A Solution Supporting Secure Transmission of Big Data

被引:0
|
作者
Ling, Haonan [1 ]
Gao, Yan [2 ]
Wang, Huibin [3 ]
Chen, Ming [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Inst Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] China Elect Syst Engn Corp, Beijing 100840, Peoples R China
[3] Chuzhou Univ, Coll Comp & Informat Engn, Chuzhou 239000, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2023年 / 28卷 / 05期
基金
中国国家自然科学基金;
关键词
network secure path; search-transmit model; multi-attribute path optimization; segment routing; network function virtualization; SEGMENT; SYSTEM;
D O I
10.26599/TST.2022.9010058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional Internet protocol networks cannot provide the service of selecting a secure path to transmit various types of data with specific security constraints. First, to solve the "secure path transmission" problem, this paper first proposes a search-transmit model for secure network path transmission, i.e., to find a multi-attribute optimized path that meets the specific security requirements in the search phase, and then transmit the packets along the optimized path in the transmission phase. Second, we propose a solution to the search-transmit model. The idea of the solution is to use the particle swarm optimization algorithm to search for a secure path that meets the multi-attribute requirements and then set the source route on the router to control the packet transmission. Finally, a prototype system based on network function virtualization is developed to evaluate the feasibility and performance of the proposed solution. Experimental results show that the proposed solution outperforms existing algorithms in terms of performance.
引用
收藏
页码:838 / 848
页数:11
相关论文
共 50 条
  • [1] Detection of duplicated data with minimum overhead and secure data transmission for sensor big data
    S. Beulah
    F. Ramesh Dhanaseelan
    Cluster Computing, 2019, 22 : 10467 - 10479
  • [2] Detection of duplicated data with minimum overhead and secure data transmission for sensor big data
    Beulah, S.
    Dhanaseelan, F. Ramesh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10467 - 10479
  • [3] Secure Computation for Big Data
    Malkin, Tal
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 355 - 355
  • [4] Secure transmission for big data based on nested sampling and coprime sampling with spectrum efficiency
    Chen, Junjie
    Liang, Qilian
    Wang, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (14) : 2447 - 2456
  • [5] Resource allocation for heterogeneous multi-core fiber supporting big data transmission
    Zhang, Ye
    Zhang, Qihan
    Cai, Xintong
    Guo, Lei
    2017 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2017, : 562 - 566
  • [6] Big problem, big data, big solution?
    不详
    CHEMISTRY & INDUSTRY, 2015, 79 (09) : 59 - 59
  • [7] A Reference Architecture for Supporting Secure Big Data Analytics over Cloud-Enabled Relational Databases
    Cuzzocrea, Alfredo
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 356 - 358
  • [8] Hadoop-based secure storage solution for big data in cloud computing environment
    Shaopeng Guan
    Conghui Zhang
    Yilin Wang
    Wenqing Liu
    Digital Communications and Networks, 2024, 10 (01) : 227 - 236
  • [9] A Biometric approach to Secure Big Data
    Yadav, Vikash
    Verma, Monika
    Kaushik, Vandana Dixit
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 75 - 79
  • [10] Hadoop-based secure storage solution for big data in cloud computing environment
    Guan, Shaopeng
    Zhang, Conghui
    Wang, Yilin
    Liu, Wenqing
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (01) : 227 - 236