Information Data Sharing Method of Electronic Files of Smart Campus Students Against Attribute Tampering.
Saved in:
| Title: | Information Data Sharing Method of Electronic Files of Smart Campus Students Against Attribute Tampering. |
|---|---|
| Authors: | Wang, Ruimin, Ren, Yahui |
| Source: | International Journal of High Speed Electronics & Systems; Dec2025, Vol. 34 Issue 4, p1-25, 25p |
| Subject Terms: | COMPUTER file sharing, INFORMATION retrieval, CLOUD storage, BLOCKCHAINS, INFORMATION sharing, DATA encryption |
| Abstract: | In the smart campus environment, the sharing of student electronic file information data is crucial for improving data quality and application efficiency. However, security issues in the process of data sharing, especially the risk of tampering with data attributes, have become the main obstacle to the widespread application of data sharing. To address this issue, a smart campus student electronic file information data sharing method that is resistant to attribute tampering has been proposed. This method constructs a consortium chain network with attribute centers as nodes, records user attributes and ciphertext information through blockchain technology, achieves decentralized management of user attributes, ensures tamper proof access to attributes, enhances data security, and provides a solid foundation for subsequent data sharing. On this basis, combined with autonomously set sharing strategies, fine-grained data sharing has been achieved. By using searchable attribute encryption technology, encrypted retrieval of multiple keywords is achieved, improving the convenience and efficiency of data retrieval. At the same time, key parameters such as data elasticity and data granularity were set to known values, and the relationship between the two was determined by calculating the data storage gradient and storage intensity index, achieving cloud storage optimization for shared data. In addition, this method achieves high efficiency and stability in data sharing transmission by detecting the channel with the highest transmission rate in real-time and selecting the optimal shared link at the best time. The experimental results show that this method can not only effectively achieve data encryption and storage, but also effectively resist tampering attacks on data attributes, significantly improving the application efficiency of data. [ABSTRACT FROM AUTHOR] |
| Copyright of International Journal of High Speed Electronics & Systems is the property of World Scientific Publishing Company and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
| Abstract: | In the smart campus environment, the sharing of student electronic file information data is crucial for improving data quality and application efficiency. However, security issues in the process of data sharing, especially the risk of tampering with data attributes, have become the main obstacle to the widespread application of data sharing. To address this issue, a smart campus student electronic file information data sharing method that is resistant to attribute tampering has been proposed. This method constructs a consortium chain network with attribute centers as nodes, records user attributes and ciphertext information through blockchain technology, achieves decentralized management of user attributes, ensures tamper proof access to attributes, enhances data security, and provides a solid foundation for subsequent data sharing. On this basis, combined with autonomously set sharing strategies, fine-grained data sharing has been achieved. By using searchable attribute encryption technology, encrypted retrieval of multiple keywords is achieved, improving the convenience and efficiency of data retrieval. At the same time, key parameters such as data elasticity and data granularity were set to known values, and the relationship between the two was determined by calculating the data storage gradient and storage intensity index, achieving cloud storage optimization for shared data. In addition, this method achieves high efficiency and stability in data sharing transmission by detecting the channel with the highest transmission rate in real-time and selecting the optimal shared link at the best time. The experimental results show that this method can not only effectively achieve data encryption and storage, but also effectively resist tampering attacks on data attributes, significantly improving the application efficiency of data. [ABSTRACT FROM AUTHOR] |
|---|---|
| ISSN: | 01291564 |
| DOI: | 10.1142/S0129156425402220 |
Nájsť tento článok vo Web of Science