Secure sharing method of network data transmission based on multi-layer encryption technology

نویسندگان

چکیده

In order to ensure the effect of network data transmission in scientific research institutions and avoid information from being attacked damaged, a secure sharing method based on multi-layer encryption technology is proposed. Combined with technology, security protocol constructed integrity initial file. The evaluation system further constructed. path tracked, evaluated tested real time. platform safe massive complex Experiments have proved that processing are significantly improved compared traditional methods, fully meet requirements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

A Model For Secure Data Sharing Using Attribute Based Encryption

The data security concerns and requirements are very essential for social networks or for cloud computing where individuals, organizations, and businesses may outsource their various types of data, including highly sensitive data into the cloud. Always people would like to make their sensitive or private data only accessible to authorized people having some access policies. So in order to share...

متن کامل

Secure Data Sharing in Cloud Environment Using Multi Authority Attribute Based Encryption

Cloud computing, as associate rising computing paradigm, permits users to remotely store their knowledge during a cloud, thus on relish services on-demand. With fast development of cloud computing, additional and additional enterprises can source their sensitive knowledge for sharing during a cloud. To stay the shared knowledge confidential against untrusted cloud service suppliers (CSPs), a na...

متن کامل

Multi-Owner Data Sharing Using Key Policy Attribute-Based Encryption Method in the cloud

There is a Major problem in public clouds about the sharing of documents on attribute based policies, sharing data in a dynamic groups . With the help of advantage of low maintenance, cloud computing gives the effective solution for sharing group resource among cloud users. As the sharing of documents with different keys like attribute based encryption (ABE), and/or proxy re-encryption (PRE) ap...

متن کامل

Optimal Secure Multi-Layer IoT Network Design

With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally multi-layer with the cloud and cellular networks coexisting with the underlaid device-todevice (D2D) communications. The connectiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: E3S web of conferences

سال: 2021

ISSN: ['2555-0403', '2267-1242']

DOI: https://doi.org/10.1051/e3sconf/202125201027