Parts inventory information integrated security technology of automobile industry chain SaaS platform

被引:0
|
作者
Yang J. [1 ]
Sun L. [2 ]
Wu Q. [1 ]
机构
[1] School of Information Science and Technology, Southwest Jiaotong University, Chengdu
[2] CAD Engineering Center, Southwest Jiaotong University, Chengdu
关键词
Automobile industry chain; Encryption algorithm; Key distribution; Parts inventory information; SaaS platform; Signature technology;
D O I
10.13196/j.cims.2020.05.013
中图分类号
学科分类号
摘要
Aiming at the possible security problems of submission, storage and invocation of collaborative enterprise registration information, and the integration and transmission of accessory inventory information web services in the process of dynamic integration of multi-source parts inventory information on the automotive industry chain collaborative SaaS platform, the multi-source parts information dynamic integration security model of SaaS platform was built, and the abstract mathematical description for model was implemented. The secure integration of accessory inventory information was realized through the proposed security signature technology, encryption algorithm, key distribution scheme and calling strategy. The security and feasibility analysis of the proposed model and algorithm were carried out to verify the availability and effectiveness of the security integration scheme. © 2020, Editorial Department of CIMS. All right reserved.
引用
收藏
页码:1277 / 1285
页数:8
相关论文
共 20 条
  • [1] YANG Jingya, SUN Linfu, WANG Shuying, Information dynamic integration technology of parts inventory for collaborative platform of automobile industrial chains, Application Research of Computers, 31, 4, pp. 1063-1066, (2014)
  • [2] FENG Dengguo, ZHANG Min, ZHANG Yan, Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
  • [3] ZHANG Yuqing, WANG Xiaofei, LIU Xuefeng, Et al., Review of cloud computing environment security, Journal of Software, 27, 6, pp. 1328-1348, (2016)
  • [4] ALI M, KHAN S U, VASILAKOS A V., Security incloud computing: opportunities and challenges, Information Sciences, 305, pp. 357-383, (2015)
  • [5] REN Lei, ZHANG Lin, TAO Fei, Et al., Cloud manufacturing: from concept to practice, Enterprise Information Systems, 9, 2, pp. 186-209, (2015)
  • [6] YING Wenlan, LI Aiping, XU Liyun, Research on the authentication strategy of ASP mode-based networked manufacturing system, Proceedings of IEEE/ASME International Conference on Advanced Intelligent Mechatronics, pp. 1014-1017, (2008)
  • [7] CHEN Jing, SUN Linfu, One-time password authentication method based on double random soft input model, Journal of Sichuan University: Engineering Science Edition, 42, 2, pp. 154-159, (2010)
  • [8] YANG Liu, WANG Shuying, SUN Linfu, Research on industrial chain coordination SaaS platform tenant identity authentication configuration technology, Journal of Computer Applications, 32, 10, pp. 3030-3035, (2015)
  • [9] WANG Cong, REN Kaili, LOU Wenjing, Et al., Toward publicly auditable secure cloud data storage services, IEEE Network, 24, 4, pp. 19-24, (2010)
  • [10] ZHANG Xiuqin, WANG Shuying, Data transmission security technology of automotive industry chain collaborative commerce platform, Computer Engineering and Design, 33, 10, pp. 3751-3756, (2012)