如何在netbeans中模拟云分析师的数据安全算法 [英] How to simulate my data security algorithm on cloud analyst in netbeans

查看:101
本文介绍了如何在netbeans中模拟云分析师的数据安全算法的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我想知道如何在netbeans中的云分析师上实现我的安全算法来测试它。我的研究的主要目标是通过在加密和隐写算法之间进行合并来设计云数据的安全模型,以维护云用户数据的隐私机密性和完整性。



我尝试了什么:



在这个模型中有三步安全:



第一步:在此步骤中,我们使用SHA256对云数据进行哈希处理以获取数据的精简版本,称为消息摘要以确保数据完整性。哈希码是消息的所有位的函数,并提供错误检测功能。对消息中任何位的更改都会导致更改哈希码。



下一步:(message + hash code)的串联+使用AES256加密+下一个会话的加密 - 解密密钥。哈希码提供实现身份验证所需的结构或冗余。由于加密应用于整个消息加哈希码,因此还提供了机密性。在此模型中,我们在每个会话中更改加密 - 解密密钥以提供密钥保密性。



最后,加密阶段的输出是嵌入的在封面图像中使用隐写算法LSB来隐藏消息的存在。如果数据非常大以隐藏在隐秘图像中,我们可以通过另一种方法应用该算法。我们可以隐藏散列图像中的哈希码和密钥,而不是将数据隐藏在隐藏图像中,并向用户发送两个文件,第一个文件包括散列后的加密消息和第二个文件包含stego-key。这种方法可以扩展到数字媒体的版权保护:音频,视频和图像。

I want to know how I can implement my security algorithm on cloud analyst in netbeans to test it. The main objective of my study is to design a security model for cloud data by merging between cryptography and steganography algorithms for maintaining the privacy confidentiality and integrity of cloud user data.

What I have tried:

In this model there is a three step of security:

Frist step: in this step we hash cloud data using SHA256 to obtain a condensed version of data, called a message digest to assure data integrity. The hash code is a function of all the bits of the message and provides an error-detection capability. A change to any bits in the message results in a change to the hash code.

Next: The concatenation of (message + hash code + the encryption–decryption key for the next session) is encrypted using AES256. The hash code provides the structure or redundancy required to achieve authentication. Because encryption is applied to the entire message plus hash code, confidentiality is also provided. In this model we change the encryption–decryption key every session to provide the key confidentiality.

Finally, the output of encryption phase is embedded in a cover image using steganography algorithm LSB to conceal the existence of the message. If the data is very large to be hiding in a stego image we can apply this algorithm by another method. Instead of hiding the data in a stego-image, we can hide only the hash code and the key in an image called (a stego-key) and send to user two files, the first file include the encrypted message after hashing and the second contain the stego-key. This approach can be extended to copyright protection for digital media: audio, video and images.

推荐答案

您是否明白netbeans不是编程语言?我假设你的意思是Java,在这种情况下你需要学习Java加密: java encryption - Google Search [ ^ ]
You do understand that netbeans is not a programming language? I assume you mean Java, in which case you need to study encryption in Java : java encryption - Google Search[^]


这篇关于如何在netbeans中模拟云分析师的数据安全算法的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆