{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:12:33Z","timestamp":1774534353209,"version":"3.50.1"},"reference-count":22,"publisher":"World Scientific Pub Co Pte Ltd","issue":"12","funder":[{"name":"Security Protection Technology for Key Information Infrastructure of Distribution Network","award":["2022YFB3105100"],"award-info":[{"award-number":["2022YFB3105100"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2025,8]]},"abstract":"<jats:p> This paper addresses information transmission security issues within cloud computing security management platforms. Focusing on the symmetric encryption algorithm, it proposes a cloud computing data security transmission system, followed by model validation and simulation analysis. The key findings are as follows: (1) The use of a symmetric encryption algorithm ensures both user data security and the secure distribution of encryption keys. (2) The proposed encryption algorithm effectively conceals the distribution characteristics of explicit data, enhancing the information transmission security of the ship communication network. (3) The joint robust optimization algorithm outperforms other benchmark methods in terms of average safety rate. (4) The maximum speed between sampling nodes is calculated, revealing a speed difference of 0.3[Formula: see text]km\/h between the embedded data and the original data. The average speed difference is 0.001[Formula: see text]km\/h, with a speed change rate of only 0.01%. These results indicate that the algorithm proposed in this paper provides high secrecy and a large hidden capacity, making it suitable for secure information transmission in vehicle-to-network communications and from roadside intelligent facilities to cloud servers. <\/jats:p>","DOI":"10.1142\/s0218126625502603","type":"journal-article","created":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T04:48:51Z","timestamp":1740804531000},"source":"Crossref","is-referenced-by-count":1,"title":["Symmetric Encryption-Based Cloud Data Security Transmission System in Communication Networks"],"prefix":"10.1142","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6826-5707","authenticated-orcid":false,"given":"Tong","family":"Li","sequence":"first","affiliation":[{"name":"The Electric Power Research Institute of State Grid Liaoning Electric Power Co., Ltd., Shenyang City 110006, Liaoning Province, P.\u00a0R.\u00a0China"},{"name":"School of Computer Science And Engineering, Northeastern University, Shenyang City 110819, Liaoning Province, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0455-9964","authenticated-orcid":false,"given":"Chang-Bin","family":"Xu","sequence":"additional","affiliation":[{"name":"State Grid Information & Telecommunication Group Co., Ltd., Beijing 102211, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7663-6054","authenticated-orcid":false,"given":"Wen-Si","family":"Huang","sequence":"additional","affiliation":[{"name":"State Grid Information & Telecommunication Group Co., Ltd., Beijing 102211, P.\u00a0R.\u00a0China"},{"name":"Northeast Electric Power University, Jilin City 132012, Jilin Province, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9471-6566","authenticated-orcid":false,"given":"Chao","family":"Yang","sequence":"additional","affiliation":[{"name":"State Grid Liaoning Electric Power Co., Ltd., Shenyang City 110004, Liaoning Province, P.\u00a0R.\u00a0China"},{"name":"North China Electric Power University, Beijing 102206, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6020-2915","authenticated-orcid":false,"given":"Xiao-Bo","family":"Wu","sequence":"additional","affiliation":[{"name":"Union Tech Software Technology Co., Ltd., Beijing 102600, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2025,5,21]]},"reference":[{"key":"S0218126625502603BIB001","doi-asserted-by":"publisher","DOI":"10.48161\/qaj.v1n2a36"},{"key":"S0218126625502603BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2020.103441"},{"key":"S0218126625502603BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3218527"},{"key":"S0218126625502603BIB004","first-page":"52","volume":"10","author":"Shi Y.","year":"2024","journal-title":"Inf. Syst. Eng."},{"key":"S0218126625502603BIB005","first-page":"127","volume":"9","author":"Wei Q.","year":"2024","journal-title":"Netw. Secur. Inform."},{"key":"S0218126625502603BIB006","first-page":"119","volume":"8","author":"Zheng X.","year":"2024","journal-title":"World Digit. Commun."},{"key":"S0218126625502603BIB007","first-page":"79","volume":"7","author":"Wang X.","year":"2024","journal-title":"China Inform."},{"key":"S0218126625502603BIB008","first-page":"195","volume-title":"Internet Computing: Principles of Distributed Systems and Emerging Internet-based Technologies","author":"Sunyaev A.","year":"2020"},{"key":"S0218126625502603BIB009","doi-asserted-by":"publisher","DOI":"10.1145\/3671151.3671183"},{"key":"S0218126625502603BIB010","first-page":"797","volume":"30","author":"Mistry H. K.","year":"2024","journal-title":"Educ. Admin. Theory Pract."},{"key":"S0218126625502603BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT55814.2023.10060945"},{"key":"S0218126625502603BIB012","first-page":"1","volume-title":"Computer Communication, Networking, and IoT: Proc. 5th ICICC","volume":"2","author":"Alam A.","year":"2022"},{"key":"S0218126625502603BIB013","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2021.9020016"},{"key":"S0218126625502603BIB014","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.11.121"},{"key":"S0218126625502603BIB015","first-page":"476","volume":"1","author":"Yanamala A. K. Y.","year":"2024","journal-title":"Int. J. Adv. Eng. Technol. Innov."},{"key":"S0218126625502603BIB016","doi-asserted-by":"publisher","DOI":"10.60087\/jklst.v3.n3.p206-224"},{"key":"S0218126625502603BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073203"},{"key":"S0218126625502603BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100519"},{"key":"S0218126625502603BIB019","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9091379"},{"key":"S0218126625502603BIB020","doi-asserted-by":"publisher","DOI":"10.5267\/j.msl.2023.4.003"},{"key":"S0218126625502603BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3263546"},{"key":"S0218126625502603BIB022","doi-asserted-by":"publisher","DOI":"10.1145\/3663573"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126625502603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:34:29Z","timestamp":1750314869000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218126625502603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,21]]},"references-count":22,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["10.1142\/S0218126625502603"],"URL":"https:\/\/doi.org\/10.1142\/s0218126625502603","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"value":"0218-1266","type":"print"},{"value":"1793-6454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,21]]},"article-number":"2550260"}}