DNA ENCRYPTION FOR DATA TRANSMISSION AND STORAGE SECURITY IN INDUSTRIAL ENVIRONMENTS

Author(s):  
Otilia Cangea
2014 ◽  
Vol 687-691 ◽  
pp. 2764-2767
Author(s):  
Qiang Li ◽  
Kui Yang ◽  
Li Ma

With the popularity of the cloud computing, network technology obtains unprecedented development and revolution. Cloud computing is the direction of cyberspace storage in the computer and internet filed. Big data and multi-dimensional storage and calculation along with the cloud computing. Therefore, internet data security is the key point. For example, based on the cloud environment, the big data transmission and storage requires encryption technology. This article will research the data security of cloud computing, design the service model of data security encryption, and realize data transmission and storage security service of computer and internet cloud environment.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Bo Mi ◽  
Ping Long ◽  
Yang Liu ◽  
Fengtian Kuang

Data deduplication serves as an effective way to optimize the storage occupation and the bandwidth consumption over clouds. As for the security of deduplication mechanism, users’ privacy and accessibility are of utmost concern since data are outsourced. However, the functionality of redundancy removal and the indistinguishability of deduplication labels are naturally incompatible, which bring about a lot of threats on data security. Besides, the access control of sharing copies may lead to infringement on users’ attributes and cumbersome query overheads. To balance the usability with the confidentiality of deduplication labels and securely realize an elaborate access structure, a novel data deduplication scheme is proposed in this paper. Briefly speaking, we drew support from learning with errors (LWE) to make sure that the deduplication labels are only differentiable during the duplication check process. Instead of authority matching, the proof of ownership (PoW) is then implemented under the paradigm of inner production. Since the deduplication label is light-weighted and the inner production is easy to carry out, our scheme is more efficient in terms of computation and storage. Security analysis also indicated that the deduplication labels are distinguishable only for duplication check, and the probability of falsifying a valid ownership is negligible.


2018 ◽  
Author(s):  
Katriona Edlmann ◽  
Sofi Hinchliffe ◽  
Niklas Heinemann ◽  
Gareth Johnson ◽  
Jonathan Ennis-King ◽  
...  

2021 ◽  
Vol 6 (1(34)) ◽  
pp. 27-29
Author(s):  
D.A. Oskin ◽  
A.A. Gorshkov ◽  
S.A. Klimenko

The principles of construction and operation of the data collection and transmission system (DCTS) of an unmanned vessel are considered. A two-stage formulation of the problem of constructing a DCTS is proposed: the choice of methods and means of transmitting data from sensors to the data collection system, the choice of a method for transmitting data to the data collection system, the implementation of data transmission channels and, directly, the organization of data collection and storage for use in the autopilot device, implementation systems for receiving and synchronizing data and their placement in the storage system.


2021 ◽  
Vol 2113 (1) ◽  
pp. 012065
Author(s):  
Yu Gu ◽  
Mengqi Fan ◽  
Chuanqian Tang ◽  
Guojing Zhang ◽  
Xiaodan Zhang

Abstract Since the study in the field of fusion has gradually developed toward the long-pulse experiment mode, long-pulse data has gradually become one of the main data types for pulsed experiments in the field of fusion. For long-pulse data, which is a kind of pulse-type data, it will be more difficult to transmit and store than short-pulse data because of its significant characteristics. In addition, in the design of data acquisition and control system (DACS) in fusion field, Experimental Physics and Industrial Control System (EPICS) has now gradually become the main framework of experimental control system to meet the diversity of devices and complexity of subsystems in large experimental system. However, due to the limitation of EPICS, its effectiveness in handling data transmission and storage under high speed data acquisition is not satisfactory. To solve the data transmission and storage under high-speed sampling, this paper proposes a data transmission and storage solution based on TCP/IP protocol and MDSplus database, which is designed with the concept of segmentation, i.e., data generated from experiments longer than 100 seconds are uploaded and stored in a segmented form. Currently, this system has been tested and applied, and the test result shows that the solution is feasible and the overall test system operates stably and reliably.


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


Sign in / Sign up

Export Citation Format

Share Document