Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 9 von 405
International journal of system assurance engineering and management, 2023-08, Vol.14 (4), p.1379-1386
2023

Details

Autor(en) / Beteiligte
Titel
Data access control method of cloud network secure storage under Social Internet of Things environment
Ist Teil von
  • International journal of system assurance engineering and management, 2023-08, Vol.14 (4), p.1379-1386
Ort / Verlag
New Delhi: Springer India
Erscheinungsjahr
2023
Link zum Volltext
Quelle
SpringerLink (Online service)
Beschreibungen/Notizen
  • The reliability interception of network attack is realized by data access control in network security storage area, and the data security in network is guaranteed. The traditional free link decentralized control model is used to control the data access in the secure storage area of the network. The data access control system of network security storage area includes communication library, protocol base, core control library and resource library. The association rule feature extraction method is used to design the data mining and attack detection algorithm of the network security storage area, which is the core of the data access control system software in the network security storage area. The kernel of the optimal interface in the network security storage area is set up by SDICmdCon register, and the software development of data access control in the network security storage area is realized by the adaptive partition weighted interface scheduling under the embedded Linux environment. This paper considers the novel perspective the data access control method of cloud network secure storage under Social Internet of Things environment. The simulation results show that the model is accurate for data mining and attack detection in the network security storage area, and the security of data access control is improved, which ensures the network security 21% higher than the traditional methods.

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX