Paper
26 June 2023 Design of computer network secure storage system based on big data clustering algorithm
Kexin Zhu
Author Affiliations +
Proceedings Volume 12714, International Conference on Computer Network Security and Software Engineering (CNSSE 2023); 1271408 (2023) https://doi.org/10.1117/12.2683165
Event: Third International Conference on Computer Network Security and Software Engineering (CNSSE 2023), 2023, Sanya, China
Abstract
With the trend of networking of storage systems, storage systems have gradually become an important target for malicious attackers, and the result of attacks is often serious data accidents or encryption accidents. Therefore, the security of the storage system has become an issue that has yet to be resolved. In order to ensure the security of the data in the storage medium, a cryptography algorithm is used to encrypt and decrypt the data. A key distribution mechanism based on the K-means algorithm is designed to provide a reliable security guarantee for key transfer between various entities in the system. By comparing the time-consuming and storage efficiency ratio of the K-means algorithm and the rough set algorithm, the experimental results show that when using K-means, the rate of the storage device is slightly higher than that of the algorithm, indicating that the performance of K-means is slightly higher than that of the rough set algorithm when using stream encryption.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Kexin Zhu "Design of computer network secure storage system based on big data clustering algorithm", Proc. SPIE 12714, International Conference on Computer Network Security and Software Engineering (CNSSE 2023), 1271408 (26 June 2023); https://doi.org/10.1117/12.2683165
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data storage

Detection and tracking algorithms

Computer security

Network security

Computing systems

Computer networks

Design and modelling

Back to Top