KEYWORDS: Computer security, Data transmission, Network security, Elasticity, Windows, Data acquisition, Security technologies, Environmental monitoring, Data storage, Operating systems
With the increasingly fierce offensive and defensive confrontation in cyberspace, security threats have spread to the field of network terminal equipment data monitoring and collection, and the problems of network terminal equipment data collection being damaged and tampered with under the offensive and defensive environment are prominent. To this end, this paper proposes an SGX-based network countermeasure host log highly trusted collection method, adopts SGX hardware-level protection technology as the security reinforcement means, and conducts research on log collection methods, transmission methods, and storage methods. In this paper, the SGX-based network countermeasure host log highly trusted collection system is designed with full consideration of the collection strategy for host logs of multi-operating system platforms. At the same time, not only the physical host collection scenario is considered in the scheme design, but also the host log collection task for virtual machines in the cloud platform with the continuous development of cloud computing, which greatly broadens the application scenario of this method and satisfies most of the network scenarios in reality.
Since network coding technology was proposed, researchers have been enriching the theory of network coding and its related research has gradually become a field of interest for scholars, but the application and research of network coding technology in cloud storage and digital signature are still relatively missing. This paper mainly studies the application and development of network coding technology in cloud storage and digital signature, firstly introduces the technical knowledge about network coding and reviews its development history, introduces the main ideas and technical points of network coding in detail, then discusses the application of network coding in the field of cloud storage and digital signature, researches and analyzes its development respectively, and finally puts forward its views and open issues, and gives an outlook on the application prospect of network coding technology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.