真实云环境中基于Blowfish的加密模型

R. Walia, P. Garg, Manish Kumar
{"title":"真实云环境中基于Blowfish的加密模型","authors":"R. Walia, P. Garg, Manish Kumar","doi":"10.32629/jai.v6i3.695","DOIUrl":null,"url":null,"abstract":"The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blowfish based encryption model in real cloud environment\",\"authors\":\"R. Walia, P. Garg, Manish Kumar\",\"doi\":\"10.32629/jai.v6i3.695\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.\",\"PeriodicalId\":70721,\"journal\":{\"name\":\"自主智能(英文)\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"自主智能(英文)\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.32629/jai.v6i3.695\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"自主智能(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.32629/jai.v6i3.695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

互联网的引入使安全成为人们最担心的问题。安全性的前面允许在创建安全工具方面提高知识。互联网的建立方式可能引发了对安全保护的一些担忧。许多企业使用防火墙和加密技术来保护自己的网络安全。企业可以设计一个“内联网”,在连接到互联网时免受潜在风险的影响。为了提高安全性,需要更好的加密技术来保持数据的完整性。为了更好地加密,必须考虑一些问题的解释,包括密钥大小、块大小和编码率。传输到下级存储策略(如硬盘或SD卡)的文档必须加密,以提供安全性并防止不必要的访问。如果密钥与文档一起保存在辅助存储器中,则解密它非常简单。在对文件夹进行编码或解码时,最好使用操作员密码创建加密密钥,而不是将密钥与文档放在一起。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Blowfish based encryption model in real cloud environment
The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
0.40
自引率
0.00%
发文量
25
期刊最新文献
Conditioning and monitoring of grinding wheels: A state-of-the-art review Design and implementation of secured file delivery protocol using enhanced elliptic curve cryptography for class I and class II transactions An improved fuzzy c-means-raindrop optimizer for brain magnetic resonance image segmentation Key management and access control based on combination of cipher text-policy attribute-based encryption with Proxy Re-Encryption for cloud data Novel scientific design of hybrid opposition based—Chaotic little golden-mantled flying fox, White-winged chough search optimization algorithm for real power loss reduction and voltage stability expansion
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1