Research on Computer Network Data Security Storage Technology in the Era of Big Data

In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of data breaches and a paucity of robust security measures. An enhanced storage paradigm, predicated upon a refined Hash algorithm—termed H-AONT...

Full description

Saved in:
Bibliographic Details
Published in:Revista internacional de métodos numéricos para cálculo y diseno en ingenieria Vol. 40; no. 2
Main Authors: Zhang, L., Gu, X., Zhao, Q.
Format: Journal Article
Language:English
Published: 2024
ISSN:0213-1315, 1886-158X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of data breaches and a paucity of robust security measures. An enhanced storage paradigm, predicated upon a refined Hash algorithm—termed H-AONT—is herein delineated. This methodology augments data storage security through the formulation of an apposite system model, the amalgamation of the merits inherent in conventional encryption algorithms, and the deployment of the H-AONT dual encryption algorithm in data processing. Empirical evidence substantiates that, vis-à-vis alternative approaches, the proposed method significantly bolsters data storage security, furnishes an elevated stratum of protection for computer network data repositories, ensures data storage reliability, and proffers a pertinent benchmark for the safeguarding of computer network data within the vast landscape of big data.
AbstractList In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of data breaches and a paucity of robust security measures. An enhanced storage paradigm, predicated upon a refined Hash algorithm—termed H-AONT—is herein delineated. This methodology augments data storage security through the formulation of an apposite system model, the amalgamation of the merits inherent in conventional encryption algorithms, and the deployment of the H-AONT dual encryption algorithm in data processing. Empirical evidence substantiates that, vis-à-vis alternative approaches, the proposed method significantly bolsters data storage security, furnishes an elevated stratum of protection for computer network data repositories, ensures data storage reliability, and proffers a pertinent benchmark for the safeguarding of computer network data within the vast landscape of big data.
Author Zhang, L.
Gu, X.
Zhao, Q.
Author_xml – sequence: 1
  givenname: L.
  surname: Zhang
  fullname: Zhang, L.
– sequence: 2
  givenname: X.
  surname: Gu
  fullname: Gu, X.
– sequence: 3
  givenname: Q.
  surname: Zhao
  fullname: Zhao, Q.
BookMark eNot0M1OAjEUhuHGaCIid-CiNzBjz7Sdn6Ui_iREE8HEXXNaTmEQpqRTYrh7EV29q-9bPFfsvAsdMXYDIi9kU1a36zy2267NC1GoXOhcCDhjA6jrMgNdf56zgShAZiBBX7JR37dWyFpUEhoYsPk79YTRrXjo-Dhsd_tEkb9S-g7xiz9gQj4jt49tOvBZChGXxOfkVl3YhOWBtx1PK-KTiDx4ft8uT5NrduFx09Pov0P28TiZj5-z6dvTy_humjmoypRpjVYIrL2uEMkrVWpn0VbKL8DJY6tGWWqsWqhaUgkIjXWFsKVvpAJycsjU36-Loe8jebM7UmA8GBDmhGPW5oRjfnGM0OaII38A4HZcIw
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.23967/j.rimni.2024.05.001
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
EISSN 1886-158X
ExternalDocumentID 10_23967_j_rimni_2024_05_001
GroupedDBID 0R~
123
2VB
457
AAEDT
AAEDW
AALRI
AAXUO
AAYWO
AAYXX
ABMAC
ACVFH
ADBBV
ADCNI
ADVLN
AENEX
AEUPX
AFPUW
AGHFR
AIGII
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
BCNDV
CITATION
EBS
EJD
FDB
GROUPED_DOAJ
HZ~
KQ8
KWQ
O9-
SSZ
ID FETCH-LOGICAL-c176t-55ab00a8f57aaef4465cbab74fd1c3b74794be9b4d483e61a19bc20b6f9341ec3
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001242102000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0213-1315
IngestDate Sat Nov 29 06:16:40 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c176t-55ab00a8f57aaef4465cbab74fd1c3b74794be9b4d483e61a19bc20b6f9341ec3
OpenAccessLink https://doi.org/10.23967/j.rimni.2024.05.001
ParticipantIDs crossref_primary_10_23967_j_rimni_2024_05_001
PublicationCentury 2000
PublicationDate 2024-00-00
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – year: 2024
  text: 2024-00-00
PublicationDecade 2020
PublicationTitle Revista internacional de métodos numéricos para cálculo y diseno en ingenieria
PublicationYear 2024
SSID ssib038073191
ssj0060485
Score 2.2545104
Snippet In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of...
SourceID crossref
SourceType Index Database
Title Research on Computer Network Data Security Storage Technology in the Era of Big Data
Volume 40
WOSCitedRecordID wos001242102000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1886-158X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0060485
  issn: 0213-1315
  databaseCode: DOA
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWwoELAgHiLR-4rRLivJwcARVxqCoQC9rbynYcFGlxqm22Kn-lv7afH0lTVCF64JKNrcSbZL5MZsbfjAl5y0udqFoCvDLlUS7xSomi1ZGCsBulayndkiw_jvjxcbVe118Wi4sxF-Zsy42pzs_rk_8qavRB2DZ19hbingZFB_YhdGwhdmz_SfAjl85OA4xrNti8XsvAgpAHEWLssL6_weG2nJ2r-PpIezzcCWtGfuh-ulPmJqydTYBJ6QpN4GqUjyVaIqyfdB_g6J4uzT40oWfRtBXGl8r1sK3ab_vlbzc3ZPqltlxL3E0XGM_X49hH8cQQ2tv2Op4d4sK8X-N55MKnSgfVlrIsYplP5Iy1V71VVUascAsNT7rZl3IKGExvUvlpVpfc6fxd98t0sf0jV4s1xEiuVdj-48s38RHhCblx4Aq5UTZ2lE1SWMbfHXI35XC7Zu46dJWt0w_tNdGJSmhCR5cd78ynabpR391wbTMzaGbPrB6SB8ERoe89gB6RhTaPyWoED-0NHcFDA3ioRQIdwUMDeOgVeGhnKMBDAR7atxTgcac8Id8_Ha4-fo7CuhuRYrwcoqIQUMaiagsuhG5tST0lheR52zCV4Rc6XOI1zpu8ynTJBKulShNZtjVsIq2yp-TA9EY_I1TmbsGFUmVwM5qkkBXMZ10kTcN0rtP0OYnGx7A58eVVNn8TxotbHv-S3LctHzN7RQ6G3V6_JvfU2dCd7t44iV4Cnz5yrg
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Computer+Network+Data+Security+Storage+Technology+in+the+Era+of+Big+Data&rft.jtitle=Revista+internacional+de+m%C3%A9todos+num%C3%A9ricos+para+c%C3%A1lculo+y+diseno+en+ingenieria&rft.au=Zhang%2C+L.&rft.au=Gu%2C+X.&rft.au=Zhao%2C+Q.&rft.date=2024&rft.issn=0213-1315&rft.eissn=1886-158X&rft.volume=40&rft.issue=2&rft_id=info:doi/10.23967%2Fj.rimni.2024.05.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_23967_j_rimni_2024_05_001
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0213-1315&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0213-1315&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0213-1315&client=summon