Privacy information encryption for cross-border e-commerce users based on social network analysis

被引:0
作者
Wang N. [1 ]
Gao F. [2 ]
Zhang J. [3 ]
机构
[1] School of Management, Changchun University of Architecture and Civil Engineering, Changchun
[2] School of Art, Changchun University of Architecture and Civil Engineering, Changchun
[3] School of Electrical Engineering, Changchun University of Architecture and Civil Engineering, Changchun
关键词
cross-border e-commerce; information encryption; privacy; social network analysis; vector quantisation encoding;
D O I
10.1504/IJNVO.2023.135961
中图分类号
学科分类号
摘要
In order to protect the privacy information of cross-border e-commerce users, an encryption algorithm based on social network analysis is proposed in this paper. Firstly, the logical inference mapping method for blockchain identity data is used to encode public and private keys, and the asymmetric encryption method is applied to construct keys. Then, the social network analysis method is used to rearrange the user social network structure, and the user information fusion processing and optimised encryption are realised with the support of arithmetic coding, homomorphic encryption and other technologies. The simulation results show that this method has strong anti-attack ability and low time cost. © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:312 / 327
页数:15
相关论文
共 16 条
  • [1] Dai J., Li Y., He K., Et al., R-FCN:object detection via regionbased fully convolutionalnetworks, Proceedings of the 30th International Conference on Neural Information Processing Systems, pp. 379-387, (2016)
  • [2] Deng Z.P., Sun H., Lei L., Et al., Object detection in remote sensing imagery with multi-scale deformable convolutionalnetworks, Acta Geodaetica et Cartographica Sinica, 47, 9, pp. 1216-1227, (2018)
  • [3] Homer C., Dewitz J., Yang L., Et al., Completion of the 2011 national land cover database for the conterminous united states-representing a decade of land cover change information, Photogrammetric Engineering and Remote Sensing, 81, 5, pp. 345-354, (2015)
  • [4] Krizhevsky A., Sutskever I., Hinton G.E., ImageNet classification with deep convolutional neuralnetwork, Proceedings of the 25th International Conference on Neural Information Processing Systems, pp. 1097-1105, (2012)
  • [5] Li X.J., Zhang D., Li H., Efficient revocable attribute-based encryption scheme, Journal on Communications, 40, 6, pp. 32-39, (2019)
  • [6] Pang X., Wang Y., Chen W., Jiang P., Gao Y., Fair and verifiable multi-keyword ranked search over encrypted data based on blockchain, Journal of Computer Applications, 43, 1, pp. 130-139, (2023)
  • [7] Shabbir M., Shabbir A., Iwendi C., Et al., Enhancing security of health information using modular encryption standard in mobile cloud computing, IEEE Access, 9, 36, pp. 8820-8834, (2021)
  • [8] Song M.F., Jia D.Z., Guo J.W., Et al., A point cloud compression algorithm based on K-neighborhood cuboid, Science of Surveying and Mapping, 44, 10, pp. 93-100, (2019)
  • [9] Sun J., Zhu J., Tian Z., Shi G., Guan C., Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation, Journal of Computer Applications, 42, 7, pp. 2094-2103, (2022)
  • [10] Wang C., Han Y., Duan X., Et al., NTRU type proxy re encryption scheme based on RLWE difficulty hypothesis, Journal of Cryptography, 8, 5, pp. 909-920, (2021)