Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method for big data

An encryption method and big data technology, applied in the field of information security, can solve the problems of unrealistic, high cost, and huge amount of calculation in encrypting large-scale data, and achieve the effect of avoiding the unrealistic effect of complete encryption.

Inactive Publication Date: 2017-05-24
GUILIN UNIV OF ELECTRONIC TECH
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, it is unrealistic to directly use the above-mentioned encryption method to encrypt large-scale data, because the calculation is huge, and such as homomorphic encryption often brings data expansion, which is expensive. On the other hand, it is not necessary to convert all The data is encrypted as above
Encrypting these data with traditional encryption methods also has problems such as large amount of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Embodiment 1 is the embodiment of this encryption method. Data is stored in the form of files and folders. We select the file path (including the file name) as the unique information for determining the file. The encrypted information is stored. For convenience, it can be stored in an encrypted information In the table, the data includes file path (including file name), whether to encrypt, encryption algorithm name or code, if it is a block cipher, the information also includes working mode (encryption mode), initial vector, padding mode and other necessary information for decryption. Encrypt several important files among large amounts of data.

[0020] Proceed as follows:

[0021] 1. Divide the data into blocks (segments) as needed, and take a file as a block.

[0022] 2. According to the set keyword calculation rules, the sensitivity of the file is obtained. If it reaches a certain threshold, it needs to be encrypted. If the user chooses a file that does not reach th...

Embodiment 2

[0025] Embodiment 2 is the preferred embodiment of this encryption method, similar to Embodiment 1, and the difference with Embodiment 1 is that the algorithm adopts the stream cipher algorithm, and there is no need for packet length, initial vector, and encryption mode information in the encryption information table.

Embodiment 3

[0026] Embodiment 3 is a preferred embodiment of this encryption method embodiment 1, and the requirements are the same as embodiment 1, but, in the management of the key, an initial key is used to initialize the encryption key of each file, and a hash function SHA256 is selected. , generated with file path A and master key (initial key) K. Calculate the HASH (K, A) value, and intercept the encrypted data block from the front of the binary, corresponding to the length of the key of the symmetric encryption algorithm, which is 128 or 256 bits. The algorithm can also be replaced by a stream cipher.

[0027] In theory, we only need to store the encryption key that initially decrypts the individual files. You can use the segment encryption key encrypted by the public key, and store the segment information, whether the segment is encrypted, the data block information corresponding to the segment encryption key, the encryption algorithm information, the encoding type of the plainte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security and relates to an encryption method for big data. The method considers huge data of the big data and is not suitable for all encryption, and through a rule or selection, the method adopts a selective encryption method to encrypt partial data only. The method considers the possible problems from encryption ciphertext expansion and preferentially adopts an encryption algorithm of a plaintext and a ciphertext which are of equal length, and meanwhile, an optimal scheme for reducing key management and ensuring security is provided, so that encryption and decryption of a file can be carried out by only fewer keys.

Description

technical field [0001] The invention belongs to the field of information security and relates to a method for encrypting big data. . Background technique [0002] With the development of information technology, many services tend to be informatized and digitized. People rely more and more on data, and the amount of data is also increasing. Big data (big data, mega data), or massive data, refers to massive, high-growth and diverse information assets that require new processing models to have stronger decision-making power, insight and process optimization capabilities. Big data has 4V characteristics: Volume (mass), Velocity (high speed), Variety (variety), Value (value). [0003] "Big data" comes in a variety of forms. Big data cannot be processed by a single computer, and a distributed computing architecture must be adopted. Its characteristic lies in the mining of massive data, but it must rely on cloud computing's distributed processing, distributed database, cloud st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L9/14
CPCH04L9/0618H04L9/088H04L9/14
Inventor 王勇梁黎刘永宏李德香吴思文王于海
Owner GUILIN UNIV OF ELECTRONIC TECH