Security model and design of network communication system based on data encryption algorithm

被引:0
|
作者
Ma, Xiaoshu [1 ]
Liu, Qing [1 ]
机构
[1] Tianshui Normal Univ, Sch Elect Informat & Elect Engn, Tianshui 741000, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
data encryption; network communication; system security; data encryption algorithms; cloud machine learning services; PRIVACY; SUPPORT; BLOCKCHAIN;
D O I
10.1504/IJAACS.2021.114278
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementing cryptographic services based on network communication systems, improving data encryption algorithms, and providing basic support for secure communication technologies use homomorphic encryption to secure network communications systems data security in the process of communicating with cloud machine learning services; transplant cloud machine learning models into network communication systems, directly compute machine learning models based on network communication systems, and perform traffic intrusion detection. According to the software design and development process, the use case diagram has been used to analyse the requirements of the middleware system, and abstract the functional modules that the middleware system should have. Then, the overall structure of the middleware system is designed, the overall process of the system is determined, and each functional module is designed in detail, and then the interaction and dependencies between the modules are determined through the sequence diagram.
引用
收藏
页码:83 / 97
页数:15
相关论文
共 50 条
  • [1] Research on the Security Protection of Network Communication Data Using DES Encryption Algorithm
    Wang, Tao
    Wang, Jia
    [J]. International Journal of Network Security, 2022, 24 (04) : 741 - 746
  • [2] Data Security in Local Area Network Based on Fast Encryption Algorithm
    Ramesh, G.
    Umarani, R.
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 11 - +
  • [3] Research on an optimised encryption algorithm for network information security communication
    Li, Ju
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (01) : 31 - 46
  • [4] Design of Encryption Algorithm for Communication Network Information Transmission Based on Fuzzy Control Algorithm
    Yang, Wenhu
    Li, Xianwei
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2020, 48 (3-4) : 295 - 314
  • [5] The Spatial Data Sharing Security Model Based on Hybrid Encryption Algorithm
    Wang, Di
    Lva, Yanli
    Chen, Yuxi
    Yang, Ruxia
    [J]. INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND ROBOTICS 2021, 2021, 11884
  • [6] A hybrid hiding encryption algorithm (HHEA) for data communication security
    Shaar, M
    Saeb, M
    Badawi, U
    Elmessiery, M
    [J]. PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 476 - 478
  • [7] Research on neural network chaotic encryption algorithm in wireless network security communication
    Liang, Chen
    Zhang, Qun
    Ma, Jianfeng
    Li, Kaiming
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [8] Research on neural network chaotic encryption algorithm in wireless network security communication
    Chen Liang
    Qun Zhang
    Jianfeng Ma
    Kaiming Li
    [J]. EURASIP Journal on Wireless Communications and Networking, 2019
  • [9] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [10] The Application of Data Encryption Technology in Computer Network Communication Security
    Liu, Guanxiu
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022