Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis

Chen Zhao,Yongsheng Zhang,Ye Xue,Tong Niu
DOI: https://doi.org/10.1007/s11036-022-01919-5
2022-04-11
Mobile Networks and Applications
Abstract:In this study, an IT operation and maintenance data encryption transmission verification algorithm based on fuzzy clustering analysis is presented. The key information of IT operation and maintenance data encryption is constructed, the key rearrangement of IT operation and maintenance data is realized through key representation method, the vector quantitative coding design of IT operation and maintenance data is implemented using fuzzy clustering coding method, the coding protocol and encryption transmission verification protocol between IT operation and maintenance data are developed, and the ciphertext control during IT operation and maintenance data encryption is conducted based on fuzzy clustering analysis and quantum evolutionary coding method. The minimum anti attack ability of the method is 0.932, the method has good anti attack ability and high scrambling ability to verify the encryption transmission of it operation and maintenance data, and improves the encryption protection ability of it operation and maintenance data.
computer science, information systems,telecommunications, hardware & architecture
What problem does this paper attempt to address?