Improved encryption method for big data
An encryption method and big data technology, applied in the field of information security, can solve the problems of unrealistic encryption of large-scale data, large amount of calculation, encryption, etc., to avoid the impracticality of complete encryption, reduce storage space, and reduce data redundancy Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0019] Example 1 is an example of the encryption method. The data is stored in the form of files and folders. We select the file path (including the file name) as the only information to determine the file. The encrypted information is stored, and it can be stored in an encrypted information for convenience. In the table, the data includes the file path (including the file name), whether it is encrypted, the name or code of the encryption algorithm, if it is a block cipher, the information also includes the working mode (encryption mode), initial vector, filling mode and other necessary information for decryption. Encrypt several important files in a large amount of data.
[0020] Proceed as follows:
[0021] 1. Divide the data into blocks (segmented) as needed, and use one file as one block.
[0022] 2. According to the set keyword calculation rules, the sensitivity of the file is obtained. The judgment of reaching a certain threshold requires encryption. If the user chooses a file...
Embodiment 2
[0025] Embodiment 2 is a preferred embodiment of the encryption method. It is similar to Embodiment 1. The difference from Embodiment 1 is that the algorithm adopts a stream cipher algorithm, and the information of packet length, initial vector, and encryption mode is not required in the encrypted information table.
Embodiment 3
[0026] Embodiment 3 is a preferred embodiment of embodiment 1 of the encryption method. It has the same requirements as embodiment 1. However, in the key management, an initial key is used to initialize the encryption key of each file, and a hash function SHA256 is selected. , Use file path A, master key (initial key) K to generate. Calculate the value of HASH (K, A), and intercept 128 or 256 bits corresponding to the key length of the symmetric encryption algorithm used in the encrypted data block from the front of the binary. The algorithm can also be replaced with a stream cipher.
[0027] In theory, we only need to store the encryption key that can be used to encrypt each file for initial decryption. You can use the public key to encrypt the segmented encryption key, and store the segmented information, whether the segment is encrypted, the information of the data block corresponding to the segmented encryption key, the encryption algorithm information, the encoding type of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More