Research on Computer Network Data Security Storage Technology in the Era of Big Data
In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of data breaches and a paucity of robust security measures. An enhanced storage paradigm, predicated upon a refined Hash algorithm—termed H-AONT...
Saved in:
| Published in: | Revista internacional de métodos numéricos para cálculo y diseno en ingenieria Vol. 40; no. 2 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
2024
|
| ISSN: | 0213-1315, 1886-158X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of data breaches and a paucity of robust security measures. An enhanced storage paradigm, predicated upon a refined Hash algorithm—termed H-AONT—is herein delineated. This methodology augments data storage security through the formulation of an apposite system model, the amalgamation of the merits inherent in conventional encryption algorithms, and the deployment of the H-AONT dual encryption algorithm in data processing. Empirical evidence substantiates that, vis-à-vis alternative approaches, the proposed method significantly bolsters data storage security, furnishes an elevated stratum of protection for computer network data repositories, ensures data storage reliability, and proffers a pertinent benchmark for the safeguarding of computer network data within the vast landscape of big data. |
|---|---|
| AbstractList | In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of data breaches and a paucity of robust security measures. An enhanced storage paradigm, predicated upon a refined Hash algorithm—termed H-AONT—is herein delineated. This methodology augments data storage security through the formulation of an apposite system model, the amalgamation of the merits inherent in conventional encryption algorithms, and the deployment of the H-AONT dual encryption algorithm in data processing. Empirical evidence substantiates that, vis-à-vis alternative approaches, the proposed method significantly bolsters data storage security, furnishes an elevated stratum of protection for computer network data repositories, ensures data storage reliability, and proffers a pertinent benchmark for the safeguarding of computer network data within the vast landscape of big data. |
| Author | Zhang, L. Gu, X. Zhao, Q. |
| Author_xml | – sequence: 1 givenname: L. surname: Zhang fullname: Zhang, L. – sequence: 2 givenname: X. surname: Gu fullname: Gu, X. – sequence: 3 givenname: Q. surname: Zhao fullname: Zhao, Q. |
| BookMark | eNot0M1OAjEUhuHGaCIid-CiNzBjz7Sdn6Ui_iREE8HEXXNaTmEQpqRTYrh7EV29q-9bPFfsvAsdMXYDIi9kU1a36zy2267NC1GoXOhcCDhjA6jrMgNdf56zgShAZiBBX7JR37dWyFpUEhoYsPk79YTRrXjo-Dhsd_tEkb9S-g7xiz9gQj4jt49tOvBZChGXxOfkVl3YhOWBtx1PK-KTiDx4ft8uT5NrduFx09Pov0P28TiZj5-z6dvTy_humjmoypRpjVYIrL2uEMkrVWpn0VbKL8DJY6tGWWqsWqhaUgkIjXWFsKVvpAJycsjU36-Loe8jebM7UmA8GBDmhGPW5oRjfnGM0OaII38A4HZcIw |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.23967/j.rimni.2024.05.001 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 1886-158X |
| ExternalDocumentID | 10_23967_j_rimni_2024_05_001 |
| GroupedDBID | 0R~ 123 2VB 457 AAEDT AAEDW AALRI AAXUO AAYWO AAYXX ABMAC ACVFH ADBBV ADCNI ADVLN AENEX AEUPX AFPUW AGHFR AIGII AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ BCNDV CITATION EBS EJD FDB GROUPED_DOAJ HZ~ KQ8 KWQ O9- SSZ |
| ID | FETCH-LOGICAL-c176t-55ab00a8f57aaef4465cbab74fd1c3b74794be9b4d483e61a19bc20b6f9341ec3 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001242102000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0213-1315 |
| IngestDate | Sat Nov 29 06:16:40 EST 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c176t-55ab00a8f57aaef4465cbab74fd1c3b74794be9b4d483e61a19bc20b6f9341ec3 |
| OpenAccessLink | https://doi.org/10.23967/j.rimni.2024.05.001 |
| ParticipantIDs | crossref_primary_10_23967_j_rimni_2024_05_001 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-00-00 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – year: 2024 text: 2024-00-00 |
| PublicationDecade | 2020 |
| PublicationTitle | Revista internacional de métodos numéricos para cálculo y diseno en ingenieria |
| PublicationYear | 2024 |
| SSID | ssib038073191 ssj0060485 |
| Score | 2.2545104 |
| Snippet | In the burgeoning epoch of big data, the imperative for secure computer network data storage is confronted with formidable challenges, including the perils of... |
| SourceID | crossref |
| SourceType | Index Database |
| Title | Research on Computer Network Data Security Storage Technology in the Era of Big Data |
| Volume | 40 |
| WOSCitedRecordID | wos001242102000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1886-158X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0060485 issn: 0213-1315 databaseCode: DOA dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWwoELAgHiLR-4rRLivJwcARVxqCoQC9rbynYcFGlxqm22Kn-lv7afH0lTVCF64JKNrcSbZL5MZsbfjAl5y0udqFoCvDLlUS7xSomi1ZGCsBulayndkiw_jvjxcbVe118Wi4sxF-Zsy42pzs_rk_8qavRB2DZ19hbingZFB_YhdGwhdmz_SfAjl85OA4xrNti8XsvAgpAHEWLssL6_weG2nJ2r-PpIezzcCWtGfuh-ulPmJqydTYBJ6QpN4GqUjyVaIqyfdB_g6J4uzT40oWfRtBXGl8r1sK3ab_vlbzc3ZPqltlxL3E0XGM_X49hH8cQQ2tv2Op4d4sK8X-N55MKnSgfVlrIsYplP5Iy1V71VVUascAsNT7rZl3IKGExvUvlpVpfc6fxd98t0sf0jV4s1xEiuVdj-48s38RHhCblx4Aq5UTZ2lE1SWMbfHXI35XC7Zu46dJWt0w_tNdGJSmhCR5cd78ynabpR391wbTMzaGbPrB6SB8ERoe89gB6RhTaPyWoED-0NHcFDA3ioRQIdwUMDeOgVeGhnKMBDAR7atxTgcac8Id8_Ha4-fo7CuhuRYrwcoqIQUMaiagsuhG5tST0lheR52zCV4Rc6XOI1zpu8ynTJBKulShNZtjVsIq2yp-TA9EY_I1TmbsGFUmVwM5qkkBXMZ10kTcN0rtP0OYnGx7A58eVVNn8TxotbHv-S3LctHzN7RQ6G3V6_JvfU2dCd7t44iV4Cnz5yrg |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Computer+Network+Data+Security+Storage+Technology+in+the+Era+of+Big+Data&rft.jtitle=Revista+internacional+de+m%C3%A9todos+num%C3%A9ricos+para+c%C3%A1lculo+y+diseno+en+ingenieria&rft.au=Zhang%2C+L.&rft.au=Gu%2C+X.&rft.au=Zhao%2C+Q.&rft.date=2024&rft.issn=0213-1315&rft.eissn=1886-158X&rft.volume=40&rft.issue=2&rft_id=info:doi/10.23967%2Fj.rimni.2024.05.001&rft.externalDBID=n%2Fa&rft.externalDocID=10_23967_j_rimni_2024_05_001 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0213-1315&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0213-1315&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0213-1315&client=summon |