CN116865952B - Encryption management method and system for data - Google Patents
Encryption management method and system for data Download PDFInfo
- Publication number
- CN116865952B CN116865952B CN202310584715.5A CN202310584715A CN116865952B CN 116865952 B CN116865952 B CN 116865952B CN 202310584715 A CN202310584715 A CN 202310584715A CN 116865952 B CN116865952 B CN 116865952B
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- sample
- thumbnail
- calculation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 47
- 238000004458 analytical method Methods 0.000 claims abstract description 73
- 238000000034 method Methods 0.000 claims abstract description 31
- 230000005540 biological transmission Effects 0.000 claims abstract description 28
- 238000011156 evaluation Methods 0.000 claims abstract description 18
- 238000004364 calculation method Methods 0.000 claims description 86
- 238000010276 construction Methods 0.000 claims description 13
- 238000012549 training Methods 0.000 claims description 10
- 238000012360 testing method Methods 0.000 claims description 8
- 238000013507 mapping Methods 0.000 claims description 7
- 238000012163 sequencing technique Methods 0.000 claims description 4
- 238000013528 artificial neural network Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000008602 contraction Effects 0.000 claims description 2
- 230000001934 delay Effects 0.000 claims description 2
- 238000012545 processing Methods 0.000 abstract description 15
- 230000002035 prolonged effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000003066 decision tree Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a data encryption management method and a system, which relate to the technical field of data processing, wherein the method comprises the following steps: the method comprises the steps of inputting data scale of data to be encrypted and encryption grade information selected by a target user into an encryption scheme analysis model in an intermediate layer to obtain a target encryption scheme and encryption computing power information, inputting the data scale into a thumbnail analysis model in the intermediate layer to obtain thumbnail computing power information, constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and transmission delay between a plurality of nodes and the target user, determining a target node, encrypting the data to be encrypted according to the target encryption scheme, uploading the encrypted data to a far end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a data encryption management method and system.
Background
Under the background of big data, the information communication breaks the limitation of the traditional information communication mode, greatly improves the quality and speed of information transmission, is safer, more reliable, more convenient and faster, and improves the life quality and the working efficiency of people. As the name implies, the data encryption technology processes plaintext according to specific rules and algorithms in the data transmission process, transmits the plaintext in the form of ciphertext, breaks the ciphertext into plaintext according to the specific rules and algorithms after receiving information, further reduces the risk of information leakage, prolongs the data encryption storage process in the prior art, has the technical problems of low processing efficiency and unsafe data, reduces transmission time, ensures data safety and improves processing efficiency.
Disclosure of Invention
The application provides a data encryption management method and system, which are used for solving the technical problems of low processing efficiency and unsafe data in the prior art that the transmission time of a data encryption storage process is prolonged.
In view of the above problems, the present application provides a method and a system for encrypting and managing data.
In a first aspect, the present application provides a method for encryption management of data, the method including: receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes; acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user; inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information; inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information; constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, computing encryption management scores of the plurality of nodes, and determining a target node; and encrypting the data to be encrypted according to the target encryption scheme by the target node to obtain encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
In a second aspect, the present application provides an encryption management system for data, the system comprising: the data receiving module is used for receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes; the encryption grade module is used for acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user; the first input module is used for inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation force information; the second input module is used for inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information; the first calculation module is used for constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, calculating encryption management scores of the plurality of nodes and determining a target node; the storage module is used for encrypting the data to be encrypted according to the target encryption scheme through the target node, obtaining encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
One or more technical solutions provided in the present application have at least the following technical effects or advantages:
the data encryption management method and system provided by the application relate to the technical field of data processing, solve the technical problems of low processing efficiency and unsafe data existing in the prior art that the data encryption storage process is prolonged in transmission, reduce the transmission time, ensure the data safety and improve the processing efficiency.
Drawings
Fig. 1 is a schematic flow chart of a data encryption management method;
fig. 2 is a schematic flow chart of obtaining encryption calculation force information in the encryption management method of data;
FIG. 3 is a schematic diagram of a process for obtaining abbreviated computational power information in a data encryption management method according to the present application;
fig. 4 is a schematic structural diagram of an encryption management system for data according to the present application. Reference numerals illustrate: the system comprises a data receiving module 1, an encryption grade module 2, a first input module 3, a second input module 4, a first calculation module 5 and a storage module 6.
Detailed Description
The application provides a data encryption management method and system, which are used for solving the technical problems of low processing efficiency and unsafe data in the prior art that the data encryption storage process is prolonged in transmission.
Example 1
As shown in fig. 1, an embodiment of the present application provides a method for encrypting and managing data, where the method includes:
step S100: receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
specifically, the encryption management method for data provided in the embodiments of the present application is applied to an encryption management system for data, so as to ensure the processing efficiency of encryption management in the process of data transmission encryption in the later period, and therefore, the data encryption platform needs to be constructed based on fog calculation, the data encryption platform includes a far end and an intermediate layer, the far end refers to a remote server, the intermediate layer is used for receiving data to be encrypted uploaded by a target user, the user and the far end are connected, and a plurality of nodes are included in the intermediate layer, the constructed intermediate layer can be based on fog calculation, that is, the processing and the application of the data to be encrypted in the fog calculation are concentrated in the equipment at the network edge, rather than being stored in the complete cloud, the data to be encrypted uploaded by the target user refers to the data which is not encrypted and is transmitted by the receiving end, and the data encryption management is realized in the later period as an important reference basis.
Step S200: acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
specifically, the data size of the data to be encrypted uploaded by the target user is measured based on the number of rows or columns of the data, and the greater the data size is, the greater the difficulty in processing and analyzing the data is, the greater the calculation power is, further, the encryption level selected by the target user according to the self requirement is obtained, the encryption level includes ten levels of 1-10, the user can select the encryption level according to the importance of the data, the confidentiality and the security of the data are guaranteed to different degrees, and the encryption level information selected by the target user is obtained, so that the management of the data encryption is further guaranteed.
Step S300: inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information;
further, as shown in fig. 2, step S300 of the present application further includes:
step S310: acquiring a sample data scale set and a sample encryption grade information set according to a data encryption record in a preset historical time range of the data encryption platform;
step S320: acquiring a sample encryption scheme set according to the sample encryption grade information set, and acquiring a sample encryption computing power information set according to the sample data scale set and the sample encryption scheme set;
step S330: constructing mapping relations between a plurality of sample encryption grade information in the sample encryption grade information set and a plurality of sample encryption schemes in the sample encryption scheme set, and obtaining a scheme analysis unit in the encryption scheme analysis model;
step S340: adopting the sample data scale set, the sample encryption scheme set and the sample encryption computing power information set as construction data to construct a computing power analysis unit in the encryption scheme analysis model;
step S350: and inputting the encryption grade information into the scheme analysis unit to obtain the target encryption scheme, and inputting the data scale and the target encryption scheme into the calculation power analysis unit to obtain the encryption calculation power information.
Further, step S341 of the present application includes:
step S341: taking the data scale as a first decision feature, constructing a plurality of layers of first decision dividing nodes by adopting a plurality of sample data scales in the sample data scale set, and carrying out classification dividing decisions by each layer of first decision dividing nodes according to the input data scale;
step S342: taking an encryption scheme as a second decision feature, adopting a plurality of sample encryption schemes in the sample encryption scheme set to construct a plurality of layers of second decision dividing nodes, and judging and deciding according to one sample encryption scheme in each layer of second decision dividing nodes;
step S343: connecting the multi-layer first decision dividing node and the multi-layer second decision dividing node, and obtaining a plurality of decision results obtained by jointly deciding the multi-layer first decision dividing node and the multi-layer second decision dividing node;
step S344: and encrypting the calculation power information by adopting a plurality of samples in the sample encryption calculation power information set, and correspondingly marking the decision results to obtain the calculation power analysis unit.
Specifically, because the computing power required by encrypting the data to be encrypted needs to be obtained in the process of encrypting the data to be encrypted so as to match nodes with corresponding computing power, further, the data encryption records contained in the historical time range are obtained according to the data encryption platform, the obtained data encryption records in the preset historical time range are obtained by related technicians according to the data encryption sample data scale and the data of the sample encryption grade information in the historical time, the preset historical time range can be the time of the past year, thus the sample data scale set and the sample encryption grade information set are obtained, the sample data scale set refers to the set of different data scales of a plurality of data contained in the data encryption records in the historical time range, the sample encryption grade information set refers to the set of the sample data scale in the sample data scale set according to the relation between the data scale and the data grade, the encryption grade is correspondingly set of all the sample data scale in the sample data scale set, further, on the basis of the sample encryption grade information set, an encryption scheme with different data encryption grades is formulated according to the sample encryption grade, if the data encryption grade information set is the same in the sample encryption grade, the sample encryption information set is not more complex, the sample encryption grade information is further encrypted according to the sample encryption grade information set is not required to the sample encryption grade information, and the sample encryption grade information is further encrypted according to the sample encryption grade information set, the method includes the steps of obtaining a sample encryption computing power information set, further constructing mapping relations of a plurality of sample encryption level information contained in the sample encryption level information set and a plurality of sample encryption schemes in the sample encryption scheme set, and when the plurality of sample encryption scheme set and the plurality of sample encryption level information have mapping relations, illustratively, the plurality of sample encryption scheme set takes one value, the plurality of sample encryption level information has one value and only one value corresponds to the plurality of sample encryption level information, the plurality of sample encryption scheme set can have a plurality of values corresponding to the plurality of sample encryption level information, and acquiring scheme analysis units contained in an encryption scheme analysis model according to the constructed mapping relations, further adopting the sample data size set and the sample encryption scheme set by the sample encryption computing information set, and constructing the computing power analysis units in the encryption scheme analysis model by taking the sample encryption scheme set and the sample encryption computing information set as construction data, wherein the construction constitution can be as follows: based on a decision tree algorithm, constructing a plurality of layers of first decision dividing nodes according to a plurality of sample data scales contained in a sample data scale set, taking the data scales as first decision features, wherein the first decision features are dividing standards of the plurality of layers of first decision dividing nodes, meanwhile, each layer of first decision dividing nodes divide the data according to the input data scales, inputting two classification results obtained by dividing into lower layers of first decision dividing nodes, dividing the data scales into different data scale intervals through the plurality of layers of classification, further constructing a plurality of layers of second decision dividing nodes according to a plurality of sample encryption scheme sets in the sample encryption scheme set, taking the encryption scheme as a second decision feature, judging whether the data belong to a sample encryption scheme in the layer of second decision dividing nodes according to one of sample encryption schemes contained in the encryption scheme, finally, connecting the first decision dividing nodes with the second decision nodes to obtain a plurality of layers of encryption schemes according to the common characteristics of the first decision dividing nodes and the plurality of layers of division nodes, encrypting the plurality of nodes according to the common characteristics of the plurality of layers of division nodes, and then obtaining the multi-layer decision nodes by encrypting the common characteristics of the first decision dividing nodes, the method comprises the steps of obtaining a plurality of decision results, wherein the plurality of decision results comprise encryption calculation force information for encrypting transmission data to be encrypted with different data scales by adopting different encryption schemes, further integrating calculation force required by encrypting the data with different data scales by adopting different encryption schemes to be used as a sample encryption calculation force information set, and the sample encryption calculation force information set comprises a plurality of sample encryption calculation force information.
Step S400: inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information;
further, as shown in fig. 3, step S400 of the present application further includes:
step S410: acquiring a sample data scale set and a sample contraction calculation force information set according to a data encryption record in a preset historical time range of the data encryption platform;
step S420: constructing the thumbnail analysis model by adopting the sample data scale set and the sample thumbnail calculation power information set;
step S430: inputting the data scale into the thumbnail analysis model to obtain the thumbnail calculation power information.
Further, step S420 of the present application includes:
step S421: carrying out data identification on the data in the sample data scale set and the sample abbreviation calculation force information set to obtain a constructed data set;
step S422: constructing a network structure of the thumbnail analysis model based on a neural network;
step S423: and performing supervision training, verification and test on the thumbnail analysis model by adopting the constructed data set, and obtaining the thumbnail analysis model under the condition that the preset condition is met.
Specifically, the data size of the data to be encrypted is input into a thumbnail analysis model contained in an intermediate layer of the encryption platform, the thumbnail calculation force information of the data to be encrypted is obtained, the thumbnail calculation force information refers to calculation force required when the thumbnail calculation is carried out on the data to be encrypted, the thumbnail calculation is used for generating the thumbnail information of the data to be encrypted for quick browsing and calling by a user, if the data to be encrypted is a picture, the corresponding thumbnail information is a thumbnail and is stored in a node so as to facilitate quick browsing, further, the sample data size set and the sample thumbnail calculation force information set are extracted according to the obtained data encryption record within the preset history time range of the data encryption platform, and the thumbnail analysis model is constructed through the sample data size set and the sample thumbnail calculation force information set, and the construction process can be as follows: the method comprises the steps of firstly, respectively identifying data characteristics of data in a sample data scale set and data in a sample abbreviation calculation force information set, and recording all the identified data as a constructed data set.
The construction process of the thumbnail analysis model comprises the following steps: inputting each group of training data in the training data set into the thumbnail analysis model, outputting and supervising adjustment of the thumbnail analysis model through the supervising data corresponding to the group of training data, finishing the current group of training when the output result of the thumbnail analysis model is consistent with the supervising data, finishing all training data in the training data set, and finishing the training of the thumbnail analysis model.
In order to ensure the accuracy of the thumbnail analysis model, the test processing of the thumbnail analysis model may be performed by the test data set, for example, the test accuracy may be set to 80%, and when the test accuracy of the test data set satisfies 80%, the thumbnail analysis model construction is completed.
Finally, inputting the data scale of the data to be encrypted into the constructed thumbnail analysis model, and outputting the thumbnail calculation power information of the data to be encrypted, thereby realizing the promotion of data encryption management.
Step S500: constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, computing encryption management scores of the plurality of nodes, and determining a target node;
further, step S500 of the present application further includes:
step S510: and constructing the node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, wherein the node evaluation function comprises the following formula:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
Further, step S520 of the present application includes:
step S521: calculating a plurality of encryption management scores of the plurality of nodes by adopting the node evaluation function;
step S522: and sequencing the plurality of encryption management scores according to the sequence from big to small, and selecting the node which is the forefront and is idle in the sequencing as the target node.
Specifically, in order to ensure the accuracy of encryption management of the data to be encrypted, the following node evaluation function needs to be constructed based on the encryption power information output by the encryption scheme analysis model, the thumbnail calculation power information output by the thumbnail analysis model, and the data transmission time delay of a plurality of nodes and target users in the middle layer of the encryption platform when the data to be encrypted is transmitted in an encryption manner:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
The transmission delay between the node and the target user is shorter, the efficiency of data encryption management is improved, encryption management scores of a plurality of nodes are calculated through the constructed formula, wherein the default second weight is preferably larger than the first weight, the second weight can be set to 0.7, the first weight is 0.3, further, the target node is determined according to the calculated encryption management scores of the plurality of nodes, the node evaluation function constructed as above is adopted, the encryption management scores of each of the plurality of nodes are calculated, the encryption management scores are sequenced according to the sequence from large to small, the node which is the highest in the sequence, namely the node which is idle in the highest encryption management score is selected, and the selected node is used as the target node so as to be used as reference data when the data encryption is managed for the later period.
Step S600: and encrypting the data to be encrypted according to the target encryption scheme by the target node to obtain encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
Specifically, the determined target node is taken as a basis, the data to be encrypted uploaded by the target user is encrypted according to the target encryption scheme output by the encryption scheme analysis model, so that encrypted data is obtained, the encrypted data is uploaded to a remote end in an encryption platform for storage, and further, the thumbnail data of the encrypted data is obtained by the following formula:
wherein lambda is the thumbnail data alpha of the data to be encrypted, and beta is the non-key information data in the data to be encrypted. And finally, the thumbnail data of the data to be encrypted, which is calculated by the formula, is stored in the determined target node, so that the transmission time is reduced, the data security is ensured, and the processing efficiency is improved.
In summary, the data encryption management method provided by the embodiment of the application at least includes the following technical effects, so that the transmission time is reduced, the data security is ensured, and the processing efficiency is improved.
Example two
Based on the same inventive concept as the encryption management method of data in the foregoing embodiment, as shown in fig. 4, the present application provides an encryption management system of data, the system includes:
the data receiving module 1 is used for receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
the encryption grade module 2 is used for acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
the first input module 3 is used for inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information;
the second input module 4 is used for inputting the data scale into a thumbnail analysis model in the middle layer to obtain thumbnail calculation power information;
the first computing module 5 is configured to construct a node evaluation function according to the encryption computing power information, the abbreviated computing power information, and transmission delays between the plurality of nodes and the target user, calculate encryption management scores of the plurality of nodes, and determine a target node;
the storage module 6 is configured to encrypt the data to be encrypted according to the target encryption scheme by using the target node, obtain encrypted data, upload the encrypted data to the remote end for storage, calculate and obtain thumbnail data of the data to be encrypted, and store the thumbnail data to the target node.
Further, the system further comprises:
the data encryption recording module is used for acquiring a sample data scale set and a sample encryption grade information set according to the data encryption record in the data encryption platform preset history time range;
the set acquisition module is used for acquiring a sample encryption scheme set according to the sample encryption grade information set and acquiring a sample encryption computing power information set according to the sample data scale set and the sample encryption scheme set;
the mapping module is used for constructing mapping relations between a plurality of sample encryption grade information in the sample encryption grade information set and a plurality of sample encryption schemes in the sample encryption scheme set, and obtaining a scheme analysis unit in the encryption scheme analysis model;
the unit construction module is used for constructing a computational power analysis unit in the encryption scheme analysis model by adopting the sample data scale set, the sample encryption scheme set and the sample encryption computational power information set as construction data;
the third input module is used for inputting the encryption grade information into the scheme analysis unit to obtain the target encryption scheme, and inputting the data scale and the target encryption scheme into the calculation power analysis unit to obtain the encryption calculation power information.
Further, the system further comprises:
the fourth input module is used for taking the data scale as a first decision feature, constructing a plurality of layers of first decision dividing nodes by adopting a plurality of sample data scales in the sample data scale set, and carrying out a classification dividing decision by each layer of first decision dividing nodes according to the input data scale;
the node construction module is used for constructing a plurality of layers of second decision dividing nodes by taking an encryption scheme as a second decision feature and adopting a plurality of sample encryption schemes in the sample encryption scheme set, and judging decisions are carried out in each layer of second decision dividing nodes according to one sample encryption scheme;
the decision module is used for connecting the multi-layer first decision dividing node and the multi-layer second decision dividing node and acquiring a plurality of decision results obtained by jointly making decisions of the multi-layer first decision dividing node and the multi-layer second decision dividing node;
the marking module is used for correspondingly marking the decision results by adopting a plurality of sample encryption calculation force information in the sample encryption calculation force information set to obtain the calculation force analysis unit.
Further, the system further comprises:
the collection acquisition module is used for acquiring a sample data scale collection and a sample thumbnail calculation power information collection according to the data encryption record in the data encryption platform preset history time range
The model construction module is used for constructing the thumbnail analysis model by adopting the sample data scale set and the sample thumbnail calculation power information set;
and the fifth input module is used for inputting the data scale into the thumbnail analysis model to obtain the thumbnail calculation power information.
Further, the system further comprises:
the data identification module is used for carrying out data identification on the data in the sample data scale set and the sample abbreviation calculation force information set to obtain a constructed data set;
the structure construction module is used for constructing a network structure of the thumbnail analysis model based on a neural network;
the model acquisition module is used for performing supervision training, verification and test on the thumbnail analysis model by adopting the constructed data set, and acquiring the thumbnail analysis model under the condition that preset conditions are met.
Further, the system further comprises:
the formula module is used for constructing the node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, and the formula is as follows:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
Further, the system further comprises:
the second calculation module is used for calculating a plurality of encryption management scores of the plurality of nodes by adopting the node evaluation function;
and the ordering module is used for ordering the plurality of encryption management scores according to the order from big to small, and selecting the node which is the forefront and is idle in the ordering as the target node.
The foregoing detailed description of a method for encrypting and managing data will be apparent to those skilled in the art, and the device disclosed in this embodiment is relatively simple and relevant to the description of the method section because it corresponds to the method disclosed in the embodiment. The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (8)
1. A method of encryption management of data, the method comprising:
receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation power information;
inputting the data scale into an abbreviated analysis model in the middle layer to obtain abbreviated calculation force information, wherein the abbreviated calculation force information refers to calculation force required when the abbreviated calculation is performed on information to be encrypted, and the abbreviated calculation is used for generating abbreviated data of the data to be encrypted so as to be quickly browsed and invoked by a user;
constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, computing encryption management scores of the plurality of nodes, and determining a target node;
and encrypting the data to be encrypted according to the target encryption scheme by the target node to obtain encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
2. The method of claim 1, wherein inputting the data size and the encryption level information into an encryption scheme analysis model within the intermediate layer to obtain a target encryption scheme and encryption power information, comprises:
acquiring a sample data scale set and a sample encryption grade information set according to a data encryption record in a preset historical time range of the data encryption platform;
acquiring a sample encryption scheme set according to the sample encryption grade information set, and acquiring a sample encryption computing power information set according to the sample data scale set and the sample encryption scheme set;
constructing mapping relations between a plurality of sample encryption grade information in the sample encryption grade information set and a plurality of sample encryption schemes in the sample encryption scheme set, and obtaining a scheme analysis unit in the encryption scheme analysis model;
adopting the sample data scale set, the sample encryption scheme set and the sample encryption computing power information set as construction data to construct a computing power analysis unit in the encryption scheme analysis model;
and inputting the encryption grade information into the scheme analysis unit to obtain the target encryption scheme, and inputting the data scale and the target encryption scheme into the calculation power analysis unit to obtain the encryption calculation power information.
3. The method according to claim 2, wherein constructing a computational power analysis unit within the encryption scheme analysis model using the set of sample data sizes, the set of sample encryption schemes, and the set of sample encryption computational power information as construction data, comprises:
taking the data scale as a first decision feature, constructing a plurality of layers of first decision dividing nodes by adopting a plurality of sample data scales in the sample data scale set, and carrying out classification dividing decisions by each layer of first decision dividing nodes according to the input data scale;
taking an encryption scheme as a second decision feature, adopting a plurality of sample encryption schemes in the sample encryption scheme set to construct a plurality of layers of second decision dividing nodes, and judging and deciding according to one sample encryption scheme in each layer of second decision dividing nodes;
connecting the multi-layer first decision dividing node and the multi-layer second decision dividing node, and obtaining a plurality of decision results obtained by jointly deciding the multi-layer first decision dividing node and the multi-layer second decision dividing node;
and encrypting the calculation power information by adopting a plurality of samples in the sample encryption calculation power information set, and correspondingly marking the decision results to obtain the calculation power analysis unit.
4. The method of claim 1, wherein inputting the data scale into a thumbnail analysis model within the intermediate layer to obtain thumbnail computational power information comprises:
acquiring a sample data scale set and a sample contraction calculation force information set according to a data encryption record in a preset historical time range of the data encryption platform;
constructing the thumbnail analysis model by adopting the sample data scale set and the sample thumbnail calculation power information set;
inputting the data scale into the thumbnail analysis model to obtain the thumbnail calculation power information.
5. The method of claim 4, wherein constructing the thumbnail analysis model using the sample data size set and sample thumbnail calculation power information set comprises:
carrying out data identification on the data in the sample data scale set and the sample abbreviation calculation force information set to obtain a constructed data set;
constructing a network structure of the thumbnail analysis model based on a neural network;
and performing supervision training, verification and test on the thumbnail analysis model by adopting the constructed data set, and obtaining the thumbnail analysis model under the condition that the preset condition is met.
6. The method of claim 1, wherein constructing a node evaluation function from the encryption computation information, the thumbnail computation information, and transmission delays of the plurality of nodes and the target user comprises:
and constructing the node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, wherein the node evaluation function comprises the following formula:
wherein,encryption management score for the ith node,/-)>For the first weight, ++>Calculation force for the ith node, +.>For encrypting the calculation power information +.>Calculating the force information for the abbreviation, +.>For the second weight, n is the number of the plurality of nodes, +.>Is the transmission delay between the ith node and the target user.
7. The method of claim 6, wherein calculating the encryption supervisory scores for the plurality of nodes and determining the target node comprises:
calculating a plurality of encryption management scores of the plurality of nodes by adopting the node evaluation function;
and sequencing the plurality of encryption management scores according to the sequence from big to small, and selecting the node which is the forefront and is idle in the sequencing as the target node.
8. A system for encryption management of data, the system comprising:
the data receiving module is used for receiving data to be encrypted uploaded from a target user by an intermediate layer in a data encryption platform constructed based on fog calculation, wherein the data encryption platform comprises a far end and the intermediate layer, and the intermediate layer comprises a plurality of nodes;
the encryption grade module is used for acquiring the data scale of the data to be encrypted and the encryption grade information selected by the target user;
the first input module is used for inputting the data scale and the encryption grade information into an encryption scheme analysis model in the middle layer to obtain a target encryption scheme and encryption calculation force information;
the second input module is used for inputting the data scale into an abbreviation analysis model in the middle layer to obtain abbreviation calculation force information, the abbreviation calculation force information refers to calculation force required when the abbreviation calculation is carried out on the information to be encrypted, and the abbreviation calculation is used for generating abbreviation data of the data to be encrypted so as to be quickly browsed and invoked by a user;
the first calculation module is used for constructing a node evaluation function according to the encryption computing power information, the thumbnail computing power information and the transmission delay between the plurality of nodes and the target user, calculating encryption management scores of the plurality of nodes and determining a target node;
the storage module is used for encrypting the data to be encrypted according to the target encryption scheme through the target node, obtaining encrypted data, uploading the encrypted data to the remote end for storage, calculating and obtaining thumbnail data of the data to be encrypted, and storing the thumbnail data to the target node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310584715.5A CN116865952B (en) | 2023-05-23 | 2023-05-23 | Encryption management method and system for data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310584715.5A CN116865952B (en) | 2023-05-23 | 2023-05-23 | Encryption management method and system for data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116865952A CN116865952A (en) | 2023-10-10 |
CN116865952B true CN116865952B (en) | 2024-02-20 |
Family
ID=88220409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310584715.5A Active CN116865952B (en) | 2023-05-23 | 2023-05-23 | Encryption management method and system for data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116865952B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117221018B (en) * | 2023-11-09 | 2024-01-30 | 北京睿航至臻科技有限公司 | Data security transmission method and system based on data coding |
CN117314478B (en) * | 2023-11-30 | 2024-03-19 | 深圳市天兴诚科技有限公司 | RFID-based product full life cycle management and control system and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190033757A (en) * | 2017-09-22 | 2019-04-01 | (주)노르마 | Analysis method and system of Security Vulnerability of wireless network |
WO2021098407A1 (en) * | 2019-11-21 | 2021-05-27 | 中移物联网有限公司 | Mec-based service node allocation method and apparatus, and related server |
WO2022079431A1 (en) * | 2020-10-12 | 2022-04-21 | Cambridge Cryptographic Ltd | Block reward management in blockchain |
CN114861167A (en) * | 2022-04-06 | 2022-08-05 | 国网浙江省电力有限公司电力科学研究院 | Block chain-based distributed energy data management cooperative processing method and system |
CN115021929A (en) * | 2022-05-24 | 2022-09-06 | 中国电信股份有限公司 | Trust management method and device for computing power network, storage medium and electronic equipment |
CN115543624A (en) * | 2022-10-13 | 2022-12-30 | 联通(广东)产业互联网有限公司 | Heterogeneous computing power arrangement scheduling method, system, equipment and storage medium |
CN116070240A (en) * | 2023-02-03 | 2023-05-05 | 广州万协通信息技术有限公司 | Data encryption processing method and device of multi-chip calling mechanism |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3811561B8 (en) * | 2018-07-19 | 2022-02-16 | British Telecommunications public limited company | Dynamic data encryption |
US20210409335A1 (en) * | 2020-09-11 | 2021-12-30 | Intel Corporation | Multi-access management service packet classification and prioritization techniques |
-
2023
- 2023-05-23 CN CN202310584715.5A patent/CN116865952B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190033757A (en) * | 2017-09-22 | 2019-04-01 | (주)노르마 | Analysis method and system of Security Vulnerability of wireless network |
WO2021098407A1 (en) * | 2019-11-21 | 2021-05-27 | 中移物联网有限公司 | Mec-based service node allocation method and apparatus, and related server |
WO2022079431A1 (en) * | 2020-10-12 | 2022-04-21 | Cambridge Cryptographic Ltd | Block reward management in blockchain |
CN114861167A (en) * | 2022-04-06 | 2022-08-05 | 国网浙江省电力有限公司电力科学研究院 | Block chain-based distributed energy data management cooperative processing method and system |
CN115021929A (en) * | 2022-05-24 | 2022-09-06 | 中国电信股份有限公司 | Trust management method and device for computing power network, storage medium and electronic equipment |
CN115543624A (en) * | 2022-10-13 | 2022-12-30 | 联通(广东)产业互联网有限公司 | Heterogeneous computing power arrangement scheduling method, system, equipment and storage medium |
CN116070240A (en) * | 2023-02-03 | 2023-05-05 | 广州万协通信息技术有限公司 | Data encryption processing method and device of multi-chip calling mechanism |
Also Published As
Publication number | Publication date |
---|---|
CN116865952A (en) | 2023-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116865952B (en) | Encryption management method and system for data | |
CN106203679A (en) | A kind of customer loss Forecasting Methodology and system | |
CN110837602A (en) | User recommendation method based on representation learning and multi-mode convolutional neural network | |
CN113971527A (en) | Data risk assessment method and device based on machine learning | |
CN111062464A (en) | Power communication network reliability prediction and guarantee method and system based on deep learning | |
CN112382407A (en) | Risk management and control method and device, electronic equipment and storage medium | |
CN116797267B (en) | Distributed market data acquisition management system for equity investment | |
CN115577152B (en) | Online book borrowing management system based on data analysis | |
CN113051407B (en) | Network intelligent operation and maintenance knowledge graph collaborative construction and sharing method and device | |
CN110807508B (en) | Bus peak load prediction method considering complex weather influence | |
CN114881547A (en) | Team performance evaluation method and device for Internet projects | |
CN115269342A (en) | Monitoring cloud platform based on edge computing and monitoring method thereof | |
CN115906160A (en) | Information processing method and system based on artificial intelligence analysis | |
CN111444075A (en) | Method for automatically discovering key influence indexes | |
CN112860973A (en) | Organization health assessment method based on social network analysis | |
CN116644943B (en) | Engineering supervision data management system based on Internet of things | |
CN107291746A (en) | A kind of method and apparatus for storing and reading data | |
CN117217505A (en) | Resource management system based on book field | |
CN116471333A (en) | Mixed computing power network resource scheduling optimization method and follow-up control device | |
CN111861397A (en) | Intelligent scheduling platform for client visit | |
CN110910263A (en) | Grain condition monitoring method based on GA-BP neural network | |
CN113835973B (en) | Model training method and related device | |
CN114119202B (en) | Automatic configuration method and system for credit management platform | |
CN103096380B (en) | Wireless access point load balancing load balancing | |
CN107767278B (en) | Method and device for constructing community hierarchy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |