Shu Han, Wei Guo, Jiayu Du, Fan Zhang, Hongle Lei, Qiulong Yang
{"title":"网络空间模拟防御中的秘密共享研究","authors":"Shu Han, Wei Guo, Jiayu Du, Fan Zhang, Hongle Lei, Qiulong Yang","doi":"10.1109/ICCCS57501.2023.10150991","DOIUrl":null,"url":null,"abstract":"Cyberspace mimic defense (CMD) is an emerging defense technology that combines dynamic heterogeneous redundancy (DHR) to enhance the security of information systems. At present, the applications of CMD focus more on data tamper resistance and do not more pay attention to the privacy disclosure of executors. This paper proposes to introduce the secret sharing mechanism into the CMD and use a secret sharing scheme with dimension switching to achieve the security of the private data of executors without adding extra key management. And experiments proved that the combination of the secret sharing scheme and mimic defense can increase data security at a tolerable cost.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Secret Sharing for Cyberspace Mimic Defense\",\"authors\":\"Shu Han, Wei Guo, Jiayu Du, Fan Zhang, Hongle Lei, Qiulong Yang\",\"doi\":\"10.1109/ICCCS57501.2023.10150991\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyberspace mimic defense (CMD) is an emerging defense technology that combines dynamic heterogeneous redundancy (DHR) to enhance the security of information systems. At present, the applications of CMD focus more on data tamper resistance and do not more pay attention to the privacy disclosure of executors. This paper proposes to introduce the secret sharing mechanism into the CMD and use a secret sharing scheme with dimension switching to achieve the security of the private data of executors without adding extra key management. And experiments proved that the combination of the secret sharing scheme and mimic defense can increase data security at a tolerable cost.\",\"PeriodicalId\":266168,\"journal\":{\"name\":\"2023 8th International Conference on Computer and Communication Systems (ICCCS)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 8th International Conference on Computer and Communication Systems (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCS57501.2023.10150991\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS57501.2023.10150991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Secret Sharing for Cyberspace Mimic Defense
Cyberspace mimic defense (CMD) is an emerging defense technology that combines dynamic heterogeneous redundancy (DHR) to enhance the security of information systems. At present, the applications of CMD focus more on data tamper resistance and do not more pay attention to the privacy disclosure of executors. This paper proposes to introduce the secret sharing mechanism into the CMD and use a secret sharing scheme with dimension switching to achieve the security of the private data of executors without adding extra key management. And experiments proved that the combination of the secret sharing scheme and mimic defense can increase data security at a tolerable cost.