Research on Secret Sharing for Cyberspace Mimic Defense
S Han, W Guo, J Du, F Zhang, H Lei… - 2023 8th International …, 2023 - ieeexplore.ieee.org
S Han, W Guo, J Du, F Zhang, H Lei, Q Yang
2023 8th International Conference on Computer and Communication …, 2023•ieeexplore.ieee.orgCyberspace mimic defense (CMD) is an emerging defense technology that combines
dynamic heterogeneous redundancy (DHR) to enhance the security of information systems.
At present, the applications of CMD focus more on data tamper resistance and do not more
pay attention to the privacy disclosure of executors. This paper proposes to introduce the
secret sharing mechanism into the CMD and use a secret sharing scheme with dimension
switching to achieve the security of the private data of executors without adding extra key …
dynamic heterogeneous redundancy (DHR) to enhance the security of information systems.
At present, the applications of CMD focus more on data tamper resistance and do not more
pay attention to the privacy disclosure of executors. This paper proposes to introduce the
secret sharing mechanism into the CMD and use a secret sharing scheme with dimension
switching to achieve the security of the private data of executors without adding extra key …
Cyberspace mimic defense (CMD) is an emerging defense technology that combines dynamic heterogeneous redundancy (DHR) to enhance the security of information systems. At present, the applications of CMD focus more on data tamper resistance and do not more pay attention to the privacy disclosure of executors. This paper proposes to introduce the secret sharing mechanism into the CMD and use a secret sharing scheme with dimension switching to achieve the security of the private data of executors without adding extra key management. And experiments proved that the combination of the secret sharing scheme and mimic defense can increase data security at a tolerable cost.
ieeexplore.ieee.org
Showing the best result for this search. See all results