Update Algorithm of Secure Computer Database Based on Deep Belief Network

Authors

  • Liusuo Huang 1) Software College, Henan Finance University, Zhengzhou Henan 450046, China 2) Research Center for Digital Humanities, Henan Finance University, Zhengzhou Henan 450046, China
  • Yan Song 1) Software College, Henan Finance University, Zhengzhou Henan 450046, China 2) Research Center for Digital Humanities, Henan Finance University, Zhengzhou Henan 450046, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1311

Keywords:

DBN, security computer, update database

Abstract

In order to ensure the security of large-scale data transmission in a short time and in a wide range during online database updating, this paper presents a secure computer database updating algorithm based on DBN (Deep Belief Network). In this paper, the model adopts multi-layer depth structure for unsupervised feature learning, maps high-dimensional and nonlinear intrusion data to low-dimensional space, establishes the relationship mapping between high-dimensional and low-dimensional, and then uses fine-tuning algorithm to transform the model to achieve the best expression of features. At the same time, this method improves the data processing and method model without destroying the learned knowledge of the model and seriously affecting the real-time performance of detection. In order to overcome the problem of system instability caused by fixed empirical learning rate, this paper proposes a learning rate optimization strategy based on energy change. In the process of feature extraction, the features of different hidden layers are extracted to form combined features. Experiments show that the detection rate of this method can reach 95.31%, and the false alarm rate is 2.14%. This verifies the effectiveness of the secure computer database updating algorithm in this paper. Which can ensure the online update of the secure computer database.

Downloads

Download data is not yet available.

Author Biographies

Liusuo Huang, 1) Software College, Henan Finance University, Zhengzhou Henan 450046, China 2) Research Center for Digital Humanities, Henan Finance University, Zhengzhou Henan 450046, China

Liusuo Huang received his B.S degree in University of Information Engineering (Zhengzhou) in 1998. He is currently an associate professor in College of Software, Henan Finance University. His research interests focus on digital Humanities and database technology.

Yan Song, 1) Software College, Henan Finance University, Zhengzhou Henan 450046, China 2) Research Center for Digital Humanities, Henan Finance University, Zhengzhou Henan 450046, China

Yan Song received her M.S degree in Huazhong University of Science and Technology, 2016. Her is currently an associate professor in College of Software, Henan Finance University. Her current research field is software engineering and computer network technology.

References

Qiang W, Fz A, Jian X A. Efficient verifiable databases with additional insertion and deletion operations in cloud computing[J]. Future Generation Computer Systems, 2021, 115:553–567.

Bella G, Curzon P, Lenzini G. Service Security and Privacy as a Socio-Technical Problem: Literature review, analysis methodology and challenge domains[J]. Journal of computer security, 2015, 23(5):563–585.

Shakhovska N, Boyko N, Zasoba Y. Big Data Processing Technologies in Distributed Information Systems[J]. Procedia Computer Science, 2019, 160(2):561–566.

Lazouski A, Martinelli F, Mori P. Usage control in computer security: A survey[J]. Computer Science Review, 2010, 4(2):81–99.

Denning T, Kohno T, Levy H M. Computer Security and the Modern Home[J]. Communications of the ACM, 2013, 56(1):94–103.

Zhan S, Yu L, Wang Z, Du Y, Yu Y, Cao Q, Dang S, Khan Z. Cell traffic prediction based on convolutional neural network for software-defined ultra-dense visible light communication networks[J]. Security and Communication Networks. 2021, 19;2021.

Feng D, Yajie M, Fengxing Z. A Safety Message Broadcast Strategy in Hybrid Vehicular Network Environment[J]. The Computer Journal, 2018, 61(6):789–797.

Burr W, Ferraiolo H, Waltermire D. NIST and Computer Security[J]. It Professional, 2014, 16(2):31–37.

Tseng F K, Liu Y H, Chen R J. Advances in Information and Computer Security[J]. Lecture Notes in Computer Science, 2013, 15(1):5–6.

Maram B, Gnanasekar JM, Manogaran G, Balaanand M. Intelligent security algorithm for UNICODE data privacy and security in IOT[J]. Service Oriented Computing and Applications. 2019, 13(1):3–15.

Igor H, Bohuslava J, Martin J. Application of Neural Networks in Computer Security[J]. Procedia Engineering, 2014, 69(15):1209–1215.

Konur S. Specifying safety-critical systems with a decidable duration logic[J]. Science of Computer Programming, 2014, 80(10):264–287.

Hiraoka Y, Murakami T, Yamamoto K. Method of Computer-Aided Fault Tree Analysis for High-Reliable and Safety Design[J]. IEEE Transactions on Reliability, 2016, 65(2):687–703.

Gao Y, Gonzalez V A, Yiu T W. The effectiveness of traditional tools and computer-aided technologies for health and safety training in the construction sector: A systematic review[J]. Computers & Education, 2019, 138(SEP.):101–115.

Theodoridis, Y. Ten Benchmark Database Queries for Location-based Services[J]. The Computer Journal, 2018, 46(6):713–725.

Hazrati M K, Erfanian A. An online EEG-based brain-computer interface for controlling hand grasp using an adaptive probabilistic neural network.[J]. Medical Engineering & Physics, 2010, 32(7):730–739.

Park S, Hong I, Park J. An Energy-Efficient Embedded Deep Neural Network Processor for High Speed Visual Attention in Mobile Vision Recognition SoC[J]. IEEE Journal of Solid-State Circuits, 2016, 51(10):2380–2388.

Hou, Z. K., Cheng, H. L., Sun, S. W., Chen, J., Qi, D. Q., Liu, Z. B. (2019) Crack propagation and hydraulic fracturing in different lithologies. Applied Geophysics, 16(2), 243–251.

Pucciani G, Domenici A, Donno F. A performance study on the synchronisation of heterogeneous Grid databases using CONStanza[J]. Future Generation Computer Systems, 2010, 26(6):820–834.

Cheng, H., Wei, J., Cheng, Z. (2022). Study on sedimentary facies and reservoir characteristics of Paleogene sandstone in Yingmaili block, Tarim basin. Geofluids, 2022.

Stosovic M A, Dimitrijevic M, Litovski V. Computer Security Vulnerability as Concerns the Electricity Distribution Grid[J]. Applied Artificial Intelligence, 2014, 28(4–6):323–336.

Muralidhar K, Parsa R, Sarathy R. A General Additive Data Perturbation Method for Database Security[J]. Management Science, 2011, 45(10):1399–1415.

Kudo T, Takeda Y, Ishino M. An Implementation of Concurrency Control between Batch Update and Online Entries[J]. Procedia Computer Science, 2014, 35(2):1625–1634.

Han, J., Cheng, H., Shi, Y., Wang, L., Song, Y., Zhnag, W. (2016) Connectivity analysis and application of fracture cave carbonate reservoir in Tazhong. Science Technology and Engineering, 16(5), 147–152.

Marcozzi M, Vanhoof W, Hainaut J L. Relational symbolic execution of SQL code for unit testing of database programs[J]. ence of Computer Programming, 2015, 105(Jul.1):44–72.

BalaAnand M, Sivaparthipan C B. Security Privilege for Generating Session Key Using Selective Index for Passwords Validation[J]. Journal of Science and Innovative Engineering & Technology. 2013.

Cheng, H., Ma, P., Dong, G., Zhang, S., Wei, J., Qin, Q. (2022). Characteristics of Carboniferous Volcanic Reservoirs in Beisantai Oilfield, Junggar Basin. Mathematical Problems in Engineering, 2022.

Kundu A, Sural S, Majumdar A K. Database intrusion detection using sequence alignment[J]. International Journal of Information Security, 2010, 9(3):179–191.

Downloads

Published

2023-12-11

How to Cite

1.
Huang L, Song Y. Update Algorithm of Secure Computer Database Based on Deep Belief Network. JCSANDM [Internet]. 2023 Dec. 11 [cited 2024 Jul. 19];13(01):1-26. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/18863

Issue

Section

Futuristic AI Embedded Solutions for Cyber Security