scholarly journals A fusion data security protection scheme for sensitive E-documents in the open network environment

PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0258464
Author(s):  
Lei Liu ◽  
Mingwei Cao ◽  
Yeguo Sun

E-documents are carriers of sensitive data, and their security in the open network environment has always been a common problem with the field of data security. Based on the use of encryption schemes to construct secure access control, this paper proposes a fusion data security protection scheme. This scheme realizes the safe storage of data and keys by designing a hybrid symmetric encryption algorithm, a data security deletion algorithm, and a key separation storage method. The scheme also uses file filter driver technology to design a user operation state monitoring method to realize real-time monitoring of user access behavior. In addition, this paper designs and implements a prototype system. Through the verification and analysis of its usability and security, it is proved that the solution can meet the data security protection requirements of sensitive E-documents in the open network environment.

2014 ◽  
Author(s):  
Curtis Tade ◽  
Venkat Dasari ◽  
Vinod K. Mishra

Author(s):  
Bin Hu ◽  
Yuemin Wu ◽  
Min Sun ◽  
Zheng Bang Liu ◽  
Lin Zhang ◽  
...  

Backgrounds: In order to guarantee safe and efficient operation interaction in open network environment, a new dynamic trust monitoring and updating model based on behavior context is proposed in this paper. Methods: Setting four behavior attributes such as security, availability, reliability and performance. Then utilizing the fuzzy clustering and information entropy mathematical methods to carry out the effective synthesis on such attributes. Conclusion: The effectiveness and efficiency of the schema are verified by simulation.


Author(s):  
Ling Du ◽  
Wei Zhang ◽  
Huazhu Fu ◽  
Wenqi Ren ◽  
Xinpeng Zhang

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Zhiyan Xu ◽  
Min Luo ◽  
Neeraj Kumar ◽  
Pandi Vijayakumar ◽  
Li Li

With the popularization of wireless communication and smart devices in the medical field, mobile medicine has attracted more and more attention because it can break through the limitations of time, space, and objects and provide more efficient and quality medical services. However, the characteristics of a mobile smart medical network make it more susceptible to security threats such as data integrity damage and privacy leakage than those of traditional wired networks. In recent years, many digital signature schemes have been proposed to alleviate some of these challenges. Unfortunately, traditional digital signatures cannot meet the diversity and privacy requirements of medical data applications. In response to this problem, this paper uses the unique security attributes of sanitizable signatures to carry out research on the security and privacy protection of medical data and proposes a data security and privacy protection scheme suitable for smart mobile medical scenarios. Security analysis and performance evaluation show that our new scheme effectively guarantees data security and user privacy while greatly reducing computation and communication costs, making it especially suitable for mobile smart medical application scenarios.


2020 ◽  
Author(s):  
Zhen Yang ◽  
Yingying Chen ◽  
Yongfeng Huang ◽  
Xing Li
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document