据监听、数据篡改、数据伪造等安全风险,基于商用密码算法,开展数据安全传输技术研究,确保水利系统中工业以太网数据和现场总线数据传输的机密性、完整性和真实性。在分析当前水利工控系统面临的数据传输风险的基础上,针对工业以太网和现场总线2类通信协议进行安全加固设计,完成了密码模块设计,开展了多场景安全性测试与分析。经某水务基地水利一体化闸门现场测试,2类协议下各通讯主体间分别收发数据10000次,其中工业以太网层共计成功收发数据10000次,失败0次,加密前后平均延时0.25 ms;现场总线层共计成功收发数据9977次,失败23次,加密前后平均延时269.28 ms。另外,开展了身份仿冒、数据窃取、数据篡改攻击测试。结果表明:该方法加解密成功率高,时延低,运行稳定,能够抵御外部攻击,在不影响业务运转前提下,可有效保障水利工控场景下的数据通信安全。 展开更多
关键词 水利工控系统 数据传输风险 数据加解密 协议加固 商用密码算法 通信安全
在线阅读 下载PDF
面向大规模电力工程数据交互平台的信息安全策略
10
作者 叶世海 丁祝利 《电子设计工程》 2025年第7期122-125,130,共5页
为了保障电力工程数据信息传递的安全性,文中提出一种基于高级加密标准(AES)和MD5认证算法相融合的大规模电力工程数据交互平台的信息安全策略,并基于Hadoop平台搭建了相应的模型。以传统AES加密算法为基础,选用CBC模式提出了AES-128-CB... 为了保障电力工程数据信息传递的安全性,文中提出一种基于高级加密标准(AES)和MD5认证算法相融合的大规模电力工程数据交互平台的信息安全策略,并基于Hadoop平台搭建了相应的模型。以传统AES加密算法为基础,选用CBC模式提出了AES-128-CBC加解密算法,确保数据传输的保密性,并构建了相应的数据加密模块与解密模块。同时,基于MD5算法构建了数据认证模块,从而保证数据传递的完整性。以我国西北某地区电力工程数据为算例进行的实验结果表明,所提AESMD5策略明文雪崩性测试结果的平均值为0.509,与理想雪崩效应平均值0.5接近。密文相关系数最大为0.28,证明了所提策略可以保证数据传输的安全性,且数据传输延时最高仅为0.60 ms。 展开更多
关键词 信息交互 电力工程数据 AES MD5 数据加解密
在线阅读 下载PDF
基于大数据算法的政务数据安全共享和自动化传输系统研究
11
作者 龙晶 《电子设计工程》 2025年第17期47-51,共5页
基于在大规模政务数据环境中高效解密政务数据,并提升数据共享的安全性与传输可靠性的目的,采用基于大数据算法的政务数据安全共享和自动化传输系统的方法。通过以太网控制芯片的接收及采用大数据稳定机制的流量匹配算法提升了传输可靠... 基于在大规模政务数据环境中高效解密政务数据,并提升数据共享的安全性与传输可靠性的目的,采用基于大数据算法的政务数据安全共享和自动化传输系统的方法。通过以太网控制芯片的接收及采用大数据稳定机制的流量匹配算法提升了传输可靠性。结合传输模块内的数字信号转换功能,实验通过RJ45接口连接以太网控制芯片向网络设备发送数据。实验结果表明,该系统可有效加解密政务数据,还能高效自动化地传输高达500 GB的政务数据,提升政务数据共享的安全性及自动化传输效果。 展开更多
关键词 大数据算法 政务数据 安全共享 自动化传输 AES算法 加解密数据
在线阅读 下载PDF
可撤销属性加密的区块链数据访问控制方法 被引量:9
12
作者 李健 戚湧 《计算机工程与设计》 北大核心 2024年第2期348-355,共8页
针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进... 针对区块链数据共享中存在的粗粒度访问控制问题,提出一种基于属性撤销密文策略属性基加密的区块链数据访问控制方法。在现有方案基础上进行改造,引入预解密过程,结合属性撤销列表实现属性实时撤销;基于非对称群下的DBDH困难问题假设进行安全性证明;基于超级账本Fabric进行系统设计,结合星际文件系统采用链上链下存储方式解决区块链容量不足和系统效率问题。实验结果表明,所提方案撤销属性时无需更新密钥密文重复上链,仅需要6次Pairing操作进行预解密和解密,且在大规模属性集下,预解密时间和解密时间平均保持在百毫秒左右的常量级上,实现区块链数据高效、细粒度的访问控制。 展开更多
关键词 区块链 数据共享 访问控制 属性基加密 预解密 属性撤销 星际文件系统
在线阅读 下载PDF
Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security
13
作者 S.Prince Chelladurai T.Rajagopalan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期951-960,共10页
Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises mo... Cloud computing offers numerous web-based services.The adoption of many Cloud applications has been hindered by concerns about data security and privacy.Cloud service providers’access to private information raises more security issues.In addition,Cloud computing is incompatible with several industries,including finance and government.Public-key cryptography is frequently cited as a significant advancement in cryptography.In contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data.This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography.Through strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced entities.Both the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure services.The suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of data.Based on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data. 展开更多
关键词 Digital Envelope Cloud computing big data encryption decryption
在线阅读 下载PDF
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
14
作者 Mohammad Anwar Hossain Ahsan Ullah +1 位作者 Newaz Ibrahim Khan Md Feroz Alam 《Journal of Information Security》 2019年第4期199-236,共38页
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no... Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud. 展开更多
关键词 data Security Cloud Computing encryption decryption Secret Key SYMMETRIC ALGORITHM 192 BITS HASHING PERMUTATION SHA-512
在线阅读 下载PDF
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
15
作者 Arif Sari Mehmet Karay 《International Journal of Communications, Network and System Sciences》 2015年第13期567-577,共11页
There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating... There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security. 展开更多
关键词 REACTIVE SECURITY data SECURITY Mobile-Wireless Network PROACTIVE SECURITY encryption decryption CRYPTOGRAPHY
暂未订购
基于区块链和代理重加密的医疗物联网数据安全管理系统 被引量:7
16
作者 柏松 王晓勇 胡胜利 《中国计量大学学报》 2024年第1期80-88,共9页
目的:基于可扩展区块链网络和代理重加密机制,建立医疗IoT数据管理系统,以保障物联网(IoT)智能医疗系统的数据传输安全。方法:将物联网与区块链相结合,通过分布式架构提高远程监测数据的安全性和隐私性。在物联网设备的注册和验证阶段,... 目的:基于可扩展区块链网络和代理重加密机制,建立医疗IoT数据管理系统,以保障物联网(IoT)智能医疗系统的数据传输安全。方法:将物联网与区块链相结合,通过分布式架构提高远程监测数据的安全性和隐私性。在物联网设备的注册和验证阶段,采用零知识证明(ZKP)方法确保数据的完整性。将代理重加密技术与区块链相结合以存储哈希数据,确保系统的安全性,并通过智能合约的设计实现了访问控制。为实现区块链的可扩展性,使用基于星际文件系统(IPFS)的离线数据库来存储数据。此外,为提高数据存储效率,提出了改进工作量证明(PoW)共识机制。结果:所建立的系统可有效抵御各种类型的攻击。IoT节点数量为40个时,系统总注册时间小于100 s,不同事务数量下的区块创建和访问时间均小于200 s。当事务数量为25个时,所提改进PoW算法的交易挖掘时间为0.001 s,优于原PoW算法的0.0024 s。结论:基于区块链和代理重加密技术的数据管理系统,能够确保医疗数据的机密性、完整性和隐私性,且效率优于传统的区块链方法,有助于提高IoT背景下医疗数据的安全管理。 展开更多
关键词 医疗物联网 区块链 数据安全 星际文件系统 工作量证明 代理重加密
在线阅读 下载PDF
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
17
作者 P. Premkumar D. Shanthi 《Circuits and Systems》 2016年第11期3626-3644,共19页
Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them ... Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy. 展开更多
关键词 Cloud Computing data Integrity data Security SHA-1 Digital Signature AES encryption and decryption
在线阅读 下载PDF
Secured Data Transmission Using Modified LEHS Algorithm in Wireless Sensor Network
18
作者 C. Bennila Thangammal D. Praveena P. Rangarajan 《Circuits and Systems》 2016年第8期1190-1198,共9页
In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices... In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the key matrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In this paper a novel modification is performed to the double guard Hill cipher in order to reduce the number of calculation to obtain the cipher text by using non-square matrices. This modified double guard Hill cipher uses a non-square matrix of order (p × q) as its private keymatrix. 展开更多
关键词 encryption decryption Non-Square Matrices Low Energy High Secured data Transmission
在线阅读 下载PDF
数据治理流程体系的建立与安全应用实践 被引量:4
19
作者 李慧 《网络空间安全》 2024年第4期109-114,共6页
[目的/意义]在数据呈爆炸式增长的时代,各单位和部门的数据治理工作愈加复杂化和常态化.然而,由于数据治理工作管理者对其缺乏体系化的认识,数据治理的成果与预期往往存在着较大的差距,"亡羊补牢"式的工作反反复复,极大地挫... [目的/意义]在数据呈爆炸式增长的时代,各单位和部门的数据治理工作愈加复杂化和常态化.然而,由于数据治理工作管理者对其缺乏体系化的认识,数据治理的成果与预期往往存在着较大的差距,"亡羊补牢"式的工作反反复复,极大地挫伤了技术人员的工作积极性.通过对数据治理流程体系和安全应用实践的梳理,可以指导数据治理工作管理者高效开展相关管理工作.[方法/过程]基于项目管理者的视角,结合数据治理工作管理经验,对数据治理涉及的流程进行体系化的梳理和安全应用进行举措化的总结、技术手段的要点化凝炼.[结果/结论]形成一套可被复制的数据治理流程理论体系、5种可操作的数据安全应用举措和3个可借鉴的数据治理技术要点. 展开更多
关键词 数据治理 治理流程 分级分类 加密解密 加签验签 技术手段
在线阅读 下载PDF
基于国密SM4及保形加密算法的文件脱敏系统研究 被引量:1
20
作者 黄俊 刘家甫 曹志威 《计算机测量与控制》 2024年第11期315-321,共7页
针对政务及金融等领域对于内部文件保密要求高,移动介质上存储的文件数据通过传统脱敏方法面临着数据内容量大、数据类型多样导致的脱敏效率低、脱敏内容不彻底等问题,提出了一种基于SM4与FF1结合的混合数据类型文件脱敏系统,该系统通... 针对政务及金融等领域对于内部文件保密要求高,移动介质上存储的文件数据通过传统脱敏方法面临着数据内容量大、数据类型多样导致的脱敏效率低、脱敏内容不彻底等问题,提出了一种基于SM4与FF1结合的混合数据类型文件脱敏系统,该系统通过内容分割脱敏处理任意类型的数据,提升了文件脱敏的范围、准确性和效率;为了进一步减少脱敏系统代码运行的内存消耗,提出了汉字字典库索引转换算法,该算法通过构建待检测明文与汉字编码库的相对索引关系,优化传统脱敏系统中依赖于构建哈希表的键值映射;通过随机生成1000份测试文件进行脱敏测试,基于混合类型的文本不可识别率达到99.8%,脱敏以及内容复原的准确率达到99.9%;通过随机生成10份总大小约为10 MB的测试文件,纯文本类型的脱敏速率平均可达2500字符/秒。 展开更多
关键词 国密SM4 保形加密 数据脱敏 国密算法 文件脱敏系统
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部