{"title":"Research on Data Protection System in Computer Network","authors":"Ying Li, Guifen Zhao, Tong Liu","doi":"10.1109/WKDD.2009.122","DOIUrl":null,"url":null,"abstract":"In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage. The solution combines four aspects into a whole secure system. Meanwhile, hardware equipments and combined symmetric key encryption technique are applied to encrypt the information. Consequently, network data security would be enhanced.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Workshop on Knowledge Discovery and Data Mining","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WKDD.2009.122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In order to improve the data security over network and provide more effective data protection product, this paper introduces a network data protection system based on combined symmetric key. The system takes into account four main aspects in data protection, including identity authentication, encryption transmission, access controls and encryption storage. The solution combines four aspects into a whole secure system. Meanwhile, hardware equipments and combined symmetric key encryption technique are applied to encrypt the information. Consequently, network data security would be enhanced.