首页 | 本学科首页   官方微博 | 高级检索  
     

基于Docker容器的航天网络隐私数据安全防护控制研究
引用本文:全斌.基于Docker容器的航天网络隐私数据安全防护控制研究[J].计算机测量与控制,2024,32(5):201-207.
作者姓名:全斌
摘    要:隐私数据嵌入量过大会导致航天网络主机信息参量提取时间延长,数据安全性下降,所以研究基于Docker容器的航天网络隐私数据安全防护控制方法。利用Docker容器收集航天网络负载数据,评估Docker容器实时负载量,联合目标防护信息实现对航天网络Docker容器的调度。根据Docker容器调度和Paillier同态加密结果,提取静态污点后完成航天网络隐私数据的训练与处理。根据所得到的数据,定义混沌映射关系,通过离散变换的方式生成安全性种子密钥,结合安全防护控制函数求解结果实现航天网络隐私数据安全防护控制。实验结果表明,所提方法能够将隐私数据实时嵌入量控制在5.5GB以下,保证网络主机提取信息参量的时间不超过0.7ms,能够有效保证航天网络隐私数据安全性。

关 键 词:Docker容器  航天网络  隐私数据  安全防护  负载数据  同态加密  静态污点  混沌映射  
收稿时间:2023/5/25 0:00:00
修稿时间:2023/6/30 0:00:00

Research on Security Protection and Control of Space Network Privacy Data Based on Docker Container
Abstract:Excessive embedding of privacy data can lead to an extension of the extraction time of host information parameters in aerospace networks and a decrease in data security. Therefore, a Docker container based privacy data security protection control method for aerospace networks is studied. Collect space network load data using Docker containers, evaluate the real-time load of Docker containers, and schedule space network Docker containers in conjunction with target protection information. According to Docker container scheduling and Paillier homomorphic encryption results, static stains are extracted and then the training and processing of space network privacy data are completed. Based on the obtained data, define a chaotic mapping relationship, generate a security seed key through discrete transformation, and combine the solution of the security protection control function to achieve security protection control of aerospace network privacy data. The experimental results show that the proposed method can control the real-time embedding amount of privacy data to below 5.5GB, ensuring that the time for network hosts to extract information parameters does not exceed 0.7ms, and effectively ensuring the security of space network privacy data.
Keywords:Docker container  Aerospace network  Privacy data  Safety protection  Load data  Homomorphic encryption  Static stains  Chaotic mapping  
点击此处可从《计算机测量与控制》浏览原始摘要信息
点击此处可从《计算机测量与控制》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号