Proceedings of the First International Conference on Science, Engineering and Technology Practices for Sustainable Development, ICSETPSD 2023, 17th-18th November 2023, Coimbatore, Tamilnadu, India

Research Article

Design of Personal Information Security Protection System in Computer Network

Download110 downloads
  • @INPROCEEDINGS{10.4108/eai.17-11-2023.2342817,
        author={Qiyuan  Jie},
        title={Design of Personal Information Security Protection System in Computer Network},
        proceedings={Proceedings of the First International Conference on Science, Engineering and Technology Practices for Sustainable Development, ICSETPSD 2023, 17th-18th November 2023, Coimbatore, Tamilnadu, India},
        publisher={EAI},
        proceedings_a={ICSETPSD},
        year={2024},
        month={1},
        keywords={computer network personal information information security protection system},
        doi={10.4108/eai.17-11-2023.2342817}
    }
    
  • Qiyuan Jie
    Year: 2024
    Design of Personal Information Security Protection System in Computer Network
    ICSETPSD
    EAI
    DOI: 10.4108/eai.17-11-2023.2342817
Qiyuan Jie1,*
  • 1: College of Computer and Information, Department of Information, Hohai University, Nanjing, 211100, Jiangsu Province, China
*Contact email: jieqiyuan2008@126.com

Abstract

With the rapid development of computer network technology, people pay more and more attention to the security of personal information. This issue involves multiple aspects, including the protection of different information resources such as physical and chemical layers, but also concerns about large data storage spaces (such as optical disk storage) and other information security issues. At the same time, due to the many unique functions and characteristics of computer network technology, users have a certain degree of dependence on personal information systems. This article aims to introduce a data encryption processing method based on the TCP/IP (Transfer Control Protocol/Internet Protocol) protocol to meet this challenge. This article will deeply discuss theories such as cryptography and access control, and design corresponding systems to protect user privacy from illegal means such as Trojan horses and virus intrusions. Finally, by using the identity authentication method, the key codes corresponding to the personal information content stored in the database will be verified and analyzed. The verification results show that the data integrity of the personal information in the system can be as high as 95%.