Paper
28 March 2023 Mimic adjudication scheme based on homomorphic encryption
Chuan He, Bo Zhang, Zesheng Xi, Yunfan Wang
Author Affiliations +
Proceedings Volume 12566, Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022); 125660S (2023) https://doi.org/10.1117/12.2667716
Event: Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022), 2022, Chongqing, China
Abstract
In the information times, with the rapid development of network technology, emerging technologies such as big data and artificial intelligence have gradually entered daily life, but various network security risks have also followed. In recent years, as a new security strategy, mimic defense technology has been a new force suddenly rises, providing a new idea and direction for protecting network security. In the actual application scenario, the resource consumption of the mimic defense service is large, and it is generally deployed and provided by the cloud service provider. Although the mimic defense can play a good role in defending against external attacks, the data transmission in the current system is based on plaintext, which cannot guarantee the privacy of user data. Homomorphic encryption technology, as an encryption supporting data ciphertext operation, can protect data privacy on the premise of completing data operation requirements. As an important field of homomorphic technology, homomorphic hash technology has been widely used in cloud storage scenarios. Aiming at the problem that the cloud service mimic defense system cannot protect data privacy, this paper introduces homomorphic encryption technology into the mimic defense system to protect the privacy of user data. The scheme proposed in this paper is based on the mimic defense architecture, which optimizes the adjudication process of the adjudication module through the homomorphic encryption technology, make full use of the characteristics of homomorphic operation, protects the privacy of user data, and improves the system security. Moreover, this paper builds a mimic routing platform for experimental analysis. The experimental results show that the malicious attacker can see the user’s private information under the traditional defense mechanism. However, after homomorphic encryption optimization, each user authentication is still less than 1 millisecond, and the user information data become invisible to malicious attackers.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chuan He, Bo Zhang, Zesheng Xi, and Yunfan Wang "Mimic adjudication scheme based on homomorphic encryption", Proc. SPIE 12566, Fifth International Conference on Computer Information Science and Artificial Intelligence (CISAI 2022), 125660S (28 March 2023); https://doi.org/10.1117/12.2667716
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Technology

Computer security

Defense and security

Network security

Defense systems

Clouds

Defense technologies

RELATED CONTENT


Back to Top