Security model and design of network communication system based on data encryption algorithm

被引:0
|
作者
Ma, Xiaoshu [1 ]
Liu, Qing [1 ]
机构
[1] Tianshui Normal Univ, Sch Elect Informat & Elect Engn, Tianshui 741000, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
data encryption; network communication; system security; data encryption algorithms; cloud machine learning services; PRIVACY; SUPPORT; BLOCKCHAIN;
D O I
10.1504/IJAACS.2021.114278
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementing cryptographic services based on network communication systems, improving data encryption algorithms, and providing basic support for secure communication technologies use homomorphic encryption to secure network communications systems data security in the process of communicating with cloud machine learning services; transplant cloud machine learning models into network communication systems, directly compute machine learning models based on network communication systems, and perform traffic intrusion detection. According to the software design and development process, the use case diagram has been used to analyse the requirements of the middleware system, and abstract the functional modules that the middleware system should have. Then, the overall structure of the middleware system is designed, the overall process of the system is determined, and each functional module is designed in detail, and then the interaction and dependencies between the modules are determined through the sequence diagram.
引用
收藏
页码:83 / 97
页数:15
相关论文
共 50 条
  • [41] Mimic Encryption System for Network Security
    Li, Bin
    Zhou, Qinglei
    Si, Xueming
    Fu, Jinhua
    [J]. IEEE ACCESS, 2018, 6 : 50468 - 50487
  • [42] Design and realization of multi-protocol communication model for network security management system
    Dong, Shouling
    Luo, Jiaming
    [J]. ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2007, 4847 : 497 - 507
  • [43] A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
    Ahmad, Abusukhon
    Hawashin, Bilal
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 64 - 70
  • [44] Encryption algorithm for network communication information based on binary logistic regression
    Su, Bo
    Yang, Qingyue
    Yang, Jinlong
    Zhang, Manjun
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (02) : 1627 - 1637
  • [45] Intelligent encryption algorithm for network communication parallel data of information release terminal
    Yang, Xiaohong
    Yang, Donghong
    Aue, S.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (04) : 4245 - 4255
  • [46] Data communication network design using genetic algorithm
    Devaraj, D
    Veerakumar, S
    [J]. 2004 2ND INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 612 - 616
  • [47] File Transparent Encryption System Design Based on Security Directory
    Wu, Yuan
    Chenz, Xiaochun
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1742 - 1746
  • [48] Study on Data Security Sharing Model Based on Attribute Encryption
    He, Jindong
    Tang, Zhijun
    Lian, Jiwen
    Wu, Fei
    Zhao, Zhichao
    Xie, Xinzhi
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [49] Design of network information visualization security cognition system based on QSOFM network and FR algorithm
    Zhu, Min
    [J]. Journal of Cyber Security Technology, 2024, 8 (02) : 146 - 162
  • [50] A network security system model - design and implementation
    Luo, J
    Liu, Y
    Amin, N
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON GEARING, TRANSMISSIONS, AND MECHANICAL SYSTEMS, 2000, : 413 - 423