Encryption method for big data
An encryption method and big data technology, applied in the field of information security, can solve the problems of unrealistic, high cost, and huge amount of calculation in encrypting large-scale data, and achieve the effect of avoiding the unrealistic effect of complete encryption.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0019] Embodiment 1 is the embodiment of this encryption method. Data is stored in the form of files and folders. We select the file path (including the file name) as the unique information for determining the file. The encrypted information is stored. For convenience, it can be stored in an encrypted information In the table, the data includes file path (including file name), whether to encrypt, encryption algorithm name or code, if it is a block cipher, the information also includes working mode (encryption mode), initial vector, padding mode and other necessary information for decryption. Encrypt several important files among large amounts of data.
[0020] Proceed as follows:
[0021] 1. Divide the data into blocks (segments) as needed, and take a file as a block.
[0022] 2. According to the set keyword calculation rules, the sensitivity of the file is obtained. If it reaches a certain threshold, it needs to be encrypted. If the user chooses a file that does not reach th...
Embodiment 2
[0025] Embodiment 2 is the preferred embodiment of this encryption method, similar to Embodiment 1, and the difference with Embodiment 1 is that the algorithm adopts the stream cipher algorithm, and there is no need for packet length, initial vector, and encryption mode information in the encryption information table.
Embodiment 3
[0026] Embodiment 3 is a preferred embodiment of this encryption method embodiment 1, and the requirements are the same as embodiment 1, but, in the management of the key, an initial key is used to initialize the encryption key of each file, and a hash function SHA256 is selected. , generated with file path A and master key (initial key) K. Calculate the HASH (K, A) value, and intercept the encrypted data block from the front of the binary, corresponding to the length of the key of the symmetric encryption algorithm, which is 128 or 256 bits. The algorithm can also be replaced by a stream cipher.
[0027] In theory, we only need to store the encryption key that initially decrypts the individual files. You can use the segment encryption key encrypted by the public key, and store the segment information, whether the segment is encrypted, the data block information corresponding to the segment encryption key, the encryption algorithm information, the encoding type of the plainte...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More