Article Preview
Top1. Introduction
The information age has arrived, and network has become an important part of life. However, in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their developments. Computer viruses, leakage of confidential information, hacker intrusion, and other issues have caused the economic and property losses of network users, and have negatively affected people's normal lives (Carvalho et al., 2016). Therefore, the search for intelligent solutions to information security has become one of the important contents of network development. In the new era of continuous development of intelligence, the network security monitoring and information network technology must be good at combining and using the results of intelligent advantages to improve the level of network security monitoring and self-organized network computing, and then provide more comprehensive services when involved in information security (Salem & Ali, 2020). Message security is also information security, which means that data packets communicated and transmitted in the network must satisfy data confidentiality, integrity, authenticity, and freshness. Message security is the basic requirement and the primary task to ensure the security of wireless sensor networks (Utkin et al., 2017). Generally, encryption, decryption and authentication mechanisms are used to ensure message security and the realization of network security mainly relies on computer information management technology. Through the management of network applications, problems and security risks in the process of network applications can be discovered in time (Rahim & Javed, 2017).
In the process of information use, due to the characteristics of self-organized network computing outsourcing, the entire information retrieval and acquisition process is performed in the cloud and the cloud server can completely control the entire retrieval process and determine the final return result (Pham et al., 2019). The information user will not be possible to directly verify the completeness and correctness of the information returned by the cloud server. At the same time, in order to protect its own efficiency, intelligent solutions may not actively report the incorrect modification or deletion of information to the information owner, and in an environment of credibility competition, intelligent solutions can be used by manipulating information process to maximize benefits (Burtsev et al., 2017). In the specific network, attackers can be divided into external attackers and internal attackers and an external attacker is a powerful attacker who can observe and analyze all traffic in the specific network (Talabeigi & Naeeini, 2016). Because external attackers are not part of the system, they do not have the key of the entire system and cannot decrypt and sign messages, but they can obtain relevant information and use it for traffic and information analysis. Authorized and unauthorized information users are semi-trusted, which means that they will try their best to obtain some sensitive additional information from the query results and evidence (Ajulo et al., 2018).