Advertisement

A Network Information Data Protection Scheme Based on Superposition Encryption

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 550)

Abstract

The wide application of virtualization, big data, cloud storage and other technologies has made the data centralized storage increase security risks and leakage risks. For the problem of internal personnel using legal identity and role to steal internal information, this paper proposes a network information data protection architecture based on superposition encryption from the process of data generation, transmission, storage and processing. Based on the framework, including information storage protection based on symmetric cryptography and information transmission protection based on hybrid cryptography, a network information data protection scheme based on superimposed encryption is designed. Finally, the security of the scheme is proved.

Keywords

Centralized storage Information encryption Data protection External attacks Internal stealing 

References

  1. 1.
    Sibi Chakkaravarthy, S., Sangeetha, D., Venkata Rathnam, M., Srinithi, K., Vaidehi, V.: Futuristic cyber-attacks. Int. J. Knowl.-Based Intell. Eng. Syst. 22(3), 195–204 (2018)Google Scholar
  2. 2.
    GuXin.: Studies on trusted secure data services under cloud environment. Wuhan University (2013)Google Scholar
  3. 3.
    MaWenqi.: Research on the cloud and client fusion based user’s data security technology in cloud storage. National University of Defence Technology (2016)Google Scholar
  4. 4.
    Yan, Z., Deng, R.H., Varadharajan, V.: Cryptography and data security in cloud computing. Inf. Sci. 387, 53–55 (2017)CrossRefGoogle Scholar
  5. 5.
    Kaaniche, N., Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. (2017). S014036641730796XGoogle Scholar
  6. 6.
    Kumar, M.: Advanced RSA cryptographic algorithm for improving data security. In: Golden Jubilee Convention CSI- on “digital Life.” December 2018Google Scholar
  7. 7.
    Rajesh, N., Selvakumar, A.A.L.: Association rules and deep learning for cryptographic algorithm in privacy preserving data mining. Cluster Comput. 2, 1–13 (2018)Google Scholar
  8. 8.
    Morales-Sandoval, M., Gonzalez-Compean, J.L., Diaz-Perez, A., et al.: A pairing-based cryptographic approach for data security in the cloud. Int. J. Inf. Secur. 17(4), 441–461 (2018)CrossRefGoogle Scholar
  9. 9.
    Broz, M., Patocka, M., Matyas, V.: Practical cryptographic data integrity protection with full disk encryption extended version (2018)CrossRefGoogle Scholar
  10. 10.
    Yi, H., Nie, Z.: Towards data storage in cryptographic systems: an efficient hardware architecture based on multivariate scheme for secure storage applications. Cluster Comput. (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Information and ElectronicsBeijing Institute of TechnologyBeijingChina
  2. 2.General Office of Supreme People’s ProcuratorateBeijingChina

Personalised recommendations