System Wide Information Management (SWIM) is a distributed, large-scale network system that provides uninterrupted aviation information data sharing and transmission services to air traffic management departments, airports and airlines in real time. In order to guarantee the continuity of SWIM services, the emergency response mechanism of SWIM based on subscription/release service was studied. Firstly, by real-time monitoring various performance indicators of SWIM network, a network survivability evaluation method based on improved fuzzy analytic hierarchy process was proposed. Secondly, when the network survivability index fell below the boundary value of the parameter, the corresponding information was published to the subscriber. It was determined by the subscriber whether to perform the service migration. Finally, an Emergency Response Model based on Subscribe/Publish service (ERMSP) for SWIM was proposed for natural disasters and Distributed Denial of Service (DDoS) attacks. The model is based on subscribe, publish and trust management mechanisms. Simulation experimental results show that the resistibility is improved by 8.9% and the business continuity is improved by 18.2% by real-time monitoring of network performance indicators and deployment of ERMSP, which can realize the emergency response of SWIM.
The generation of massive data brings a huge storage and computational burden to users, and the emergence of cloud servers solves this problem well. However, data outsourcing brings convenience to users while it also causes some security problems. In order to solve the security problem of data in the outsourcing process, a simpler and more efficient cloud outsourcing data security auditing protocol throughout whole lifecycle was designed and implemented, which was combined with classical distributed string equality checking protocol and Rank-based Merkel Hash Tree (RMHT) algorithm. The protocol not only can protect the integrity of outsourced storage data, allowing users periodically audit its integrity, but also can guarantee the secure transfer of cloud data. Besides, the copy of transfer data can avoid being reserved by malicious cloud servers, protecting users' privacy well. The analyses of security and efficiency show that the proposed protocol is sufficiently secure and comparatively efficient, the security of outsourcing data throughout its whole lifecycle will be protected well.