Operating system network security enhancement scheme based on trusted storage
<p>Data storage security has become the core of many network security issues. In order to achieve trusted storage and trusted measurement of network community data, this paper proposes a secure storage model based on trust extension for existing trusted storage technologies. In the process of...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Tsinghua University Press
2023-06-01
|
Series: | Intelligent and Converged Networks |
Subjects: | |
Online Access: | https://www.sciopen.com/article/10.23919/ICN.2023.0014 |
_version_ | 1797662540500566016 |
---|---|
author | Longyun Qi Xiaoliang Lv Lianwen Sun Tianle Yao Jianye Yu Lei Wang |
author_facet | Longyun Qi Xiaoliang Lv Lianwen Sun Tianle Yao Jianye Yu Lei Wang |
author_sort | Longyun Qi |
collection | DOAJ |
description | <p>Data storage security has become the core of many network security issues. In order to achieve trusted storage and trusted measurement of network community data, this paper proposes a secure storage model based on trust extension for existing trusted storage technologies. In the process of document encryption, the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information. In the process of user access control mechanism, SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control. In the process of result query, ontology technology is introduced to better express the user’s query intention and improve the query accuracy. A large number of experiments demonstrate the effectiveness and feasibility of the scheme.</p> |
first_indexed | 2024-03-11T19:01:43Z |
format | Article |
id | doaj.art-b8325643f01f47caa967d327d1eba2ab |
institution | Directory Open Access Journal |
issn | 2708-6240 |
language | English |
last_indexed | 2024-03-11T19:01:43Z |
publishDate | 2023-06-01 |
publisher | Tsinghua University Press |
record_format | Article |
series | Intelligent and Converged Networks |
spelling | doaj.art-b8325643f01f47caa967d327d1eba2ab2023-10-10T12:18:54ZengTsinghua University PressIntelligent and Converged Networks2708-62402023-06-014212714110.23919/ICN.2023.0014Operating system network security enhancement scheme based on trusted storageLongyun Qi0Xiaoliang Lv1Lianwen Sun2Tianle Yao3Jianye Yu4Lei Wang5State Grid Electric Power Research Institute, Nanjing 210003, ChinaState Grid Electric Power Research Institute, Nanjing 210003, ChinaState Grid Electric Power Research Institute, Nanjing 210003, ChinaState Grid Beijing Electric Power Company, Beijing 100031, ChinaState Grid Electric Power Research Institute, Nanjing 210003, ChinaState Grid Beijing Electric Power Company, Beijing 100031, China<p>Data storage security has become the core of many network security issues. In order to achieve trusted storage and trusted measurement of network community data, this paper proposes a secure storage model based on trust extension for existing trusted storage technologies. In the process of document encryption, the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information. In the process of user access control mechanism, SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control. In the process of result query, ontology technology is introduced to better express the user’s query intention and improve the query accuracy. A large number of experiments demonstrate the effectiveness and feasibility of the scheme.</p>https://www.sciopen.com/article/10.23919/ICN.2023.0014trusted storagetrust extensiontrusted platform model (tpm)access control |
spellingShingle | Longyun Qi Xiaoliang Lv Lianwen Sun Tianle Yao Jianye Yu Lei Wang Operating system network security enhancement scheme based on trusted storage Intelligent and Converged Networks trusted storage trust extension trusted platform model (tpm) access control |
title | Operating system network security enhancement scheme based on trusted storage |
title_full | Operating system network security enhancement scheme based on trusted storage |
title_fullStr | Operating system network security enhancement scheme based on trusted storage |
title_full_unstemmed | Operating system network security enhancement scheme based on trusted storage |
title_short | Operating system network security enhancement scheme based on trusted storage |
title_sort | operating system network security enhancement scheme based on trusted storage |
topic | trusted storage trust extension trusted platform model (tpm) access control |
url | https://www.sciopen.com/article/10.23919/ICN.2023.0014 |
work_keys_str_mv | AT longyunqi operatingsystemnetworksecurityenhancementschemebasedontrustedstorage AT xiaolianglv operatingsystemnetworksecurityenhancementschemebasedontrustedstorage AT lianwensun operatingsystemnetworksecurityenhancementschemebasedontrustedstorage AT tianleyao operatingsystemnetworksecurityenhancementschemebasedontrustedstorage AT jianyeyu operatingsystemnetworksecurityenhancementschemebasedontrustedstorage AT leiwang operatingsystemnetworksecurityenhancementschemebasedontrustedstorage |