Author
Listed:
- Huifen Wu
(State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch)
- Wei Ye
(State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch)
- Yaqiong Guo
(State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch)
Abstract
The reliability interception of network attack is realized by data access control in network security storage area, and the data security in network is guaranteed. The traditional free link decentralized control model is used to control the data access in the secure storage area of the network. The data access control system of network security storage area includes communication library, protocol base, core control library and resource library. The association rule feature extraction method is used to design the data mining and attack detection algorithm of the network security storage area, which is the core of the data access control system software in the network security storage area. The kernel of the optimal interface in the network security storage area is set up by SDICmdCon register, and the software development of data access control in the network security storage area is realized by the adaptive partition weighted interface scheduling under the embedded Linux environment. This paper considers the novel perspective the data access control method of cloud network secure storage under Social Internet of Things environment. The simulation results show that the model is accurate for data mining and attack detection in the network security storage area, and the security of data access control is improved, which ensures the network security 21% higher than the traditional methods.
Suggested Citation
Huifen Wu & Wei Ye & Yaqiong Guo, 2023.
"Data access control method of cloud network secure storage under Social Internet of Things environment,"
International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(4), pages 1379-1386, August.
Handle:
RePEc:spr:ijsaem:v:14:y:2023:i:4:d:10.1007_s13198-023-01942-z
DOI: 10.1007/s13198-023-01942-z
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:14:y:2023:i:4:d:10.1007_s13198-023-01942-z. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.