| Literature DB >> 35747723 |
Abstract
This work is conducted to deal with the information security of enterprise management under the background of current global informatization, popularize the modern Internet of Things (IoT) management technology of enterprises, and maintain the information security of enterprises and provide modern upgrading means for enterprise management. In this work, it firstly introduces the application scenarios of current Internet and Artificial Intelligence (AI) technology and expounds the IoT technology. Secondly, the enterprise management platform is designed, the requirements of enterprise modern management are analyzed, and then the design requirements of system functions and the design of the information security architecture of the IoT are proposed. Furthermore, an enterprise information security management platform is designed, which covers four parts: IoT data mining management, equipment management, key management, and database management. In addition, the performance of the security management platform is tested from four parts: concurrency testing, stress testing, large data volume testing, and security testing. The research results show that the IoT-based enterprise information security management platform designed in this work under the background of AI has perfect functions and stable performance of each module. Concurrency testing, stress testing, large data volume testing, and stability testing are performed on it, and the success rate of the platform in each task reaches 100%. The average response time of concurrent testing and stress testing is about 0.13 seconds, and that of the event entry events is 0.25 seconds. The central processing unit (CPU) occupancy rate in each monitoring task is always lower than 20%. Therefore, it is determined that the performance of the IoT-based enterprise information security management platform designed in this work is sufficient to meet the daily management of enterprises. This work can provide a guarantee for enterprise information security management using AI technology, setting an example for future related research.Entities:
Mesh:
Year: 2022 PMID: 35747723 PMCID: PMC9213165 DOI: 10.1155/2022/7138515
Source DB: PubMed Journal: Comput Intell Neurosci
Figure 1Main functional parts of the platform.
Functional requirements of the management system.
| Serial number | Type of function | Function descriptions |
|---|---|---|
| 1 | Authorization and revocation | It can add permission information, view permission information, delete permission information, and replace permission information. |
| 2 | Employee scheduling | It can realize employee information entry, employee information cleaning, employee information viewing, and employee information modification. |
| 3 | Data storage and backup | It can realize data storage and transfer, data upload to the cloud, data download, and system database restoration. |
| 4 | Rank role management | It can manage enterprise roles. |
| 5 | Data encryption and mining | It can realize data encryption using encryption algorithms, including collecting data, filtering data, mining data information, and drawing conclusions. |
Figure 2Schematic diagram of the basic structure of the RFID system.
Figure 3General structure of tag chip.
Figure 4Internal structure of card reader.
Figure 5IoT network security architecture.
The role of each module.
| Serial number | Name | Composition | Effect |
|---|---|---|---|
| 1 | Perception layer | Wireless sensor | It is a part of the bottom layer, which controls physical security and is used to ensure the integrity of IoT information collection data and not be destroyed or stolen. |
| 2 | Information collection layer | Information collector | Its information security needs to be managed to prevent the data collection process from being used and controlled, and the technology of the perception layer is encrypted with key management and chip design. |
| 3 | Information transmission security layer | Hard disk | Data transmission ensures the smooth collection of data and cooperates with security management technologies, such as wireless network security, routing security, firewall, and virtual network technology. |
| 4 | Information processing layer | Hard disk | It is to ensure the security of information processing and storage. It is composed of cloud storage and security management. Its technologies include analysis of security data, viruses, monitoring data, and data mining results. |
Figure 6Complete steps of data mining.
Figure 7The three-tier architecture of hardware management.
Figure 8Overall structure of the system.
Version test results.
| Serial number | Start time | End time | Tested item | Test results |
|---|---|---|---|---|
| 1 | 2021.9.7 | 2021.9.12 | Sensor data collection | Qualified |
| 2 | 2021.9.13 | 2021.9.17 | Data protection capability | Qualified |
| 3 | 2021.9.18 | 2021.9.23 | Data security testing | Qualified |
| 4 | 2021.9.24 | 2021.9.29 | Data security log | Qualified |
| 5 | 2021.9.30 | 2021.10.1 | Security risk assessment | Qualified |
| 6 | 2021.10.2 | 2021.10.5 | Internal system correction | Qualified |
| 7 | 2021.10.6 | 2021.10.10 | System authorization | Qualified |
Figure 9(a) Average response time. (b) Application server processor utilization. (c) Database server processor utilization. (d) Application server memory usage. (e) Database server memory usage.