Skip to main content
Erschienen in: Neural Computing and Applications 3/2021

17.08.2020 | S.I. : ATCI 2020

Confidential information protection method of commercial information physical system based on edge computing

verfasst von: Xiaheng Zhang, Jiazhong Lu, Doudou Li

Erschienen in: Neural Computing and Applications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rapid integration and wide application of the enterprise Internet of Things, big data and 5G-class large networks, traditional enterprise cloud computing systems cannot timely process various mass information data generated by connecting with network edge electronic devices. There are obvious technical disadvantages. In order to effectively solve this complex problem, edge mobile computing came into being. The purpose of this article is to study the protection methods of commercial confidential information, using the security relationship between data information in edge technology computing and the technical characteristics of data privacy information protection. This paper proposes a theoretical system and technical architecture centered on the use of data security technology. The three key technologies of access control, identity authentication and information privacy security protection are researched on the privacy protection processing methods of commercial information security physical systems. The experimental data show that the recognition errors mainly occur in identifying non-anomalous data as abnormal data. The analysis and identification of abnormal information data are basically accurate, and it can quickly complete various processing tasks to eliminate abnormal information data to meet the requirements. The experimental data show that the abnormal data can be used to monitor the security of the commercial information physical system, and it is also a good security protection method for commercial confidential information. It has guiding significance for the confidential information protection of commercial information physical systems. In the next few years, more than 50% of major data applications will need to be analyzed, processed and data stored at the edge of the network. Cloud computing technologies at the edge are widely used.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Newman R, Chang V, Walters RJ (2016) Model and experimental development for business data science. Int J Inf Manag 36(4):607–617CrossRef Newman R, Chang V, Walters RJ (2016) Model and experimental development for business data science. Int J Inf Manag 36(4):607–617CrossRef
2.
Zurück zum Zitat Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30–39CrossRef Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30–39CrossRef
3.
Zurück zum Zitat Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81CrossRef Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81CrossRef
4.
Zurück zum Zitat Rankothge W, Le F, Russo A (2017) Optimizing resource allocation for virtualized network functions in a cloud center using genetic algorithms. IEEE Trans Netw Serv Manag 14(2):343–356CrossRef Rankothge W, Le F, Russo A (2017) Optimizing resource allocation for virtualized network functions in a cloud center using genetic algorithms. IEEE Trans Netw Serv Manag 14(2):343–356CrossRef
5.
Zurück zum Zitat Huang T (2019) Research on cluster mining algorithms for personal privacy protection in the background of big data. J Phys Conf Ser 1314(1):012153CrossRef Huang T (2019) Research on cluster mining algorithms for personal privacy protection in the background of big data. J Phys Conf Ser 1314(1):012153CrossRef
6.
Zurück zum Zitat Xie PS, Fu TX, Fan HJ (2019) An algorithm of the privacy security protection based on location service in the internet of vehicles. Int J Netw Secur 21(4):556–565 Xie PS, Fu TX, Fan HJ (2019) An algorithm of the privacy security protection based on location service in the internet of vehicles. Int J Netw Secur 21(4):556–565
7.
Zurück zum Zitat O’Brien LL, Guo Q, Bahrami-Samani E (2018) Transcriptional regulatory control of mammalian nephron progenitors revealed by multi-factor cistromic analysis and genetic studies. PLoS Genet 14(1):e1007181CrossRef O’Brien LL, Guo Q, Bahrami-Samani E (2018) Transcriptional regulatory control of mammalian nephron progenitors revealed by multi-factor cistromic analysis and genetic studies. PLoS Genet 14(1):e1007181CrossRef
8.
Zurück zum Zitat Martin KD, Borah A, Palmatier RW (2017) Data privacy: effects on customer and firm performance. J Mark 81(1):36–58CrossRef Martin KD, Borah A, Palmatier RW (2017) Data privacy: effects on customer and firm performance. J Mark 81(1):36–58CrossRef
9.
Zurück zum Zitat He Y, Zhang Y, Wang X (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Appl 32:247–260CrossRef He Y, Zhang Y, Wang X (2020) A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput Appl 32:247–260CrossRef
10.
Zurück zum Zitat Cheng J, Xu R, Tang X (2018) An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput Mater Contin 55(1):95–119 Cheng J, Xu R, Tang X (2018) An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput Mater Contin 55(1):95–119
11.
Zurück zum Zitat Sabella D, Vaillant A, Kuure P (2016) Mobile-edge computing architecture: the role of MEC in the Internet of Things. IEEE Consum Electron Mag 5(4):84–91CrossRef Sabella D, Vaillant A, Kuure P (2016) Mobile-edge computing architecture: the role of MEC in the Internet of Things. IEEE Consum Electron Mag 5(4):84–91CrossRef
12.
Zurück zum Zitat Li Y, Yu Y, Min G (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secure Comput 16(1):72–83CrossRef Li Y, Yu Y, Min G (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secure Comput 16(1):72–83CrossRef
13.
Zurück zum Zitat Al-Hazaimeh OM, Al-Jamal MF, Alhindawi N et al (2019) Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Comput Appl 31:2395–2405CrossRef Al-Hazaimeh OM, Al-Jamal MF, Alhindawi N et al (2019) Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Comput Appl 31:2395–2405CrossRef
14.
Zurück zum Zitat Kalaiprasath R, Elankavi R, Udayakumar DR (2017) Cloud security and compliance—a semantic approach in end to end security. Int J Mech Eng Technol 8(5):987–994 Kalaiprasath R, Elankavi R, Udayakumar DR (2017) Cloud security and compliance—a semantic approach in end to end security. Int J Mech Eng Technol 8(5):987–994
15.
Zurück zum Zitat Cohen J, Lefevre J, Maâmra K (2016) A self-stabilizing algorithm for maximal matching in anonymous networks. Parallel Process Lett 26(04):1650016MathSciNetCrossRef Cohen J, Lefevre J, Maâmra K (2016) A self-stabilizing algorithm for maximal matching in anonymous networks. Parallel Process Lett 26(04):1650016MathSciNetCrossRef
16.
Zurück zum Zitat Castiglione A, Palmieri F, Chen CL (2016) A blind signature-based approach for cross-domain authentication in the cloud environment. Int J Data Wareh Min (IJDWM) 12(1):34–48CrossRef Castiglione A, Palmieri F, Chen CL (2016) A blind signature-based approach for cross-domain authentication in the cloud environment. Int J Data Wareh Min (IJDWM) 12(1):34–48CrossRef
17.
Zurück zum Zitat Mattos DMF, Duarte OCMB (2016) AuthFlow: authentication and access control mechanism for software defined networking. Ann Telecommun 71(11–12):607–615CrossRef Mattos DMF, Duarte OCMB (2016) AuthFlow: authentication and access control mechanism for software defined networking. Ann Telecommun 71(11–12):607–615CrossRef
18.
Zurück zum Zitat Goulas KA, Gunbas G, Dietrich PJ (2017) ABE condensation over monometallic catalysts: catalyst characterization and kinetics. ChemCatChem 9(4):677–684CrossRef Goulas KA, Gunbas G, Dietrich PJ (2017) ABE condensation over monometallic catalysts: catalyst characterization and kinetics. ChemCatChem 9(4):677–684CrossRef
19.
Zurück zum Zitat Jantsch P, Webster CG, Zhang G (2019) On the Lebesgue constant of weighted Leja points for Lagrange interpolation on unbounded domains. IMA J Numer Anal 39(2):1039–1057MathSciNetCrossRef Jantsch P, Webster CG, Zhang G (2019) On the Lebesgue constant of weighted Leja points for Lagrange interpolation on unbounded domains. IMA J Numer Anal 39(2):1039–1057MathSciNetCrossRef
20.
Zurück zum Zitat Chen L, Chen X, Ni L (2017) Human behavior recognition using Wi-Fi CSI: challenges and opportunities. IEEE Commun Mag 55(10):112–117CrossRef Chen L, Chen X, Ni L (2017) Human behavior recognition using Wi-Fi CSI: challenges and opportunities. IEEE Commun Mag 55(10):112–117CrossRef
21.
Zurück zum Zitat Kuo CFJ, Juang Y (2016) A study on the recognition and classification of embroidered textile defects in manufacturing. Text Res J 86(4):393–408CrossRef Kuo CFJ, Juang Y (2016) A study on the recognition and classification of embroidered textile defects in manufacturing. Text Res J 86(4):393–408CrossRef
22.
Zurück zum Zitat Liu Y, Kuang Y, Xiao Y (2017) SDN-based data transfer security for Internet of Things. IEEE Internet Things J 5(1):257–268CrossRef Liu Y, Kuang Y, Xiao Y (2017) SDN-based data transfer security for Internet of Things. IEEE Internet Things J 5(1):257–268CrossRef
23.
Zurück zum Zitat Cheng B, Li TY, Wei PC (2018) Layer-edge device of two-dimensional hybrid perovskites. Nat Commun 9(1):1–7CrossRef Cheng B, Li TY, Wei PC (2018) Layer-edge device of two-dimensional hybrid perovskites. Nat Commun 9(1):1–7CrossRef
24.
Zurück zum Zitat Wang S, Sun S, Li Z (2017) Accurate de novo prediction of protein contact map by ultra-deep learning model. PLoS Comput Biol 13(1):e1005324CrossRef Wang S, Sun S, Li Z (2017) Accurate de novo prediction of protein contact map by ultra-deep learning model. PLoS Comput Biol 13(1):e1005324CrossRef
25.
Zurück zum Zitat Liu H, Kou H, Yan C (2019) Link prediction in paper citation network to construct paper correlation graph. EURASIP J Wirel Commun Netw 2019(1):1–12CrossRef Liu H, Kou H, Yan C (2019) Link prediction in paper citation network to construct paper correlation graph. EURASIP J Wirel Commun Netw 2019(1):1–12CrossRef
26.
Zurück zum Zitat Wenwen G, Lianyong Q, Yanwei X (2018) Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel Commun Mob Comput 2018(4):1–8 Wenwen G, Lianyong Q, Yanwei X (2018) Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel Commun Mob Comput 2018(4):1–8
27.
Zurück zum Zitat Chai X, Fu X, Gan Z et al (2020) An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput Appl 32:4961–4988CrossRef Chai X, Fu X, Gan Z et al (2020) An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput Appl 32:4961–4988CrossRef
28.
Zurück zum Zitat Zhang X, Zhou S, Fang J, Ni Y (2020) Pattern recognition of construction bidding system based on image processing. Comput Syst Sci Eng 35(4):247–256CrossRef Zhang X, Zhou S, Fang J, Ni Y (2020) Pattern recognition of construction bidding system based on image processing. Comput Syst Sci Eng 35(4):247–256CrossRef
29.
Zurück zum Zitat Song H, Srinivasan R, Sookoor T et al (2017) Smart cities: foundations, principles, and applications. Wiley, New YorkCrossRef Song H, Srinivasan R, Sookoor T et al (2017) Smart cities: foundations, principles, and applications. Wiley, New YorkCrossRef
Metadaten
Titel
Confidential information protection method of commercial information physical system based on edge computing
verfasst von
Xiaheng Zhang
Jiazhong Lu
Doudou Li
Publikationsdatum
17.08.2020
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 3/2021
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05272-0

Weitere Artikel der Ausgabe 3/2021

Neural Computing and Applications 3/2021 Zur Ausgabe