云计算背景下基于加性高斯噪声和互信息神经网络的网络信息安全保护方法

IF 5 3区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Yu Zhong , Xingguo Li
{"title":"云计算背景下基于加性高斯噪声和互信息神经网络的网络信息安全保护方法","authors":"Yu Zhong ,&nbsp;Xingguo Li","doi":"10.1016/j.eij.2025.100673","DOIUrl":null,"url":null,"abstract":"<div><div>In the cloud computing environment, data security and privacy have received unprecedented attention, but current information security protection methods cannot simultaneously balance data utility and privacy protection effects. Therefore, a network information security protection method based on Gaussian denoising and mutual information neural network is proposed. The research aims to protect network information while maintaining high data utility. This study utilizes Gaussian noise and K-dimensional perturbation trees to establish a privacy protection scheme, and introduces a Bayesian network-based network intrusion detection method to combine the two for information privacy protection. Afterwards, mutual information is used to evaluate the effectiveness of privacy protection and further optimize the parameters of the protection scheme. The experimental results showed that the proposed method achieved a data utility retention rate of 85%, and the number of privacy breaches did not exceed 3 times. In long-term experiments, through continuous optimization, the number of breaches gradually remained at 0. From this, the proposed privacy protection method can effectively improve the data security and privacy in cloud computing environments, and ensure data utility during transmission and storage processes.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"30 ","pages":"Article 100673"},"PeriodicalIF":5.0000,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background\",\"authors\":\"Yu Zhong ,&nbsp;Xingguo Li\",\"doi\":\"10.1016/j.eij.2025.100673\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In the cloud computing environment, data security and privacy have received unprecedented attention, but current information security protection methods cannot simultaneously balance data utility and privacy protection effects. Therefore, a network information security protection method based on Gaussian denoising and mutual information neural network is proposed. The research aims to protect network information while maintaining high data utility. This study utilizes Gaussian noise and K-dimensional perturbation trees to establish a privacy protection scheme, and introduces a Bayesian network-based network intrusion detection method to combine the two for information privacy protection. Afterwards, mutual information is used to evaluate the effectiveness of privacy protection and further optimize the parameters of the protection scheme. The experimental results showed that the proposed method achieved a data utility retention rate of 85%, and the number of privacy breaches did not exceed 3 times. In long-term experiments, through continuous optimization, the number of breaches gradually remained at 0. From this, the proposed privacy protection method can effectively improve the data security and privacy in cloud computing environments, and ensure data utility during transmission and storage processes.</div></div>\",\"PeriodicalId\":56010,\"journal\":{\"name\":\"Egyptian Informatics Journal\",\"volume\":\"30 \",\"pages\":\"Article 100673\"},\"PeriodicalIF\":5.0000,\"publicationDate\":\"2025-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Egyptian Informatics Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1110866525000660\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525000660","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

摘要

在云计算环境下,数据安全和隐私受到了前所未有的重视,但目前的信息安全保护方法无法同时平衡数据效用和隐私保护效果。为此,提出了一种基于高斯去噪和互信息神经网络的网络信息安全保护方法。该研究旨在保护网络信息,同时保持较高的数据利用率。本研究利用高斯噪声和k维扰动树建立隐私保护方案,并引入基于贝叶斯网络的网络入侵检测方法,将两者结合起来进行信息隐私保护。然后利用互信息对隐私保护效果进行评估,进一步优化保护方案的参数。实验结果表明,该方法实现了85%的数据效用保留率,隐私泄露次数不超过3次。在长期试验中,通过不断优化,孔口数量逐渐保持在0。由此可见,本文提出的隐私保护方法可以有效提高云计算环境下数据的安全性和隐私性,保证数据在传输和存储过程中的实用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Network information security protection method based on additive Gaussian noise and mutual information neural network in cloud computing background
In the cloud computing environment, data security and privacy have received unprecedented attention, but current information security protection methods cannot simultaneously balance data utility and privacy protection effects. Therefore, a network information security protection method based on Gaussian denoising and mutual information neural network is proposed. The research aims to protect network information while maintaining high data utility. This study utilizes Gaussian noise and K-dimensional perturbation trees to establish a privacy protection scheme, and introduces a Bayesian network-based network intrusion detection method to combine the two for information privacy protection. Afterwards, mutual information is used to evaluate the effectiveness of privacy protection and further optimize the parameters of the protection scheme. The experimental results showed that the proposed method achieved a data utility retention rate of 85%, and the number of privacy breaches did not exceed 3 times. In long-term experiments, through continuous optimization, the number of breaches gradually remained at 0. From this, the proposed privacy protection method can effectively improve the data security and privacy in cloud computing environments, and ensure data utility during transmission and storage processes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Egyptian Informatics Journal
Egyptian Informatics Journal Decision Sciences-Management Science and Operations Research
CiteScore
11.10
自引率
1.90%
发文量
59
审稿时长
110 days
期刊介绍: The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信