{"title":"Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background","authors":"Yu Zhong , Xingguo Li","doi":"10.1016/j.eij.2025.100673","DOIUrl":null,"url":null,"abstract":"<div><div>In the cloud computing environment, data security and privacy have received unprecedented attention, but current information security protection methods cannot simultaneously balance data utility and privacy protection effects. Therefore, a network information security protection method based on Gaussian denoising and mutual information neural network is proposed. The research aims to protect network information while maintaining high data utility. This study utilizes Gaussian noise and K-dimensional perturbation trees to establish a privacy protection scheme, and introduces a Bayesian network-based network intrusion detection method to combine the two for information privacy protection. Afterwards, mutual information is used to evaluate the effectiveness of privacy protection and further optimize the parameters of the protection scheme. The experimental results showed that the proposed method achieved a data utility retention rate of 85%, and the number of privacy breaches did not exceed 3 times. In long-term experiments, through continuous optimization, the number of breaches gradually remained at 0. From this, the proposed privacy protection method can effectively improve the data security and privacy in cloud computing environments, and ensure data utility during transmission and storage processes.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"30 ","pages":"Article 100673"},"PeriodicalIF":5.0000,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525000660","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
In the cloud computing environment, data security and privacy have received unprecedented attention, but current information security protection methods cannot simultaneously balance data utility and privacy protection effects. Therefore, a network information security protection method based on Gaussian denoising and mutual information neural network is proposed. The research aims to protect network information while maintaining high data utility. This study utilizes Gaussian noise and K-dimensional perturbation trees to establish a privacy protection scheme, and introduces a Bayesian network-based network intrusion detection method to combine the two for information privacy protection. Afterwards, mutual information is used to evaluate the effectiveness of privacy protection and further optimize the parameters of the protection scheme. The experimental results showed that the proposed method achieved a data utility retention rate of 85%, and the number of privacy breaches did not exceed 3 times. In long-term experiments, through continuous optimization, the number of breaches gradually remained at 0. From this, the proposed privacy protection method can effectively improve the data security and privacy in cloud computing environments, and ensure data utility during transmission and storage processes.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.