CN116865952B - Encryption management method and system for data - Google Patents

Encryption management method and system for data Download PDF

Info

Publication number
CN116865952B
CN116865952B CN202310584715.5A CN202310584715A CN116865952B CN 116865952 B CN116865952 B CN 116865952B CN 202310584715 A CN202310584715 A CN 202310584715A CN 116865952 B CN116865952 B CN 116865952B
Authority
CN
China
Prior art keywords
data
encryption
sample
thumbnail
calculation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310584715.5A
Other languages
Chinese (zh)
Other versions
CN116865952A (en
Inventor
宋远岑
陈育鸣
庄健民
蔡定国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Huacun Electronic Technology Co Ltd
Original Assignee
Jiangsu Huacun Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Huacun Electronic Technology Co Ltd filed Critical Jiangsu Huacun Electronic Technology Co Ltd
Priority to CN202310584715.5A priority Critical patent/CN116865952B/en
Publication of CN116865952A publication Critical patent/CN116865952A/en
Application granted granted Critical
Publication of CN116865952B publication Critical patent/CN116865952B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a data encryption management method and a system, which relate to the technical field of data processing, wherein the method comprises the following steps: the method comprises the steps of inputting data scale of data to be encrypted and encryption grade information selected by a target user into an encryption scheme analysis model in an intermediate layer to obtain a target encryption scheme and encryption computing power information, inputting the data scale into a thumbnail analysis model in the intermediate layer to obtain thumbnail computing power information, constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and transmission delay between a plurality of nodes and the target user, determining a target node, encrypting the data to be encrypted according to the target encryption scheme, uploading the encrypted data to a far end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.

Description

Encryption management method and system for data
Technical Field
The invention relates to the technical field of data processing, in particular to a data encryption management method and system.
Background
Under the background of big data, the information communication breaks the limitation of the traditional information communication mode, greatly improves the quality and speed of information transmission, is safer, more reliable, more convenient and faster, and improves the life quality and the working efficiency of people. As the name implies, the data encryption technology processes plaintext according to specific rules and algorithms in the data transmission process, transmits the plaintext in the form of ciphertext, breaks the ciphertext into plaintext according to the specific rules and algorithms after receiving information, further reduces the risk of information leakage, prolongs the data encryption storage process in the prior art, has the technical problems of low processing efficiency and unsafe data, reduces transmission time, ensures data safety and improves processing efficiency.
Disclosure of Invention
The application provides a data encryption management method and system, which are used for solving the technical problems of low processing efficiency and unsafe data in the prior art that the transmission time of a data encryption storage process is prolonged.
In view of the above problems, the present application provides a method and a system for encrypting and managing data.
In a first aspect, the present application provides a method for encryption management of data, the method including: receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes; acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user; inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information; inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information; constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, computing encryption management scores of the plurality of nodes, and determining a target node; and encrypting the data to be encrypted according to the target encryption scheme by the target node to obtain encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
In a second aspect, the present application provides an encryption management system for data, the system comprising: the data receiving module is used for receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes; the encryption grade module is used for acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user; the first input module is used for inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation force information; the second input module is used for inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information; the first calculation module is used for constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, calculating encryption management scores of the plurality of nodes and determining a target node; the storage module is used for encrypting the data to be encrypted according to the target encryption scheme through the target node, obtaining encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
One or more technical solutions provided in the present application have at least the following technical effects or advantages:
the data encryption management method and system provided by the application relate to the technical field of data processing, solve the technical problems of low processing efficiency and unsafe data existing in the prior art that the data encryption storage process is prolonged in transmission, reduce the transmission time, ensure the data safety and improve the processing efficiency.
Drawings
Fig. 1 is a schematic flow chart of a data encryption management method;
fig. 2 is a schematic flow chart of obtaining encryption calculation force information in the encryption management method of data;
FIG. 3 is a schematic diagram of a process for obtaining abbreviated computational power information in a data encryption management method according to the present application;
fig. 4 is a schematic structural diagram of an encryption management system for data according to the present application. Reference numerals illustrate: the system comprises a data receiving module 1, an encryption grade module 2, a first input module 3, a second input module 4, a first calculation module 5 and a storage module 6.
Detailed Description
The application provides a data encryption management method and system, which are used for solving the technical problems of low processing efficiency and unsafe data in the prior art that the data encryption storage process is prolonged in transmission.
Example 1
As shown in fig. 1, an embodiment of the present application provides a method for encrypting and managing data, where the method includes:
step S100: receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
specifically, the encryption management method for data provided in the embodiments of the present application is applied to an encryption management system for data, so as to ensure the processing efficiency of encryption management in the process of data transmission encryption in the later period, and therefore, the data encryption platform needs to be constructed based on fog calculation, the data encryption platform includes a far end and an intermediate layer, the far end refers to a remote server, the intermediate layer is used for receiving data to be encrypted uploaded by a target user, the user and the far end are connected, and a plurality of nodes are included in the intermediate layer, the constructed intermediate layer can be based on fog calculation, that is, the processing and the application of the data to be encrypted in the fog calculation are concentrated in the equipment at the network edge, rather than being stored in the complete cloud, the data to be encrypted uploaded by the target user refers to the data which is not encrypted and is transmitted by the receiving end, and the data encryption management is realized in the later period as an important reference basis.
Step S200: acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
specifically, the data size of the data to be encrypted uploaded by the target user is measured based on the number of rows or columns of the data, and the greater the data size is, the greater the difficulty in processing and analyzing the data is, the greater the calculation power is, further, the encryption level selected by the target user according to the self requirement is obtained, the encryption level includes ten levels of 1-10, the user can select the encryption level according to the importance of the data, the confidentiality and the security of the data are guaranteed to different degrees, and the encryption level information selected by the target user is obtained, so that the management of the data encryption is further guaranteed.
Step S300: inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information;
further, as shown in fig. 2, step S300 of the present application further includes:
step S310: acquiring a sample data scale set and a sample encryption grade information set according to a data encryption record in a preset historical time range of the data encryption platform;
step S320: acquiring a sample encryption scheme set according to the sample encryption grade information set, and acquiring a sample encryption computing power information set according to the sample data scale set and the sample encryption scheme set;
step S330: constructing mapping relations between a plurality of sample encryption grade information in the sample encryption grade information set and a plurality of sample encryption schemes in the sample encryption scheme set, and obtaining a scheme analysis unit in the encryption scheme analysis model;
step S340: adopting the sample data scale set, the sample encryption scheme set and the sample encryption computing power information set as construction data to construct a computing power analysis unit in the encryption scheme analysis model;
step S350: and inputting the encryption grade information into the scheme analysis unit to obtain the target encryption scheme, and inputting the data scale and the target encryption scheme into the calculation power analysis unit to obtain the encryption calculation power information.
Further, step S341 of the present application includes:
step S341: taking the data scale as a first decision feature, constructing a plurality of layers of first decision dividing nodes by adopting a plurality of sample data scales in the sample data scale set, and carrying out classification dividing decisions by each layer of first decision dividing nodes according to the input data scale;
step S342: taking an encryption scheme as a second decision feature, adopting a plurality of sample encryption schemes in the sample encryption scheme set to construct a plurality of layers of second decision dividing nodes, and judging and deciding according to one sample encryption scheme in each layer of second decision dividing nodes;
step S343: connecting the multi-layer first decision dividing node and the multi-layer second decision dividing node, and obtaining a plurality of decision results obtained by jointly deciding the multi-layer first decision dividing node and the multi-layer second decision dividing node;
step S344: and encrypting the calculation power information by adopting a plurality of samples in the sample encryption calculation power information set, and correspondingly marking the decision results to obtain the calculation power analysis unit.
Specifically, because the computing power required by encrypting the data to be encrypted needs to be obtained in the process of encrypting the data to be encrypted so as to match nodes with corresponding computing power, further, the data encryption records contained in the historical time range are obtained according to the data encryption platform, the obtained data encryption records in the preset historical time range are obtained by related technicians according to the data encryption sample data scale and the data of the sample encryption grade information in the historical time, the preset historical time range can be the time of the past year, thus the sample data scale set and the sample encryption grade information set are obtained, the sample data scale set refers to the set of different data scales of a plurality of data contained in the data encryption records in the historical time range, the sample encryption grade information set refers to the set of the sample data scale in the sample data scale set according to the relation between the data scale and the data grade, the encryption grade is correspondingly set of all the sample data scale in the sample data scale set, further, on the basis of the sample encryption grade information set, an encryption scheme with different data encryption grades is formulated according to the sample encryption grade, if the data encryption grade information set is the same in the sample encryption grade, the sample encryption information set is not more complex, the sample encryption grade information is further encrypted according to the sample encryption grade information set is not required to the sample encryption grade information, and the sample encryption grade information is further encrypted according to the sample encryption grade information set, the method includes the steps of obtaining a sample encryption computing power information set, further constructing mapping relations of a plurality of sample encryption level information contained in the sample encryption level information set and a plurality of sample encryption schemes in the sample encryption scheme set, and when the plurality of sample encryption scheme set and the plurality of sample encryption level information have mapping relations, illustratively, the plurality of sample encryption scheme set takes one value, the plurality of sample encryption level information has one value and only one value corresponds to the plurality of sample encryption level information, the plurality of sample encryption scheme set can have a plurality of values corresponding to the plurality of sample encryption level information, and acquiring scheme analysis units contained in an encryption scheme analysis model according to the constructed mapping relations, further adopting the sample data size set and the sample encryption scheme set by the sample encryption computing information set, and constructing the computing power analysis units in the encryption scheme analysis model by taking the sample encryption scheme set and the sample encryption computing information set as construction data, wherein the construction constitution can be as follows: based on a decision tree algorithm, constructing a plurality of layers of first decision dividing nodes according to a plurality of sample data scales contained in a sample data scale set, taking the data scales as first decision features, wherein the first decision features are dividing standards of the plurality of layers of first decision dividing nodes, meanwhile, each layer of first decision dividing nodes divide the data according to the input data scales, inputting two classification results obtained by dividing into lower layers of first decision dividing nodes, dividing the data scales into different data scale intervals through the plurality of layers of classification, further constructing a plurality of layers of second decision dividing nodes according to a plurality of sample encryption scheme sets in the sample encryption scheme set, taking the encryption scheme as a second decision feature, judging whether the data belong to a sample encryption scheme in the layer of second decision dividing nodes according to one of sample encryption schemes contained in the encryption scheme, finally, connecting the first decision dividing nodes with the second decision nodes to obtain a plurality of layers of encryption schemes according to the common characteristics of the first decision dividing nodes and the plurality of layers of division nodes, encrypting the plurality of nodes according to the common characteristics of the plurality of layers of division nodes, and then obtaining the multi-layer decision nodes by encrypting the common characteristics of the first decision dividing nodes, the method comprises the steps of obtaining a plurality of decision results, wherein the plurality of decision results comprise encryption calculation force information for encrypting transmission data to be encrypted with different data scales by adopting different encryption schemes, further integrating calculation force required by encrypting the data with different data scales by adopting different encryption schemes to be used as a sample encryption calculation force information set, and the sample encryption calculation force information set comprises a plurality of sample encryption calculation force information.
Step S400: inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information;
further, as shown in fig. 3, step S400 of the present application further includes:
step S410: acquiring a sample data scale set and a sample contraction calculation force information set according to a data encryption record in a preset historical time range of the data encryption platform;
step S420: constructing the thumbnail analysis model by adopting the sample data scale set and the sample thumbnail calculation power information set;
step S430: inputting the data scale into the thumbnail analysis model to obtain the thumbnail calculation power information.
Further, step S420 of the present application includes:
step S421: carrying out data identification on the data in the sample data scale set and the sample abbreviation calculation force information set to obtain a constructed data set;
step S422: constructing a network structure of the thumbnail analysis model based on a neural network;
step S423: and performing supervision training, verification and test on the thumbnail analysis model by adopting the constructed data set, and obtaining the thumbnail analysis model under the condition that the preset condition is met.
Specifically, the data size of the data to be encrypted is input into a thumbnail analysis model contained in an intermediate layer of the encryption platform, the thumbnail calculation force information of the data to be encrypted is obtained, the thumbnail calculation force information refers to calculation force required when the thumbnail calculation is carried out on the data to be encrypted, the thumbnail calculation is used for generating the thumbnail information of the data to be encrypted for quick browsing and calling by a user, if the data to be encrypted is a picture, the corresponding thumbnail information is a thumbnail and is stored in a node so as to facilitate quick browsing, further, the sample data size set and the sample thumbnail calculation force information set are extracted according to the obtained data encryption record within the preset history time range of the data encryption platform, and the thumbnail analysis model is constructed through the sample data size set and the sample thumbnail calculation force information set, and the construction process can be as follows: the method comprises the steps of firstly, respectively identifying data characteristics of data in a sample data scale set and data in a sample abbreviation calculation force information set, and recording all the identified data as a constructed data set.
The construction process of the thumbnail analysis model comprises the following steps: inputting each group of training data in the training data set into the thumbnail analysis model, outputting and supervising adjustment of the thumbnail analysis model through the supervising data corresponding to the group of training data, finishing the current group of training when the output result of the thumbnail analysis model is consistent with the supervising data, finishing all training data in the training data set, and finishing the training of the thumbnail analysis model.
In order to ensure the accuracy of the thumbnail analysis model, the test processing of the thumbnail analysis model may be performed by the test data set, for example, the test accuracy may be set to 80%, and when the test accuracy of the test data set satisfies 80%, the thumbnail analysis model construction is completed.
Finally, inputting the data scale of the data to be encrypted into the constructed thumbnail analysis model, and outputting the thumbnail calculation power information of the data to be encrypted, thereby realizing the promotion of data encryption management.
Step S500: constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, computing encryption management scores of the plurality of nodes, and determining a target node;
further, step S500 of the present application further includes:
step S510: and constructing the node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, wherein the node evaluation function comprises the following formula:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
Further, step S520 of the present application includes:
step S521: calculating a plurality of encryption management scores of the plurality of nodes by adopting the node evaluation function;
step S522: and sequencing the plurality of encryption management scores according to the sequence from big to small, and selecting the node which is the forefront and is idle in the sequencing as the target node.
Specifically, in order to ensure the accuracy of encryption management of the data to be encrypted, the following node evaluation function needs to be constructed based on the encryption power information output by the encryption scheme analysis model, the thumbnail calculation power information output by the thumbnail analysis model, and the data transmission time delay of a plurality of nodes and target users in the middle layer of the encryption platform when the data to be encrypted is transmitted in an encryption manner:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
The transmission delay between the node and the target user is shorter, the efficiency of data encryption management is improved, encryption management scores of a plurality of nodes are calculated through the constructed formula, wherein the default second weight is preferably larger than the first weight, the second weight can be set to 0.7, the first weight is 0.3, further, the target node is determined according to the calculated encryption management scores of the plurality of nodes, the node evaluation function constructed as above is adopted, the encryption management scores of each of the plurality of nodes are calculated, the encryption management scores are sequenced according to the sequence from large to small, the node which is the highest in the sequence, namely the node which is idle in the highest encryption management score is selected, and the selected node is used as the target node so as to be used as reference data when the data encryption is managed for the later period.
Step S600: and encrypting the data to be encrypted according to the target encryption scheme by the target node to obtain encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
Specifically, the determined target node is taken as a basis, the data to be encrypted uploaded by the target user is encrypted according to the target encryption scheme output by the encryption scheme analysis model, so that encrypted data is obtained, the encrypted data is uploaded to a remote end in an encryption platform for storage, and further, the thumbnail data of the encrypted data is obtained by the following formula:
wherein lambda is the thumbnail data alpha of the data to be encrypted, and beta is the non-key information data in the data to be encrypted. And finally, the thumbnail data of the data to be encrypted, which is calculated by the formula, is stored in the determined target node, so that the transmission time is reduced, the data security is ensured, and the processing efficiency is improved.
In summary, the data encryption management method provided by the embodiment of the application at least includes the following technical effects, so that the transmission time is reduced, the data security is ensured, and the processing efficiency is improved.
Example two
Based on the same inventive concept as the encryption management method of data in the foregoing embodiment, as shown in fig. 4, the present application provides an encryption management system of data, the system includes:
the data receiving module 1 is used for receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
the encryption grade module 2 is used for acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
the first input module 3 is used for inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information;
the second input module 4 is used for inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information;
the first computing module 5 is configured to construct a node evaluation function according to the encryption computing power information, the abbreviated computing power information, and transmission delays between the plurality of nodes and the target user, calculate encryption management scores of the plurality of nodes, and determine a target node;
the storage module 6 is configured to encrypt the data to be encrypted according to the target encryption scheme by using the target node, obtain encrypted data, upload the encrypted data to the remote end for storage, calculate and obtain thumbnail data of the data to be encrypted, and store the thumbnail data to the target node.
Further, the system further comprises:
the data encryption recording module is used for acquiring a sample data scale set and a sample encryption grade information set according to the data encryption record in the data encryption platform preset history time range;
the set acquisition module is used for acquiring a sample encryption scheme set according to the sample encryption grade information set and acquiring a sample encryption computing power information set according to the sample data scale set and the sample encryption scheme set;
the mapping module is used for constructing mapping relations between a plurality of sample encryption grade information in the sample encryption grade information set and a plurality of sample encryption schemes in the sample encryption scheme set, and obtaining a scheme analysis unit in the encryption scheme analysis model;
the unit construction module is used for constructing a computational power analysis unit in the encryption scheme analysis model by adopting the sample data scale set, the sample encryption scheme set and the sample encryption computational power information set as construction data;
the third input module is used for inputting the encryption grade information into the scheme analysis unit to obtain the target encryption scheme, and inputting the data scale and the target encryption scheme into the calculation power analysis unit to obtain the encryption calculation power information.
Further, the system further comprises:
the fourth input module is used for taking the data scale as a first decision feature, constructing a plurality of layers of first decision dividing nodes by adopting a plurality of sample data scales in the sample data scale set, and carrying out a classification dividing decision by each layer of first decision dividing nodes according to the input data scale;
the node construction module is used for constructing a plurality of layers of second decision dividing nodes by taking an encryption scheme as a second decision feature and adopting a plurality of sample encryption schemes in the sample encryption scheme set, and judging decisions are carried out in each layer of second decision dividing nodes according to one sample encryption scheme;
the decision module is used for connecting the multi-layer first decision dividing node and the multi-layer second decision dividing node and acquiring a plurality of decision results obtained by jointly making decisions of the multi-layer first decision dividing node and the multi-layer second decision dividing node;
the marking module is used for correspondingly marking the decision results by adopting a plurality of sample encryption calculation force information in the sample encryption calculation force information set to obtain the calculation force analysis unit.
Further, the system further comprises:
the collection acquisition module is used for acquiring a sample data scale collection and a sample thumbnail calculation power information collection according to the data encryption record in the data encryption platform preset history time range
The model construction module is used for constructing the thumbnail analysis model by adopting the sample data scale set and the sample thumbnail calculation power information set;
and the fifth input module is used for inputting the data scale into the thumbnail analysis model to obtain the thumbnail calculation power information.
Further, the system further comprises:
the data identification module is used for carrying out data identification on the data in the sample data scale set and the sample abbreviation calculation force information set to obtain a constructed data set;
the structure construction module is used for constructing a network structure of the thumbnail analysis model based on a neural network;
the model acquisition module is used for performing supervision training, verification and test on the thumbnail analysis model by adopting the constructed data set, and acquiring the thumbnail analysis model under the condition that preset conditions are met.
Further, the system further comprises:
the formula module is used for constructing the node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, and the formula is as follows:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
Further, the system further comprises:
the second calculation module is used for calculating a plurality of encryption management scores of the plurality of nodes by adopting the node evaluation function;
and the ordering module is used for ordering the plurality of encryption management scores according to the order from big to small, and selecting the node which is the forefront and is idle in the ordering as the target node.
The foregoing detailed description of a method for encrypting and managing data will be apparent to those skilled in the art, and the device disclosed in this embodiment is relatively simple and relevant to the description of the method section because it corresponds to the method disclosed in the embodiment. The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. A method of encryption management of data, the method comprising:
receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information;
inputting the data scale into an abbreviated analysis model in the middle layer to obtain abbreviated calculation force information, wherein the abbreviated calculation force information refers to calculation force required when the abbreviated calculation is performed on information to be encrypted, and the abbreviated calculation is used for generating abbreviated data of the data to be encrypted so as to be quickly browsed and invoked by a user;
constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, computing encryption management scores of the plurality of nodes, and determining a target node;
and encrypting the data to be encrypted according to the target encryption scheme by the target node to obtain encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
2. The method of claim 1, wherein inputting the data size and the encryption level information into an encryption scheme analysis model within the intermediate layer to obtain a target encryption scheme and encryption power information, comprises:
acquiring a sample data scale set and a sample encryption grade information set according to a data encryption record in a preset historical time range of the data encryption platform;
acquiring a sample encryption scheme set according to the sample encryption grade information set, and acquiring a sample encryption computing power information set according to the sample data scale set and the sample encryption scheme set;
constructing mapping relations between a plurality of sample encryption grade information in the sample encryption grade information set and a plurality of sample encryption schemes in the sample encryption scheme set, and obtaining a scheme analysis unit in the encryption scheme analysis model;
adopting the sample data scale set, the sample encryption scheme set and the sample encryption computing power information set as construction data to construct a computing power analysis unit in the encryption scheme analysis model;
and inputting the encryption grade information into the scheme analysis unit to obtain the target encryption scheme, and inputting the data scale and the target encryption scheme into the calculation power analysis unit to obtain the encryption calculation power information.
3. The method according to claim 2, wherein constructing a computational power analysis unit within the encryption scheme analysis model using the set of sample data sizes, the set of sample encryption schemes, and the set of sample encryption computational power information as construction data, comprises:
taking the data scale as a first decision feature, constructing a plurality of layers of first decision dividing nodes by adopting a plurality of sample data scales in the sample data scale set, and carrying out classification dividing decisions by each layer of first decision dividing nodes according to the input data scale;
taking an encryption scheme as a second decision feature, adopting a plurality of sample encryption schemes in the sample encryption scheme set to construct a plurality of layers of second decision dividing nodes, and judging and deciding according to one sample encryption scheme in each layer of second decision dividing nodes;
connecting the multi-layer first decision dividing node and the multi-layer second decision dividing node, and obtaining a plurality of decision results obtained by jointly deciding the multi-layer first decision dividing node and the multi-layer second decision dividing node;
and encrypting the calculation power information by adopting a plurality of samples in the sample encryption calculation power information set, and correspondingly marking the decision results to obtain the calculation power analysis unit.
4. The method of claim 1, wherein inputting the data scale into a thumbnail analysis model within the intermediate layer to obtain thumbnail computational power information comprises:
acquiring a sample data scale set and a sample contraction calculation force information set according to a data encryption record in a preset historical time range of the data encryption platform;
constructing the thumbnail analysis model by adopting the sample data scale set and the sample thumbnail calculation power information set;
inputting the data scale into the thumbnail analysis model to obtain the thumbnail calculation power information.
5. The method of claim 4, wherein constructing the thumbnail analysis model using the sample data size set and sample thumbnail calculation power information set comprises:
carrying out data identification on the data in the sample data scale set and the sample abbreviation calculation force information set to obtain a constructed data set;
constructing a network structure of the thumbnail analysis model based on a neural network;
and performing supervision training, verification and test on the thumbnail analysis model by adopting the constructed data set, and obtaining the thumbnail analysis model under the condition that the preset condition is met.
6. The method of claim 1, wherein constructing a node evaluation function from the encryption computation information, the thumbnail computation information, and transmission delays of the plurality of nodes and the target user comprises:
and constructing the node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, wherein the node evaluation function comprises the following formula:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
7. The method of claim 6, wherein calculating the encryption supervisory scores for the plurality of nodes and determining the target node comprises:
calculating a plurality of encryption management scores of the plurality of nodes by adopting the node evaluation function;
and sequencing the plurality of encryption management scores according to the sequence from big to small, and selecting the node which is the forefront and is idle in the sequencing as the target node.
8. A system for encryption management of data, the system comprising:
the data receiving module is used for receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
the encryption grade module is used for acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
the first input module is used for inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation force information;
the second input module is used for inputting the data scale into an abbreviation analysis model in the middle layer to obtain abbreviation calculation force information, the abbreviation calculation force information refers to calculation force required when the abbreviation calculation is carried out on the information to be encrypted, and the abbreviation calculation is used for generating abbreviation data of the data to be encrypted so as to be quickly browsed and invoked by a user;
the first calculation module is used for constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, calculating encryption management scores of the plurality of nodes and determining a target node;
the storage module is used for encrypting the data to be encrypted according to the target encryption scheme through the target node, obtaining encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
CN202310584715.5A 2023-05-23 2023-05-23 Encryption management method and system for data Active CN116865952B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310584715.5A CN116865952B (en) 2023-05-23 2023-05-23 Encryption management method and system for data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310584715.5A CN116865952B (en) 2023-05-23 2023-05-23 Encryption management method and system for data

Publications (2)

Publication Number Publication Date
CN116865952A CN116865952A (en) 2023-10-10
CN116865952B true CN116865952B (en) 2024-02-20

Family

ID=88220409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310584715.5A Active CN116865952B (en) 2023-05-23 2023-05-23 Encryption management method and system for data

Country Status (1)

Country Link
CN (1) CN116865952B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117221018B (en) * 2023-11-09 2024-01-30 北京睿航至臻科技有限公司 Data security transmission method and system based on data coding
CN117314478B (en) * 2023-11-30 2024-03-19 深圳市天兴诚科技有限公司 RFID-based product full life cycle management and control system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190033757A (en) * 2017-09-22 2019-04-01 (주)노르마 Analysis method and system of Security Vulnerability of wireless network
WO2021098407A1 (en) * 2019-11-21 2021-05-27 中移物联网有限公司 Mec-based service node allocation method and apparatus, and related server
WO2022079431A1 (en) * 2020-10-12 2022-04-21 Cambridge Cryptographic Ltd Block reward management in blockchain
CN114861167A (en) * 2022-04-06 2022-08-05 国网浙江省电力有限公司电力科学研究院 Block chain-based distributed energy data management cooperative processing method and system
CN115021929A (en) * 2022-05-24 2022-09-06 中国电信股份有限公司 Trust management method and device for computing power network, storage medium and electronic equipment
CN115543624A (en) * 2022-10-13 2022-12-30 联通(广东)产业互联网有限公司 Heterogeneous computing power arrangement scheduling method, system, equipment and storage medium
CN116070240A (en) * 2023-02-03 2023-05-05 广州万协通信息技术有限公司 Data encryption processing method and device of multi-chip calling mechanism

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3811561B8 (en) * 2018-07-19 2022-02-16 British Telecommunications public limited company Dynamic data encryption
US20210409335A1 (en) * 2020-09-11 2021-12-30 Intel Corporation Multi-access management service packet classification and prioritization techniques

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190033757A (en) * 2017-09-22 2019-04-01 (주)노르마 Analysis method and system of Security Vulnerability of wireless network
WO2021098407A1 (en) * 2019-11-21 2021-05-27 中移物联网有限公司 Mec-based service node allocation method and apparatus, and related server
WO2022079431A1 (en) * 2020-10-12 2022-04-21 Cambridge Cryptographic Ltd Block reward management in blockchain
CN114861167A (en) * 2022-04-06 2022-08-05 国网浙江省电力有限公司电力科学研究院 Block chain-based distributed energy data management cooperative processing method and system
CN115021929A (en) * 2022-05-24 2022-09-06 中国电信股份有限公司 Trust management method and device for computing power network, storage medium and electronic equipment
CN115543624A (en) * 2022-10-13 2022-12-30 联通(广东)产业互联网有限公司 Heterogeneous computing power arrangement scheduling method, system, equipment and storage medium
CN116070240A (en) * 2023-02-03 2023-05-05 广州万协通信息技术有限公司 Data encryption processing method and device of multi-chip calling mechanism

Also Published As

Publication number Publication date
CN116865952A (en) 2023-10-10

Similar Documents

Publication Publication Date Title
CN116865952B (en) Encryption management method and system for data
CN106203679A (en) A kind of customer loss Forecasting Methodology and system
CN110837602A (en) User recommendation method based on representation learning and multi-mode convolutional neural network
CN113971527A (en) Data risk assessment method and device based on machine learning
CN111062464A (en) Power communication network reliability prediction and guarantee method and system based on deep learning
CN112382407A (en) Risk management and control method and device, electronic equipment and storage medium
CN116797267B (en) Distributed market data acquisition management system for equity investment
CN115577152B (en) Online book borrowing management system based on data analysis
CN113051407B (en) Network intelligent operation and maintenance knowledge graph collaborative construction and sharing method and device
CN110807508B (en) Bus peak load prediction method considering complex weather influence
CN114881547A (en) Team performance evaluation method and device for Internet projects
CN115269342A (en) Monitoring cloud platform based on edge computing and monitoring method thereof
CN115906160A (en) Information processing method and system based on artificial intelligence analysis
CN111444075A (en) Method for automatically discovering key influence indexes
CN112860973A (en) Organization health assessment method based on social network analysis
CN116644943B (en) Engineering supervision data management system based on Internet of things
CN107291746A (en) A kind of method and apparatus for storing and reading data
CN117217505A (en) Resource management system based on book field
CN116471333A (en) Mixed computing power network resource scheduling optimization method and follow-up control device
CN111861397A (en) Intelligent scheduling platform for client visit
CN110910263A (en) Grain condition monitoring method based on GA-BP neural network
CN113835973B (en) Model training method and related device
CN114119202B (en) Automatic configuration method and system for credit management platform
CN103096380B (en) Wireless access point load balancing load balancing
CN107767278B (en) Method and device for constructing community hierarchy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant