边缘计算中基于喷泉码和异或加密的安全存储

Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai
{"title":"边缘计算中基于喷泉码和异或加密的安全存储","authors":"Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai","doi":"10.1109/Ubi-Media.2019.00011","DOIUrl":null,"url":null,"abstract":"Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Storage Based on Fountain Code and XOR Encryption in Edge Computing\",\"authors\":\"Rui Xu, Zhenjiang Zhang, Bo Shen, Yanran Zeng, Chenyang Dai\",\"doi\":\"10.1109/Ubi-Media.2019.00011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.\",\"PeriodicalId\":259542,\"journal\":{\"name\":\"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Ubi-Media.2019.00011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Ubi-Media.2019.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

边缘计算在异构性、低时延、网络接入密集等方面具有明显的优势。同时,边缘器件结构复杂,存储能力弱。在存储敏感数据的过程中,仍然存在着大量的安全威胁。提出了一种将喷泉码与异或加密相结合的边缘设备数据存储方法。首先,源文件通过异或加密进行加密。然后将密文分成多个密文数据块。对密文数据块进行编码后,将其与编码块混合并分布在多个边缘设备上。当我们接收到足够的数据块时,我们可以恢复源文件。异或加密与喷泉码的结合提高了存储的可靠性和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Security Storage Based on Fountain Code and XOR Encryption in Edge Computing
Edge computing has obvious advantages in heterogeneity, low latency and dense network access. Meanwhile, edge device has complex structure and weak storage capacity. A lot of security threats still exist in the process of storing sensitive data. This paper proposes a method of combining fountain code and XOR encryption to the data storage in edge devices. First, the source file is encrypted by XOR encryption. Then we divide the ciphertext into multiple ciphertext data blocks. After encoding ciphertext data blocks, we mix them with coding blocks and distribute them on multiple edge devices. When we receive enough data blocks, we can recover the source file. The combination of XOR encryption and fountain code improves reliability and security of storage.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Target-Monitoring Learning Companion Design DeepBonds: A Deep Learning Approach to Predicting United States Treasury Yield Clinically Applicable Deep Learning for Diagnosis of Diabetic Retinopathy Markerless Indoor/Outdoor Augmented Reality Navigation Device Based on ORB-Visual-Odometry Positioning Estimation and Wall-Floor-Boundary Image Registration [Copyright notice]
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1