Unlock instant, AI-driven research and patent intelligence for your innovation.

Improved encryption method for big data

An encryption method and big data technology, applied in the field of information security, can solve the problems of unrealistic encryption of large-scale data, large amount of calculation, encryption, etc., to avoid the impracticality of complete encryption, reduce storage space, and reduce data redundancy Effect

Inactive Publication Date: 2017-09-12
GUILIN UNIV OF ELECTRONIC TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, it is unrealistic to directly use the above-mentioned encryption method to encrypt large-scale data, because the calculation is huge, and such as homomorphic encryption often brings data expansion, which is expensive. On the other hand, it is not necessary to convert all The data is encrypted as above
Encrypting these data with traditional encryption methods also has problems such as large amount of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Example 1 is an example of the encryption method. The data is stored in the form of files and folders. We select the file path (including the file name) as the only information to determine the file. The encrypted information is stored, and it can be stored in an encrypted information for convenience. In the table, the data includes the file path (including the file name), whether it is encrypted, the name or code of the encryption algorithm, if it is a block cipher, the information also includes the working mode (encryption mode), initial vector, filling mode and other necessary information for decryption. Encrypt several important files in a large amount of data.

[0020] Proceed as follows:

[0021] 1. Divide the data into blocks (segmented) as needed, and use one file as one block.

[0022] 2. According to the set keyword calculation rules, the sensitivity of the file is obtained. The judgment of reaching a certain threshold requires encryption. If the user chooses a file...

Embodiment 2

[0025] Embodiment 2 is a preferred embodiment of the encryption method. It is similar to Embodiment 1. The difference from Embodiment 1 is that the algorithm adopts a stream cipher algorithm, and the information of packet length, initial vector, and encryption mode is not required in the encrypted information table.

Embodiment 3

[0026] Embodiment 3 is a preferred embodiment of embodiment 1 of the encryption method. It has the same requirements as embodiment 1. However, in the key management, an initial key is used to initialize the encryption key of each file, and a hash function SHA256 is selected. , Use file path A, master key (initial key) K to generate. Calculate the value of HASH (K, A), and intercept 128 or 256 bits corresponding to the key length of the symmetric encryption algorithm used in the encrypted data block from the front of the binary. The algorithm can also be replaced with a stream cipher.

[0027] In theory, we only need to store the encryption key that can be used to encrypt each file for initial decryption. You can use the public key to encrypt the segmented encryption key, and store the segmented information, whether the segment is encrypted, the information of the data block corresponding to the segmented encryption key, the encryption algorithm information, the encoding type of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, and relates to an improved encryption method for big data. In view of the fact that big data is not suitable to be all encrypted due to large volume, a selective encryption method is adopted. Only part of data is encrypted according to a rule or through selection. Data is compressed before encryption, which can enhance the security and reduce the storage space. Taking into account the possible problems brought about by encrypted ciphertext expansion, an encryption algorithm based on equal-length plaintext and ciphertext is adopted preferentially. Meanwhile, an optimal scheme reducing key management and ensuring security is proposed. A file can be encrypted and decrypted with fewer keys.

Description

Technical field [0001] The invention belongs to the field of information security and relates to a method for encrypting big data. Background technique [0002] With the development of information technology, many services also tend to be informatized and digitized. People are increasingly relying on data, and the amount of data is increasing. Big data (mega data), or huge amount of data, refers to the massive, high-growth and diversified information assets that require new processing models to have stronger decision-making power, insight and process optimization capabilities. Big data has 4V characteristics: Volume (large), Velocity (high speed), Variety (diversity), Value (value). [0003] The forms of "big data" are diverse. Big data cannot be processed by a single computer, and a distributed computing architecture must be adopted. Its characteristic lies in the mining of massive data, but it must rely on the distributed processing of cloud computing, distributed database, cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0631H04L9/0822H04L9/0861H04L9/0894
Inventor 王勇付莉徐波杨巍
Owner GUILIN UNIV OF ELECTRONIC TECH