Longyun Qi;Xiaoliang Lv;Lianwen Sun;Tianle Yao;Jianye Yu;Lei Wang
{"title":"基于可信存储的操作系统网络安全增强方案","authors":"Longyun Qi;Xiaoliang Lv;Lianwen Sun;Tianle Yao;Jianye Yu;Lei Wang","doi":"10.23919/ICN.2023.0014","DOIUrl":null,"url":null,"abstract":"Data storage security has become the core of many network security issues. In order to achieve trusted storage and trusted measurement of network community data, this paper proposes a secure storage model based on trust extension for existing trusted storage technologies. In the process of document encryption, the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information. In the process of user access control mechanism, SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control. In the process of result query, ontology technology is introduced to better express the user's query intention and improve the query accuracy. A large number of experiments demonstrate the effectiveness and feasibility of the scheme.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 2","pages":"127-141"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10207889/10208203.pdf","citationCount":"0","resultStr":"{\"title\":\"Operating system network security enhancement scheme based on trusted storage\",\"authors\":\"Longyun Qi;Xiaoliang Lv;Lianwen Sun;Tianle Yao;Jianye Yu;Lei Wang\",\"doi\":\"10.23919/ICN.2023.0014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data storage security has become the core of many network security issues. In order to achieve trusted storage and trusted measurement of network community data, this paper proposes a secure storage model based on trust extension for existing trusted storage technologies. In the process of document encryption, the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information. In the process of user access control mechanism, SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control. In the process of result query, ontology technology is introduced to better express the user's query intention and improve the query accuracy. A large number of experiments demonstrate the effectiveness and feasibility of the scheme.\",\"PeriodicalId\":100681,\"journal\":{\"name\":\"Intelligent and Converged Networks\",\"volume\":\"4 2\",\"pages\":\"127-141\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/iel7/9195266/10207889/10208203.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Intelligent and Converged Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10208203/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intelligent and Converged Networks","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10208203/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Operating system network security enhancement scheme based on trusted storage
Data storage security has become the core of many network security issues. In order to achieve trusted storage and trusted measurement of network community data, this paper proposes a secure storage model based on trust extension for existing trusted storage technologies. In the process of document encryption, the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information. In the process of user access control mechanism, SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control. In the process of result query, ontology technology is introduced to better express the user's query intention and improve the query accuracy. A large number of experiments demonstrate the effectiveness and feasibility of the scheme.