Analysis and Countermeasures of Data Sharing in the Network Environment
Authors
Cen Lei
Corresponding Author
Cen Lei
Available Online April 2015.
- DOI
- 10.2991/icsste-15.2015.151How to use a DOI?
- Keywords
- Network security; Cross- domain authentication; Data sharing; Symmetric encryption
- Abstract
This paper puts forward the framework of sharing data model based on the secure multiparty computation, carries on the design according to the hierarchical structure to progressive realize. The model consists of three layers, the lower is the data access, which manage the data from the node in each domain. The middle layer is a function main body layer, providing various atomic operation based on multi-party secure computation. The top layer is the user interface layer, provides a unified interface for the application, which is convenient extension for cross domain communication.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Cen Lei PY - 2015/04 DA - 2015/04 TI - Analysis and Countermeasures of Data Sharing in the Network Environment BT - Proceedings of the 2015 International Conference on Social Science and Technology Education PB - Atlantis Press SP - 567 EP - 569 SN - 2352-5398 UR - https://doi.org/10.2991/icsste-15.2015.151 DO - 10.2991/icsste-15.2015.151 ID - Lei2015/04 ER -