Abstract:In order to solve the problem of user information insecurity in the process of network information security sharing, this study proposes a data encryption technology based on network information security sharing. This method applies the data encryption technology to the computer network security protection, which can not only improve the computer network security but also protect the user data information security and provide users with more efficient and high-quality computer network services. The experimenta… Show more
There is currently a growing concern about the preservation of individual privacy, particularly in the context of the increasing usage of Big Data technologies, such as the Data Middle Platform. As such, the question of how to enhance privacy and security has become a primary concern in today's world of Industry 4.0. In this article, we review related literature on the security and privacy challenges of the Data Middle Platform, and explore the use of Blockchain and zero-knowledge proof theories for authentication. We propose an algorithm that combines k-anonymity, homomorphic encryption, blockchain, and zero-knowledge proof for traceable authentication technology, and demonstrate its feasibility in the laboratory. Our experimental results verify the efficacy of the algorithm. As the algorithm is intended for industrial use, we compare and discuss it with existing authentication techniques in the penultimate section. Finally, we conclude our work and highlight directions for future research.
There is currently a growing concern about the preservation of individual privacy, particularly in the context of the increasing usage of Big Data technologies, such as the Data Middle Platform. As such, the question of how to enhance privacy and security has become a primary concern in today's world of Industry 4.0. In this article, we review related literature on the security and privacy challenges of the Data Middle Platform, and explore the use of Blockchain and zero-knowledge proof theories for authentication. We propose an algorithm that combines k-anonymity, homomorphic encryption, blockchain, and zero-knowledge proof for traceable authentication technology, and demonstrate its feasibility in the laboratory. Our experimental results verify the efficacy of the algorithm. As the algorithm is intended for industrial use, we compare and discuss it with existing authentication techniques in the penultimate section. Finally, we conclude our work and highlight directions for future research.
“…Tis article has been retracted by Hindawi following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of one or more of the following indicators of systematic manipulation of the publication process:…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.