Data Security Management Based on Transparent Encryption Policy
With the advent of the "data security management system", the management of portable media devices has been balanced and standardized to prevent the leakage of internal sensitive information and ensure the security of internal sensitive information. However, if the "data security mana...
Saved in:
Published in | 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC) pp. 1 - 4 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
02.12.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | With the advent of the "data security management system", the management of portable media devices has been balanced and standardized to prevent the leakage of internal sensitive information and ensure the security of internal sensitive information. However, if the "data security management system" itself does not use effective technology to protect security, it may be compiled, analyzed, cracked or attacked by hackers, thereby losing data security capabilities. This paper aims to study data security management based on transparent encryption strategy. This paper first briefly introduces the research status of related technologies at home and abroad and the practical significance of the subject. A detailed overview of transparent encryption technology is given. The difference between two different transparent encryption techniques is explained. This paper builds a new data security management system based on the above technology, and conducts many experiments on the system to test the security and confidentiality of the system. Finally, an outlook on the future development of data security management is given. Experiments have shown that when the amount of data is small, the transparent encryption strategy is slightly slower than the traditional conventional encryption strategy, but with the increase of the data amount, the speed of the transparent encryption strategy will exceed that of the conventional encryption. data is less than half the time of conventional encryption. After transparent encryption policy data, it can resist network attacks for more than 1 hour in data security management. |
---|---|
DOI: | 10.1109/ICMNWC56175.2022.10032001 |