{"title":"基于可信计算的跨网络数据交换技术","authors":"Chao Li, Xiang Han, Zhaoyu Liu, Li Zhao","doi":"10.12783/DTEEES/PEEES2020/35479","DOIUrl":null,"url":null,"abstract":"The authors analyze the existing technologies in the field of cross-network data exchange and their deficiencies in ensuring the safe transmission of data. We propose a technology to improve the security of data exchange across networks, which is based on trusted computing. We design an audit method of the data exchange to prevent the leakage of sensitive information, investigate the subject of the leak and ensure the integrity of the data transmission. We have proved the credibility of the method and the ability of data security protection in the process of cross network data exchange, by protecting data files and applications.","PeriodicalId":11369,"journal":{"name":"DEStech Transactions on Environment, Energy and Earth Science","volume":"58 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Exchange Technology Across Networks Based on Trusted Computing\",\"authors\":\"Chao Li, Xiang Han, Zhaoyu Liu, Li Zhao\",\"doi\":\"10.12783/DTEEES/PEEES2020/35479\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors analyze the existing technologies in the field of cross-network data exchange and their deficiencies in ensuring the safe transmission of data. We propose a technology to improve the security of data exchange across networks, which is based on trusted computing. We design an audit method of the data exchange to prevent the leakage of sensitive information, investigate the subject of the leak and ensure the integrity of the data transmission. We have proved the credibility of the method and the ability of data security protection in the process of cross network data exchange, by protecting data files and applications.\",\"PeriodicalId\":11369,\"journal\":{\"name\":\"DEStech Transactions on Environment, Energy and Earth Science\",\"volume\":\"58 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"DEStech Transactions on Environment, Energy and Earth Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12783/DTEEES/PEEES2020/35479\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"DEStech Transactions on Environment, Energy and Earth Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12783/DTEEES/PEEES2020/35479","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data Exchange Technology Across Networks Based on Trusted Computing
The authors analyze the existing technologies in the field of cross-network data exchange and their deficiencies in ensuring the safe transmission of data. We propose a technology to improve the security of data exchange across networks, which is based on trusted computing. We design an audit method of the data exchange to prevent the leakage of sensitive information, investigate the subject of the leak and ensure the integrity of the data transmission. We have proved the credibility of the method and the ability of data security protection in the process of cross network data exchange, by protecting data files and applications.