pisco_log
banner

Real-Time Secure Distribution of Face Photos Using MinIO and Redis

Ji Lei

Abstract


An organization typically has a multitude of business systems, and the integration of these systems can effectively enhance
interactions between different business processes. After integration, there is a need to share, co-govern, and co-manage certain resources or data. This interconnectedness underscores the importance of secure and efficient data management, especially when sensitive information such as face photos is involved. This paper proposes a real-time encrypted distribution mechanism for face photos
based on MinIO and Redis, aimed at addressing potential privacy leakage risks during the storage and distribution of face photos, while
significantly enhancing distribution efficiency. The mechanism adopts a three-tier architecture, including a storage tier, a transmission
tier, and a business tier. By integrating the high-performance storage capabilities of MinIO, the advantages of Redis in real-time message distribution, and hybrid encryption technology, we have successfully achieved real-time and secure distribution of face photos. In
experimental testing, the distribution mechanism performs excellently under low to moderate traffic conditions, effectively enhancing
efficiency of face photo distribution.

Keywords


Minio; Redis; Face photos; Real-time distribution; Hybrid encryption

Full Text:

PDF

Included Database


References


[1] Zhang, L., Wang, L. A hybrid encryption approach for efficient and secure data transmission in IoT devices[J]. Journal of Engineering

and Applied Science. Springeropen, 2024: vol71(138), n. pag. DOI:https://doi.org/10.1186/s44147-024-00459-x.

[2] Lei, Liu. Design and Implementation of a High Performance Red Packet Rushing System[J]. Advances in Computer and Communication, Hill Publishing Group, 2022: vol3(2), 77-80.

[3] L. Zhou, K. -H. Yeh, G. Hancke, Z. Liu and C. Su. Security and Privacy for the Industrial Internet of Things: An Overview of Approach-

es to Safeguarding Endpoints[J]. IEEE Signal Processing Magazine. IEEE, September 2018: vol35(5), 76-87.

[4] Biham, E., Anderson, R., Knudsen, L. Serpent: A New Block Cipher Proposal[C]. Fast Software Encryption. Springer, 1998: vol1372,

222-238.

[5] Neal Koblitz. Elliptic Curve Cryptosystems[J]. Mathematics of Computation. American Mathematical Society, January 1987:

vol48(177), 203-209.

[6] Cramer, R., Shoup, V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack[C]. Advances in

Cryptology CRYPTO '98. Springer, 1998: vol1462, 13-25.

[7] Zuhi Subedar, Ashwini Araballi. Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication. International Journal of Mathematical Sciences and Computing (IJMSC). Modern Education and Computer Science Press,

2020: Vol.6(4), 35-41.




DOI: http://dx.doi.org/10.70711/aitr.v2i8.6643

Refbacks

  • There are currently no refbacks.