Users' Privacy Protection Algorithm and Architecture Based on CAE Integration Platform

被引:0
|
作者
Wang, Jiening [1 ]
Lin, Yaping [1 ]
Liu, Yonghe [1 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
关键词
Privacy protect; Selective encryption; Scrambling; Trust server;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Users' privacy protection problems of CAE integration platform based on Super Computation are always the first concern for users who using the platform. Most of the existing privacy protection schemes use the traditional encryption schemes, but massive data processing time of traditional encryption algorithms is too long, and data storage space is very large. To solve these problems, this paper proposed a data privacy protection algorithm based on data scrambling and selective encryption. For identifiable information protection, this paper presents a cloud storage architecture based on Third-party Trusted Server (TPTS), which achieves the isolates the data storage and the personal information management. The middleware server decides whether customers have the right to store personal data according to the storage authentication code provided the trust server. The experiment results show that the proposed algorithm can effectively improve big data encryption and decryption speed and the proposed architecture can not only ensure the security of the data storage, but also well protect users' privacy.
引用
收藏
页码:250 / 256
页数:7
相关论文
共 50 条
  • [41] SERVICE ORIENTED ARCHITECTURE BASED DOCKSIDE CONTAINER CRANE CAD/CAE INTEGRATION SYSTEM
    Li, Hua
    Wang, Chonghua
    Rong, Yiming
    ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, PROCEEDINGS, VOL 2, PTS A AND B, 2010, : 549 - 557
  • [42] Research on Enterprise Data Integration Architecture Based on Cloud Platform
    Zhang, Wei-wei
    Wu, Heng-liang
    PROCEEDINGS OF THE 3D INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE RESEARCH, 2016, 105 : 629 - 632
  • [43] Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm
    Wu, Faguo
    Zhou, Bo
    Jiang, Jie
    Lei, Tianyu
    Song, Jiale
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (01): : 957 - 973
  • [44] Research on Background Privacy Protection Algorithm Based on Image Fogging
    Pan, Peirong
    Liang, Xiyin
    2024 INTERNATIONAL CONFERENCE ON ELECTRONIC ENGINEERING AND INFORMATION SYSTEMS, EEISS 2024, 2024, : 98 - 102
  • [45] Privacy protection method for process mining based on genetic algorithm
    Gao J.
    Yan S.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (10): : 3256 - 3264
  • [46] Privacy Protection Algorithm Based on Random Annular Region in WSN
    Bai, Leqiang
    Zhu, Hongshu
    Li, Guoku
    PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 64 - 67
  • [47] A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration
    Dubovitskaya, Alevtina
    Urovi, Visara
    Vasirani, Matteo
    Aberer, Karl
    Schumacher, Michael I.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 585 - 598
  • [48] Mobile Location Privacy Protection Algorithm Based on PSO Optimization
    Li J.
    Bai Z.-H.
    Yu R.-Y.
    Cui Y.-M.
    Wang X.-W.
    Jisuanji Xuebao/Chinese Journal of Computers, 2018, 41 (05): : 1037 - 1051
  • [49] Privacy Law Protection Based on the Information Security Assurance Algorithm
    Wang, Zhanjiang
    Yue, Qifeng
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [50] Study on Privacy Protection Algorithm Based on K-Anonymity
    Zhao FeiFei
    Dong LiFeng
    Wang Kun
    Li Yang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490