CN103825699B - To the Parallel Chaos encryption method storing file in cloud computing environment - Google Patents
To the Parallel Chaos encryption method storing file in cloud computing environment Download PDFInfo
- Publication number
- CN103825699B CN103825699B CN201410049833.7A CN201410049833A CN103825699B CN 103825699 B CN103825699 B CN 103825699B CN 201410049833 A CN201410049833 A CN 201410049833A CN 103825699 B CN103825699 B CN 103825699B
- Authority
- CN
- China
- Prior art keywords
- sequence
- encryption
- rho
- circleplus
- chaos
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000000739 chaotic Effects 0.000 claims abstract description 27
- 230000000875 corresponding Effects 0.000 claims description 10
- 230000001808 coupling Effects 0.000 claims description 5
- 238000010168 coupling process Methods 0.000 claims description 5
- 238000005859 coupling reaction Methods 0.000 claims description 5
- 230000000977 initiatory Effects 0.000 claims description 3
- 241000208340 Araliaceae Species 0.000 claims 1
- 235000003140 Panax quinquefolius Nutrition 0.000 claims 1
- 235000005035 ginseng Nutrition 0.000 claims 1
- 235000008434 ginseng Nutrition 0.000 claims 1
- 238000000034 method Methods 0.000 abstract description 7
- 238000005516 engineering process Methods 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Abstract
The encryption being data file to the Parallel Chaos encryption method of storage file in cloud computing environment provides a kind of lightweight encryption that can be parallel, belongs to information security field.Utilize cloud computing environment can parallel computation mechanism, such as MapReduce parallel computing, in conjunction with chaos encrypting method, by clear data is carried out block encryption, finally realize the encryption to whole file, and upload in the storage system of cloud computing environment.Method contains the calculating of encryption system initial value, encryption key sequence calculates and three steps of data encryption.In encryption system initializes, method uses three-dimensional Lorenz chaos system and Chen chaos system to generate the initial value for encryption and interference value;During calculating encryption key sequence, based on the initial value calculated and interference value, by Henon chaotic maps and the interative computation of 2 dimension Logistic chaotic maps, generate the key sequence for data encryption;In data encryption process, carry out computing by key sequence with plaintext, finally realize the encryption to clear data.
Description
Technical field
The present invention is directed to cloud computing environment needs the data file security problem of storage, it is proposed that one is applicable to cloud meter
Calculating the parallel mixed chaos encipherment scheme of environment, its thinking is: the owner of data file will be stored in the literary composition in cloud environment
Part is first encrypted, then uploads in the memory space rented, for user, it is achieved the confidentiality requirement to data.This
Invention relates to chaos calculating, parallel computing and cloud computing technology, belongs to information security field.
Background technology
Big data security arts is the hot issue received much concern in recent years.On the one hand, data owner will be a large amount of
Data be stored in cloud computing environment, for user access.But these mass data have a lot of sensitive data needs
Ensure its confidentiality, such as the privacy information such as positional information, personal identification etc., how to realize data file in this kind of memory module
Information encryption, it is achieved safely, effectively, simple data access control be cloud computing move towards actual application needs solution ask
Topic.On the other hand, owing to file data quantity is big, need to build a kind of fast encryption scheme for big data, and at cloud meter
Calculate in environment it is necessary to solve how can to utilize the cloud computing environment can the feature of parallel computation, it is achieved big data fast parallel
Encryption.The present invention be aiming at file data confidentiality and can concurrency, it is proposed that a kind of cloud computing environment that can be applicable to
Parallel mixed chaos encryption technology, the program can be effectively improved the enciphering rate of big data quantity.
Method contains the calculating of encryption system initial value, encryption key sequence calculates and three steps of data encryption.In encryption
In system initialization, method uses three-dimensional Lorenz chaos system and Chen chaos system to generate the initial value for encryption and interference
Value;During calculating encryption key sequence, based on the initial value calculated and interference value, by Henon chaotic maps and 2 dimensions
The interative computation of Logistic chaotic maps, generates the key sequence for data encryption;In data encryption process, by close
Key sequence carries out computing with plaintext, finally realizes the encryption to clear data.
Owing to using the computings such as block encryption, make the method for proposition can utilize the concurrent technique in cloud computing environment, real
Existing encryption method can parallel computation.
Summary of the invention
Goal of the invention: it is an object of the invention to provide the Parallel Chaos encryption side to storage file in a kind of cloud computing environment
Method, logical
Cross and combine the concurrent technique of cloud computing environment and Chaos Encryption Technology realizes a kind of parallel Chaotic Encryption, with
Improve the encryption/decryption speed of big data quantity.
Technical scheme: the present invention for achieving the above object, adopts the following technical scheme that
Step one: data file piecemeal
Note data file a length of L the most in plain text, will be divided into n block in plain text, and the size of each piece is li, i≤n, and require li
It is the integral multiple of 4 bytes, is designated as li=4N;Before so, n-1 block is isometric data block, and n-th piece is remainder data, it may be assumed that
li=4N (i < n)
(1)
li=L-(n-1) 4N (i=n)
Step 2: application nonlinear chaotic system generates initiation sequence and interference sequence
For each piecemeal, at the beginning of being produced by three-dimensional continuous chaotic system Lorenz chaotic maps and Chen chaotic maps
Value sequence and interference value sequence, method is as follows:
Lorenz chaotic maps equation is:
Chen chaos system equation is:
Wherein χ=(x1,x2,x3,x4,x5,x6) it is chaos sequence to be generated, p, r, t and a, b, c are that system is to be given
Parameter, utilizes 4 rank runge kutta methods to solve chaos system equation (2) and (3), and each iteration generates three random sequences respectively
Value, i.e. 6 chaos sequence value χ=(x1,x2,x3,x4,x5,x6);In order to be calculated this chaos sequence value, first obtain in plain text
Side-play amount θ of block first character jointi, the primary iteration number of times taking Lorenz system is N0, the primary iteration number of times of Chen system is
M0, the iterations of note Lorenz system is ρL, the iterations of Chen system is ρC, then have:
The corresponding chaos sequence of the most each piecemeal is
χρ=(x1(ρL),x2(ρL),x3(ρL),x4(ρC),x5(ρC),x6(ρC)) (5)
Sequence in order to make two systems produce has coupling, the random sequence pair Lorenz system obtained produced
With Chen system produce random sequence to carrying out XOR:
Meter chaos sequence χρFor first value sequence And interference sequence
Step 3: calculate the chaos sequence of encryption key with first value sequence
By first value sequenceIn (x1(ρL),x2(ρL)) fractional part as H é non chaotic maps iteration initial value,
(x3(ρL),x4(ρL)) fractional part produces the key sequence of encryption as the initial value of Logistic Map iteration, recurrence
ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)), wherein (ω1(ρ),ω2(ρ)) by the H é non system equation iteration of formula (7)
Produce:
(ω3(ρ),ω4(ρ)) produced by the Coupled Logistic chaotic map system equation iteration of formula (8):
Parameter value in mapping is: 2.75 < μ1< 3.4,2.7 < μ2< 3.45 and 0.15 < γ1< 0.21,0.13 <
γ2< 0.15.
Step 4: reconstruct encryption key sequence
After obtaining encryption key sequence, due to its value produced can not with in plain text carry out xor operation, so need by
Encryption key sequence is changed according to following formula:
Sequence in order to make two systems produce has coupling, carries out calculated as below:
Step 5: data encryption
After generating encryption key sequence, will carry out the encryption of clear text file, cryptographic operation is to take 4 successively in plaintext
The ASCII character M that individual byte length data block is corresponding, carries out XOR (XOR) operation with encryption key sequence and obtains intermediate object program, so
After carry out secondary xor operation with interference sequence again and obtain final ciphertext C:
Wherein k represents the sequence number of data block, C4k+1, C4k+2, C4k+3, C4k+4Be respectively in data block corresponding to the 1st, 2,3 and
The encrypted cipher text of 4 bytes.In the encryption method that method proposes, key space includes initial value χ (0)=(x of key sequence1
(0),x2(0),x3(0),x4(0),x5(0),x6(0)), the primary iteration times N of Lorenz and Chen system0And M0, and two
Parameter p of individual chaos system, r, t and a, b, c.
Beneficial effect: the parallel mixed chaos encipherment scheme that the present invention designs solves in cloud computing actual application
Two problems to be solved, one is data owner's confidentiality requirements to data file, by adding the packet of clear text file
Close, upload and be stored in cloud environment, it is ensured that the sensitive information of data owner is protected;Two is to calculate for big data high-speed
Requirement, uses block encryption etc. to see parallel computing technique, makes the ciphering process of data file may utilize in cloud computing environment
Parallel computing, it is achieved the high-speed parallel of large data files encryption is calculated, finally meets big data in cloud computing environment
Secure high-speed access.
Accompanying drawing explanation
Fig. 1 is the flow process of encipherment scheme.
Detailed description of the invention
Enforcement to technical scheme below is described in further detail:
Step one: data file piecemeal
If the file that length of the plaintext is 15 bytes, i.e. L=15.Being divided into 4 pieces, the greatest length of each piece is 4 bytes,
Then there is N=1.First 3 pieces is isometric 4 byte data blocks, and the 4th piece is 3 bytes of remainder data, it may be assumed that
li=4N=4 (i=1,2,3)
(12)
li=L-(n-1) 4N=15-(4-1) 4=3 (i=4)
Step 2: application nonlinear chaotic system generates initiation sequence and interference sequence
For each piecemeal, at the beginning of being produced by three-dimensional continuous chaotic system Lorenz chaotic maps and Chen chaotic maps
Value sequence and interference value sequence.Method is as follows:
Lorenz chaotic maps equation is:
Wherein p=10, r=28, t=8/3.Chen chaos system equation is:
Wherein χ=(x1,x2,x3,x4,x5,x6) it is chaos sequence to be generated, a=35, b=3, c=28.Utilize 4 rank dragons
Ge Kutafa solves chaos system equation (13) and (14), and each iteration generates three stochastic ordering train values, i.e. 6 chaos sequences respectively
Train value χ=(x1,x2,x3,x4,x5,x6).In order to be calculated this chaos sequence value, according to the division of data block, can calculate
Go out side-play amount θ of each Plaintext block first character joint1,θ2,θ3,θ4, divide according to data block and have θ1=0, θ2=4, θ3=8, θ4=
12.The primary iteration number of times taking Lorenz system is N0The primary iteration number of times of=2000, Chen system is M0=3000.Then two
The iterations of system is respectively as follows:
Taking initial value is x1(0)=1,x2(0)=2,x3(0)=3,x4(0)=4,x5(0)=5,x6(0)=6, then it is calculated each
The corresponding chaos sequence of piecemeal is:
χρ=(x1(ρL),x2(ρL),x3(ρL),x4(ρC),x5(ρC),x6(ρC))
χρ(1)=(x1(2000),x2(2000),x3(2000),x4(3000),x5(3000),x6(3000))
=(17.875805137193584,23.577775139444757,35.317757483789414,
6.717742409639023,7.835244360075882,10.201089575432276)
χρ(2)=(x1(2001),x2(2001),x3(2001),x4(3001),x5(3001),x6(3001))
=(18.17831668337063,22.534873609894326,37.37817682181235,
6.782891166690998,7.8362000710961714,10.394920549118666)
χρ(3)=(x1(2002),x2(2002),x3(2002),x4(3002),x5(3002),x6(3002))
=(18.395763937117206,21.26573786112585,39.3236292734919,
6.844042435179011,7.828307249610151,10.589251029269274)
χρ(4)=(x1(2003),x2(2003),x3(2003),x4(3003),x5(3003),x6(3003))
=(18.546007636272776,18.12250541456983,42.723826295121185,
6.953205127666364,7.785230347792439,10.977112780831336)
Step 3: calculate the chaos sequence of encryption key with first value sequence
By chaos sequence χρIt is divided into just value sequence And interference sequenceBy first value sequenceFractional part will reflect as H é non chaotic maps and 2D-Logistic
The initial value penetrated, carries out recurrence and produces ciphering sequence ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)), wherein (ω1(ρ),
ω2(ρ)) produced by the H é non system iterative equation of formula (16):
Parameter in formula (16) is a=1.4, b=0.3.Sequential value (ω3(ρ),ω4(ρ)) by the two dimension of formula (17)
Logistic chaotic mapping system iterative equation produces:
Wherein parameter is μ1=2.93, μ2=3.17, γ1=0.197, γ2=0.139.Produce the corresponding encryption with 4 piecemeals
Key sequence ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)):
ω (1)=(0.503926645776215,0.26274154115807524,0.7310172809052533,
0.5911631451546245)
ω(2)=(1.490358034498705,0.053495005011188465,0.635768102381588,
0.610385893368047)
ω(3)=(1.0464571296343332,0.1187291811351617,0.5208502734446377,
0.6470227289937563)
ω(4)=(1.407740930215608,0.15611128793982337,0.39125888333654657,
0.6995879558829032)
Step 4: reconstruct encryption key sequence
After obtaining encryption key sequence, due to its value produced can not with in plain text carry out xor operation, so need by
Encryption key sequence is changed according to formula (18):
Sequence in order to make two systems produce has coupling, calculates:
The chaos encryption sequence obtained through conversion is:
ωi(1)=(56,114,83,76)xi(1)=(54,39)
ωi(2)=(7,100,101,63)xi(2)=(31,100)
ωi(3)=(54,123,25,47)xi(3)=(126,70)
ωi(4)=(7,35,39,18)xi(4)=(13,124)
Step 5: data encryption
After generating encryption key sequence, the encryption of clear text file will be carried out.If the ASC of the plaintext of 15 bytes II yard
M is respectively (97,98,99,100,101,102,103,104,105,106,107,108,109,110,111), and cryptographic operation is
In plaintext, take 4 ASCII character M corresponding to byte length data block successively, carry out XOR (XOR) operation with encryption key sequence
Obtain intermediate object program, carry out secondary xor operation with interference sequence the most again and obtain final ciphertext C:
Wherein k represents the sequence number of data block, C4k+1, C4k+2, C4k+3, C4k+4Be respectively in data block corresponding to the 1st, 2,3 and
The encrypted cipher text of 4 bytes.Concrete encrypted result is:
It is M=(97,98,99,100,101,102,103,104,105,106,107,108,109,110,111) i.e. in plain text,
Ciphertext is C=(111,38,23,15,125,29,102,51,33,111,52,5,103,64,52).
Claims (1)
1. to the Parallel Chaos encryption method storing file in a cloud computing environment, it is characterised in that the method includes following step
Rapid:
Step one: data file piecemeal
Note data file a length of L the most in plain text, will be divided into n block in plain text, and the size of each piece is li, i≤n, and require liIt is 4
The integral multiple of byte, is designated as li=4N;Before so, n-1 block is isometric data block, and n-th piece is remainder data, it may be assumed that
Step 2: application nonlinear chaotic system generates initiation sequence and interference sequence
For each piecemeal, produce initial value sequence by three-dimensional continuous chaotic system Lorenz chaotic maps and Chen chaotic maps
Row and interference value sequence, method is as follows:
Lorenz chaotic maps equation is:
Chen chaos system equation is:
Wherein χ=(x1,x2,x3,x4,x5,x6) it is chaos sequence to be generated, p, r, t and a, b, c are the ginseng that system is to be given
Number, utilizes 4 rank runge kutta methods to solve chaos system equation (2) and (3), and each iteration generates three stochastic ordering train values respectively,
I.e. 6 chaos sequence value χ=(x1,x2,x3,x4,x5,x6);In order to be calculated this chaos sequence value, first obtain Plaintext block
Side-play amount θ of first character jointi, the primary iteration number of times taking Lorenz system is N0, the primary iteration number of times of Chen system is
M0, the iterations of note Lorenz system is ρL, the iterations of Chen system is ρC, then have:
χρ=(x1(ρL),x2(ρL),x3(ρL),x4(ρC),x5(ρC),x6(ρC)) (5)
Sequence in order to make two systems produce has coupling, the random sequence that the Lorenz system obtained is produced to
The random sequence that Chen system produces is to carrying out XOR:
Meter chaos sequence χρFor first value sequenceAnd interference sequence
Step 3: calculate the chaos sequence of encryption key with first value sequence
By first value sequenceIn (x1(ρL),x2(ρL)) fractional part is as the initial value of H é non chaotic maps iteration, (x3
(ρL),x4(ρC)) fractional part produces the key sequence of encryption as the initial value of Coupled Logistic chaotic map iteration, recurrence
Row ωρ=(ω1(ρ),ω2(ρ),ω3(ρ),ω4(ρ)), wherein (ω1(ρ),ω2(ρ)) by the H é non system equation of formula (7)
Iteration produces:
(ω3(ρ),ω4(ρ)) produced by the Coupled Logistic chaotic map system equation iteration of formula (8):
Parameter value in mapping is: 2.75 < μ1< 3.4,2.7 < μ2< 3.45 and 0.15 < γ1< 0.21,0.13 < γ2<
0.15;
Step 4: reconstruct encryption key sequence
After obtaining encryption key sequence, owing to its value produced can not carry out xor operation with plaintext, so needing to encrypt
Key sequence is changed according to following formula:
Sequence in order to make two systems produce has coupling, carries out calculated as below:
Step 5: data encryption
After generating encryption key sequence, will carry out the encryption of clear text file, cryptographic operation is to take 4 words successively in plaintext
The ASCII character M that joint length data block is corresponding, carries out XOR (XOR) operation with encryption key sequence and obtains intermediate object program, the most again
Carry out secondary xor operation with interference sequence and obtain final ciphertext C:
Wherein k represents the sequence number of data block, C4k+1, C4k+2, C4k+3, C4k+4It is respectively in data block corresponding to the 1st, 2,3 and 4 words
The encrypted cipher text of joint;In the encryption method that method proposes, key space includes initial value χ (0)=(x of key sequence1(0),
x2(0),x3(0),x4(0),x5(0),x6(0)), the primary iteration times N of Lorenz and Chen system0And M0, and two mix
Parameter p of ignorant system, r, t and a, b, c.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410049833.7A CN103825699B (en) | 2014-02-13 | To the Parallel Chaos encryption method storing file in cloud computing environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410049833.7A CN103825699B (en) | 2014-02-13 | To the Parallel Chaos encryption method storing file in cloud computing environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103825699A CN103825699A (en) | 2014-05-28 |
CN103825699B true CN103825699B (en) | 2016-11-30 |
Family
ID=
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719908A (en) * | 2009-11-26 | 2010-06-02 | 大连大学 | Image encryption method based on chaos theory and DNA splice model |
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaos synchronization encrypting/decrypting method and device using data compression encoding |
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719908A (en) * | 2009-11-26 | 2010-06-02 | 大连大学 | Image encryption method based on chaos theory and DNA splice model |
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaos synchronization encrypting/decrypting method and device using data compression encoding |
Non-Patent Citations (1)
Title |
---|
《一个基于混沌映射的图像加密并行算法》;周庆,胡月,廖晓峰;《计算机工程与应用》;20070430;第22卷(第43期);全文 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104202145A (en) | Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm | |
CN102546157B (en) | Random mixed encryption system for resisting energy analysis and implementation method thereof | |
CN107005415A (en) | For encrypting/decrypting the block encryption method of message and realize the encryption device of this method | |
CN104009835A (en) | File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system | |
CN104065474B (en) | Novel low-resource efficient lightweight Surge block cipher implementation method | |
CN103716157A (en) | Grouped multiple-key encryption method and grouped multiple-key encryption device | |
CN107491317A (en) | A kind of symmetrical encryption and decryption method and systems of AES for accelerating platform based on isomery | |
JP6575532B2 (en) | Encryption device, decryption device, encryption processing system, encryption method, decryption method, encryption program, and decryption program | |
CN103152362B (en) | Based on the large data files encrypted transmission method of cloud computing | |
CN107566113A (en) | The symmetrical encipher-decipher methods of 3DES, system and computer-readable recording medium | |
CN103916248A (en) | Fully homomorphic encryption public key space compression method | |
CN104396182A (en) | Method of encrypting data | |
CN105959107A (en) | Novel and highly secure lightweight SFN block cipher implementation method | |
CN103905182A (en) | Anti-attack method based on middle data storage position dynamic change and circuit implementation | |
CN104852798A (en) | Data encryption and decryption system and method thereof | |
CN101321058A (en) | Method and system for encoding and decoding digital message | |
CN103595524B (en) | A kind of encipher-decipher method of bit loss encryption-bit filling decryption based on stream cipher | |
CN105117653B (en) | A kind of near infrared spectrum data encryption method | |
CN103812658A (en) | Stream cipher based secure communication protocol | |
CN101969374B (en) | Method for realizing confusing layer in block cipher algorithm | |
CN101582170B (en) | Remote sensing image encryption method based on elliptic curve cryptosystem | |
CN103825699B (en) | To the Parallel Chaos encryption method storing file in cloud computing environment | |
CN107707352B (en) | A kind of embedded encryption method | |
CN102523085A (en) | Data encryption method, data encrypting device and smart card | |
CN106921486A (en) | The method and apparatus of data encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |