期刊文献+

应用于物联网云安全可信度检测的算法仿真 被引量:1

Algorithm Simulation Applied to Cloud Security Credibility Detection of Internet of Things
下载PDF
导出
摘要 已有的高校物联网云安全可信度检测方法的用户身份加密过程易出现漏洞,导致无法直接判断云数据的安全性。为此,提出基于二次加密算法的物联网云安全可信度检测方法。利用RSA加密算法完成学生身份的认证。结合DES加密算法实现二次加密。再采用K-L散度高斯混合模型聚类入侵数据,利用特征标准划分待测数据集,获取检测优先级,判断云安全内是否存在入侵数据,完成物联网云安全可信度检测。实验证明:所提二次加密算法下的云安全可信度由于单一加密算法,且根据所提方法的检测结果可直接判断数据是否存在威胁。 The user identity encryption process of the existing university Internet of things cloud security credibility detection method is prone to loopholes,resulting in the inability to directly judge the security of cloud data.Therefore,a cloud security credibility detection method of Internet of things based on secondary encryption algorithm was designed.RSA encryption algorithm was used to complete student identity authentication.DES encryption algorithm was also applied to secondary encryption.K-L divergence Gaussian mixture model was applied in order to cluster intrusion data.According to the feature criteria,the data set to be tested was divided to obtain the detection priority.The situation of intrusion data in cloud security was judged to complete the cloud security credibility detection of the Internet of things.The experiments show that the algorithm designed in this paper can directly judge the threat of data.
作者 温祥彬 郑媛 WEN Xiang-bin;ZHENG Yuan(information Center,Guangzhou University of Chinese Medicine,Guangzhou Guangdong 510006,China)
出处 《计算机仿真》 北大核心 2022年第5期225-228,共4页 Computer Simulation
关键词 加密算法 散度高斯混合模型 聚类中心 特征标准 可信度检测 RSA encryption algorithm DES encryption algorithm K-L divergence Gaussian mixture model Cluster center Characteristic standard Credibility detection
  • 相关文献

参考文献12

二级参考文献76

共引文献105

同被引文献15

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部