scholarly journals Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Qi Wang ◽  
Ling Li ◽  
Shuai Hu

The development of the Internet of things provides a great opportunity for the development of all walks of life, but it also brings many risks in the process, of which the most important thing is the protection of computer network information security. Digital art museums play a great role in viewing, education, and other functions. This article is aimed at analyzing the computer network information security protection problems faced by digital art museums. Analyze the application of the digital art gallery in the computer Internet of things, and combine the different aspects involved in the two parts to carry out experimental analysis and comparison. The difference between the various subjects of the digital art gallery, such as exhibits, writers, and visitors, is to maintain the security of Internet computer information. Introduce the application. The results show that compared with that of fog computing technology and that of edge computing technology, the performance of the Internet of things is generally better, with faster data processing speed, shorter processing time, higher quality, and stronger scalability. But at the same time, it is also facing greater computer network security threats. According to statistics, 83.3% of consumers worry about its usability but people are more concerned about its safety performance. Nearly 87.5% of consumers worry about whether their information will be leaked. When cloud computing technology is applied to digital art museums, how to protect computer network information security is particularly important. Based on the traditional firewall, this paper designs a hybrid firewall, which can better solve the problem of computer network information security.

2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


2020 ◽  
Vol 11 (5) ◽  
pp. 259-269
Author(s):  
V. A. Galatenko ◽  
◽  
K. A. Kostyukhin ◽  

Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is natural that it experiences typical growth diseases-fragmentation and uneven development. The base for ensuring security is mostly formed (but continues to be formed), the question is how quickly there will be a harmonization of approaches, and advanced ideas will be accepted by device manufacturers. Many state and non-state agencies actively promote security tools, inform and train manufacturers and consumers. The article is an overview of the main provisions of information security of the Internet of things. An attempt is made to consider software and technical and legislative levels of Internet of things security. This makes it different from other publications of a similar nature. Only a holistic, integrated approach can improve real information security. Authors outline basic concepts and describe a reference model of Internet of things, draw attention to the peculiarities of the Internet of things that are important from the security point of view, enumerate typical threats for Internet of things. The legislative level of information security, security recommendations for the Internet of things, manufacturers description of usage, and installation of software corrections are considered in detail.


Fog computing is one of the enabling computing technology which primarily aims to fulfill the requirements of the Internet of Things (IoT). IoT is fast-growing networking and computing sector. The scalability of users, devices, and application is crucial for the success of IoT systems. The load balancing is an approach to distribute the load among computing nodes so that the computing nodes are not overloaded. In this paper, we propose the priority-based request servicing at fog computing centers. We particularly address the situation when the fog node in fog computing center (FCC) receives more workload than their capacity to handle it. The increased workload is shifted to nearby fog nodes rather than to the remote cloud. The proposed approach is able to minimize the offloading the high priority request to other nodes by 11% which proves the novelty of our proposed.


Author(s):  
Matt Zwolenski ◽  
Lee Weatherill

The Digital Universe, which consists of all the data created by PC, Sensor Networks, GPS/WiFi Location, Web Metadata, Web-Sourced Biographical Data, Mobile, Smart-Connected Devices and Next-Generation Applications (to name but a few) is altering the way we consume and measure IT and disrupting proven business models. Unprecedented and exponential data growth is presenting businesses with new and unique opportunities and challenges. As the ‘Internet of Things’ (IoT) and Third Platform continue to grow, the analysis of structured and unstructured data will drive insights that change the way businesses operate, create distinctive value, and deliver services and applications to the consumer and to each other. As enterprises and IT grapple to take advantage of these trends in order to gain share and drive revenue, they must be mindful of the Information Security and Data Protection pitfalls that lay in wait ─ hurdles that have already tripped up market leaders and minnows alike.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Xianzhi Tang ◽  
Chunyan Ding

The progress of the social economy and the rapid development of the power field have created more favorable conditions for the construction of my country’s power grid. In this network age, how to further realize the connection between the power system and the Internet of Things is the key content of many scholars’ research. In the Internet of Things environment, there have been many excellent results in the collection, storage, and management of electric power big data, but the problem of information security has not been completely solved. Based on big data analysis and Internet of Things technology, this paper studies the architecture design of power information security terminals. In view of the diverse types of power grid mobile information and the large amount of data, this paper designs a power transportation mobile information security management system structure, which improves the effective management of power data by the system through big data, smart sensors, and wireless communication technology. According to the experiment, the power information security terminal constructed in this paper can effectively reduce communication resources and save communication costs in the process of aggregating multidimensional data. In the user satisfaction survey, residents’ satisfaction with the convenience and safety of the intelligent power system is also as high as 9.312 and 9.233. On the whole, the application of big data and Internet of Things technology to the construction of power information security terminals can indeed improve the service efficiency of power companies under the premise of ensuring safety and allow users to have a better experience.


Sign in / Sign up

Export Citation Format

Share Document