边缘计算中基于喷泉码和异或加密的安全存储

Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai
{"title":"边缘计算中基于喷泉码和异或加密的安全存储","authors":"Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai","doi":"10.1109/Ubi-Media.2019.00011","DOIUrl":null,"url":null,"abstract":"Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Storage Based on Fountain Code and XOR Encryption in Edge Computing\",\"authors\":\"Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai\",\"doi\":\"10.1109/Ubi-Media.2019.00011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.\",\"PeriodicalId\":259542,\"journal\":{\"name\":\"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Ubi-Media.2019.00011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Ubi-Media.2019.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

边缘计算在异构性、低时延、网络接入密集等方面具有明显的优势。同时,边缘器件结构复杂,存储能力弱。在存储敏感数据的过程中,仍然存在着大量的安全威胁。提出了一种将喷泉码与异或加密相结合的边缘设备数据存储方法。首先,源文件通过异或加密进行加密。然后将密文分成多个密文数据块。对密文数据块进行编码后,将其与编码块混合并分布在多个边缘设备上。当我们接收到足够的数据块时,我们可以恢复源文件。异或加密与喷泉码的结合提高了存储的可靠性和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security Storage Based on Fountain Code and XOR Encryption in Edge Computing
Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信