Abstract
Opportunity network is one of the main network types for data sharing applications today. Due to the completely self-organized and distributed characteristics of its own structure, there is a greater security risk in the process of data sharing. Therefore, an opportunity based on knowledge graph and big data is proposed. Research on data security sharing method of network routing nodes. Analyze the opportunistic network routing protocol, expound the data sharing mode of the opportunistic network routing nodes, represent the opportunistic network based on the knowledge graph, calculate the influence degree parameter of the routing node, build the routing node influence propagation model based on this, formulate the routing node data publishing/subscribing rules, combined with Secure multi-party computing big data builds a routing node data security sharing architecture to realize the secure sharing of opportunistic network routing node data. The experimental results show that after the method is applied, the minimum value of the shared data packet loss rate reaches 4%, and the maximum value of the data sharing safety factor reaches 0.98, which fully confirms that the method has a better data security sharing effect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fatima, S., Ahmad, S.: Secure and effective key management using secret sharing schemes in cloud computing. Int. J. e-Collaboration 16(1), 1–15 (2020)
Yang, J., Wen, J., Jiang, B., et al.: Blockchain-based sharing and tamper-proof framework of big data networking. IEEE Network 34(4), 62–67 (2020)
Hassija, V., Chamola, V., Garg, S., et al.: A blockchain-based framework for lightweight data sharing and energy trading in V2G network. IEEE Trans. Veh. Technol.Veh. Technol. 69(6), 5799–5812 (2020)
Dang, Q., Ma, H., Liu, Z., et al.: Secure and efficient client-side data deduplication with public auditing in cloud storage. Int. J. Network Secur. 22(3), 462–475 (2020)
Chen, Y., Hu, B., Yu, H., et al.: A threshold proxy re-encryption scheme for secure IoT data sharing based on blockchain. Electronics 10(19), 2359 (2021)
Liu, Q., Zhang, W., Ding, S., et al.: Novel secure group data exchange protocol in smart home with physical layer network coding. Sensors 20(4), 1138 (2020)
Yue-bo, L., Wei-jie, Z.: Implementation of dynamic clustering scheduling algorithm for social network data. Comput. Simul. 38(1), 269–272 (2021)
Zhang, Z., Ren, X.: Data security sharing method based on CP-ABE and blockchain. J. Intell. Fuzzy Syst. Appl. Eng. Technol. 2, 40 (2021)
Tan, H.-C., Soh, K.L., Wong, W.P., Tseng, M.-L.: Enhancing supply chain resilience by counteracting the achilles heel of information sharing. J. Enterp. Inf. Manage. 35(3), 817–846 (2022). https://doi.org/10.1108/JEIM-09-2020-0363
Jibb, L., Amoako, E., Heisey, M., et al.: Data handling practices and commercial features of apps related to children: a scoping review of content analyses. Arch. Dis. Child. 7, 107 (2022)
Sharma, N., Anand, A., Singh, A.K.: Bio-signal data sharing security through watermarking: a technical survey. Computing: Archives for informatics and numerical computation 103(9), 1883–1917 (2021)
Singh, C., Sunitha, C.A.: Chaotic and Paillier secure image data sharing based on blockchain and cloud security. Expert Syst. Appl. 198, 116874 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wan, X., Zhao, Y. (2024). Data Security Sharing Method of Opportunistic Network Routing Nodes Based on Knowledge Graph and Big Data. In: Wang, B., Hu, Z., Jiang, X., Zhang, YD. (eds) Multimedia Technology and Enhanced Learning. ICMTEL 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-031-50577-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-50577-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50576-8
Online ISBN: 978-3-031-50577-5
eBook Packages: Computer ScienceComputer Science (R0)