SECURE ENCRYPTED TRANSMISSION OF NETWORK DATA IN CLOUD COMPUTING TECHNOLOGY ENVIRONMENT

被引:0
|
作者
MIAO Z. [1 ]
ZHAO C. [1 ]
机构
[1] Department of information engineering, Guangxi Vocational College of Water Resources and Electric Power, Guangxi, Nanning
来源
Scalable Computing | 2024年 / 25卷 / 04期
关键词
Cloud computing technology; Encrypted transmission; Network data security; Resource scheduling;
D O I
10.12694/scpe.v25i4.2980
中图分类号
学科分类号
摘要
In order to solve the problem of communication data theft in conventional network communication data transmission methods and ensure the security of network communication data transmission, it is necessary to design new network communication data security transmission methods based on cloud computing technology, formulate network communication data security transmission agreements, construct a network communication data security transmission model based on cloud computing technology, and design a network communication data security transmission scheme, implement secure transmission of network communication data. The experimental results show that after using the designed network communication data secure transmission method, the amount of stolen communication data is less than that of conventional methods. This proves that the designed network communication data secure transmission method has high transmission security, good transmission effect, and reliability, and can be used as a reference for subsequent network communication data encryption transmission. © (2024), SCPE.
引用
收藏
页码:2671 / 2678
页数:7
相关论文
共 50 条
  • [1] Secure Search Over Encrypted Data in Cloud Computing
    Bakhtiari, Majid
    Nateghizad, Majid
    Zainal, Anazida
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 290 - 295
  • [2] Research on Secure Storage of Network Data Based on Cloud Computing Technology
    Zhu, Jinfeng
    International Journal of Network Security, 2022, 24 (01) : 68 - 74
  • [3] New construction of secure range query on encrypted data in cloud computing
    Wang, Shao-Hui
    Han, Zhi-Jie
    Chen, Dan-Wei
    Wang, Ru-Chuan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (02):
  • [4] Dynamic access control of encrypted data in cloud computing environment
    Xiang S.
    Zhu Z.
    International Journal of Performability Engineering, 2019, 15 (03) : 969 - 976
  • [5] A Secure Encrypted Classified Electronic Healthcare Data for Public Cloud Environment
    Maathavan, Kirupa Shankar Komathi
    Venkatraman, Santhi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (02): : 765 - 779
  • [6] VBTree: forward secure conjunctive queries over encrypted data for cloud computing
    Wu, Zhiqiang
    Li, Kenli
    VLDB JOURNAL, 2019, 28 (01): : 25 - 46
  • [7] VBTree: forward secure conjunctive queries over encrypted data for cloud computing
    Zhiqiang Wu
    Kenli Li
    The VLDB Journal, 2019, 28 : 25 - 46
  • [8] Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing
    Li, Rui
    Liu, Alex X.
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 697 - 708
  • [9] Secure Encrypted Image Search in Mobile Cloud Computing
    Zou, Qin
    Wang, Jianfeng
    Chen, Xiaofeng
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 572 - 575
  • [10] Similarity Search for Encrypted Images in Secure Cloud Computing
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Yue
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1142 - 1155