A Solution Supporting Secure Transmission of Big Data

被引:0
|
作者
Ling, Haonan [1 ]
Gao, Yan [2 ]
Wang, Huibin [3 ]
Chen, Ming [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Inst Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] China Elect Syst Engn Corp, Beijing 100840, Peoples R China
[3] Chuzhou Univ, Coll Comp & Informat Engn, Chuzhou 239000, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2023年 / 28卷 / 05期
基金
中国国家自然科学基金;
关键词
network secure path; search-transmit model; multi-attribute path optimization; segment routing; network function virtualization; SEGMENT; SYSTEM;
D O I
10.26599/TST.2022.9010058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional Internet protocol networks cannot provide the service of selecting a secure path to transmit various types of data with specific security constraints. First, to solve the "secure path transmission" problem, this paper first proposes a search-transmit model for secure network path transmission, i.e., to find a multi-attribute optimized path that meets the specific security requirements in the search phase, and then transmit the packets along the optimized path in the transmission phase. Second, we propose a solution to the search-transmit model. The idea of the solution is to use the particle swarm optimization algorithm to search for a secure path that meets the multi-attribute requirements and then set the source route on the router to control the packet transmission. Finally, a prototype system based on network function virtualization is developed to evaluate the feasibility and performance of the proposed solution. Experimental results show that the proposed solution outperforms existing algorithms in terms of performance.
引用
收藏
页码:838 / 848
页数:11
相关论文
共 50 条
  • [31] Secure Data Transmission using Video
    Lemos, Nikita
    Sonawane, Kavita
    Roy, Bidisha
    2015 EIGHTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2015, : 231 - 234
  • [32] Secure Provenance Transmission for Streaming Data
    Sultana, Salmin
    Shehab, Mohamed
    Bertino, Elisa
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (08) : 1890 - 1903
  • [33] Hiding biometric data for secure transmission
    Chung, YW
    Moon, D
    Moon, K
    Pan, S
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 1049 - 1057
  • [34] Data access control in data exchanging supporting big data arena
    Jia, Haoyang
    Sheng, Yimin
    Han, Weili
    Wang, X. Sean
    JOURNAL OF MANAGEMENT ANALYTICS, 2018, 5 (03) : 155 - 169
  • [35] Secure Data Transmission Through Reversible Data Hiding
    Tomy, Linnet
    Namitha, T. N.
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [36] Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks
    Feng, Jingyu
    Lu, Guangyue
    Wang, Honggang
    Wang, Xuanhong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 72 : 140 - 149
  • [37] A Secure Data Transmission Mechanism for Cloud Outsourced Data
    Alhaj, Abdullah
    Aljawarneh, Shadi
    Masadeh, Shadi
    Abu-Taieh, Evon
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (01) : 34 - 43
  • [38] BDLaaS: Big Data Lab as a Service for Experimenting Big Data Solution
    Taher, Yehia
    Haque, Rafiqul
    Hacid, Mohand-Said
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 155 - 159
  • [39] Provable Data Possession Supporting Secure Data Transfer for Cloud Storage
    Yu, Yong
    Ni, Jianbing
    Yu, Yong
    Wu, Wei
    Wang, Yilei
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 38 - 42
  • [40] Survey On The Solution Of Data Skew In Big Data
    Jenifer, M.
    Bharathi, B.
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,