In the information times, with the rapid development of network technology, emerging technologies such as big data and artificial intelligence have gradually entered daily life, but various network security risks have also followed. In recent years, as a new security strategy, mimic defense technology has been a new force suddenly rises, providing a new idea and direction for protecting network security. In the actual application scenario, the resource consumption of the mimic defense service is large, and it is generally deployed and provided by the cloud service provider. Although the mimic defense can play a good role in defending against external attacks, the data transmission in the current system is based on plaintext, which cannot guarantee the privacy of user data. Homomorphic encryption technology, as an encryption supporting data ciphertext operation, can protect data privacy on the premise of completing data operation requirements. As an important field of homomorphic technology, homomorphic hash technology has been widely used in cloud storage scenarios. Aiming at the problem that the cloud service mimic defense system cannot protect data privacy, this paper introduces homomorphic encryption technology into the mimic defense system to protect the privacy of user data. The scheme proposed in this paper is based on the mimic defense architecture, which optimizes the adjudication process of the adjudication module through the homomorphic encryption technology, make full use of the characteristics of homomorphic operation, protects the privacy of user data, and improves the system security. Moreover, this paper builds a mimic routing platform for experimental analysis. The experimental results show that the malicious attacker can see the user’s private information under the traditional defense mechanism. However, after homomorphic encryption optimization, each user authentication is still less than 1 millisecond, and the user information data become invisible to malicious attackers.
|