Self-Organized Network Management and Computing of Intelligent Solutions to Information Security

Self-Organized Network Management and Computing of Intelligent Solutions to Information Security

Xiaomeng Zhu
Copyright: © 2021 |Pages: 16
DOI: 10.4018/JOEUC.20211101.oa28
Article PDF Download
Open access articles are freely available for download

Abstract

The network in information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their developments. The intelligent solution to information security is a self-organized management and computing security protocol that is completed through the intelligent technologies at both ends of the sensing device and network authentication center. The results show that the network security information communication and publicity management platform built by the self-organized network management and computing of the intelligent solutions to information security can effectively heighten network users’ awareness of information protection, enhance the security of network environment, and promote the improvement of scientific network security rules. The study results of this paper provide a reference for further researches on self-organized network management and computing of intelligent solutions to information security.
Article Preview
Top

1. Introduction

The information age has arrived, and network has become an important part of life. However, in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their developments. Computer viruses, leakage of confidential information, hacker intrusion, and other issues have caused the economic and property losses of network users, and have negatively affected people's normal lives (Carvalho et al., 2016). Therefore, the search for intelligent solutions to information security has become one of the important contents of network development. In the new era of continuous development of intelligence, the network security monitoring and information network technology must be good at combining and using the results of intelligent advantages to improve the level of network security monitoring and self-organized network computing, and then provide more comprehensive services when involved in information security (Salem & Ali, 2020). Message security is also information security, which means that data packets communicated and transmitted in the network must satisfy data confidentiality, integrity, authenticity, and freshness. Message security is the basic requirement and the primary task to ensure the security of wireless sensor networks (Utkin et al., 2017). Generally, encryption, decryption and authentication mechanisms are used to ensure message security and the realization of network security mainly relies on computer information management technology. Through the management of network applications, problems and security risks in the process of network applications can be discovered in time (Rahim & Javed, 2017).

In the process of information use, due to the characteristics of self-organized network computing outsourcing, the entire information retrieval and acquisition process is performed in the cloud and the cloud server can completely control the entire retrieval process and determine the final return result (Pham et al., 2019). The information user will not be possible to directly verify the completeness and correctness of the information returned by the cloud server. At the same time, in order to protect its own efficiency, intelligent solutions may not actively report the incorrect modification or deletion of information to the information owner, and in an environment of credibility competition, intelligent solutions can be used by manipulating information process to maximize benefits (Burtsev et al., 2017). In the specific network, attackers can be divided into external attackers and internal attackers and an external attacker is a powerful attacker who can observe and analyze all traffic in the specific network (Talabeigi & Naeeini, 2016). Because external attackers are not part of the system, they do not have the key of the entire system and cannot decrypt and sign messages, but they can obtain relevant information and use it for traffic and information analysis. Authorized and unauthorized information users are semi-trusted, which means that they will try their best to obtain some sensitive additional information from the query results and evidence (Ajulo et al., 2018).

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing