CN107592295A - A kind of encryption method of big data - Google Patents

A kind of encryption method of big data Download PDF

Info

Publication number
CN107592295A
CN107592295A CN201710646447.XA CN201710646447A CN107592295A CN 107592295 A CN107592295 A CN 107592295A CN 201710646447 A CN201710646447 A CN 201710646447A CN 107592295 A CN107592295 A CN 107592295A
Authority
CN
China
Prior art keywords
key
big data
encryption
request
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710646447.XA
Other languages
Chinese (zh)
Inventor
徐秋养
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Deep Research Information Technology Co Ltd
Original Assignee
Foshan Deep Research Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Deep Research Information Technology Co Ltd filed Critical Foshan Deep Research Information Technology Co Ltd
Priority to CN201710646447.XA priority Critical patent/CN107592295A/en
Publication of CN107592295A publication Critical patent/CN107592295A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiments of the invention provide a kind of encryption method of big data, methods described includes:After receiving target big data, the target big data is handled according to preset rules, and determine whether the target big data needs to be encrypted;If it is, forming a key request to the target big data, and the key request is put into object queue;Key request is taken out from the object queue successively, and the request of creation data encryption key is proposed to big data key production module;The encryption key message that the key production module is sent is received, and the big data is encrypted according to the encryption key message.The ability of big data platform attack protection, can effectively improve big data security.

Description

A kind of encryption method of big data
Technical field
The present invention relates to data processing field, more particularly to a kind of encryption method of big data.
Background technology
Big data plays more and more important effect in today's society and economic development, but big data is at concentration While reason and storage mass data, its safety problem will also face increasing challenge.
In terms of big data safeguard protection, conventional method is all by fire wall, VPN, intrusion detection and anti-virus etc. It is complete that these traditional systems and component carry out safeguards system, is from procotol and pattern feature the problem of these method maximums Go safeguards system safe, the sensitive information and sensitive data that can not be directed to big data platform interior implement protection, that is to say, that mesh The preceding specific security system gone back neither one so far and be directed to big data system.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of encryption method of big data, with the energy of big data platform attack protection Power, big data security can be effectively improved.
In order to achieve the above object, the embodiment of the invention discloses a kind of encryption method of big data, methods described to include:
After receiving target big data, the target big data is handled according to preset rules, and determine the target Whether big data, which needs, is encrypted;
If it is, forming a key request to the target big data, and the key request is put into target team In row;
Key request is taken out from the object queue successively, and proposes that creation data adds to big data key production module The request of key;
The encryption key message that the key production module is sent is received, and according to the encryption key message to described big Data are encrypted.
Optionally, after the reception target big data, the target big data is handled according to preset rules, and really Whether the fixed target big data needs to be encrypted, including:
After receiving target big data, rule is handled according to the piecemeal of data piecemeal processing is carried out to the target big data, And whether each piece need to be encrypted is determined respectively to the target big data after piecemeal processing;
It is described if it is, form a key request to the target big data, and the key request is put into mesh Mark in queue, including:
If it is, a key request is formed to each piece in the target big data data block for needing to be encrypted, And the key request is put into object queue.
Optionally, it is described to take out key request from the object queue successively, and carried to big data key production module Go out to produce the request of data encryption key, including:
According to the principle of FIFO, key request is taken out from the object queue successively, and give birth to big data key The request of creation data encryption key is proposed into module.
Optionally, the encryption information includes the information of initial key, when single piece of key leaks, using new initial Key produces key and removes the block of encryption leakage key, and updates initial key in encryption information table, the information of block encryption key; When one-way function calculates, increase the information of an information change key number, it is M (F that block symmetric key, which produces function, (K, A, f (N))), the information N of key change is included in encryption information table on the basis of above.
The encryption method of big data provided in an embodiment of the present invention, the present invention is in use, the code of big data platform is complete Whole property can be verified by the present invention, even if big data platform is attacked by hacker and wooden horse, the present invention also can automatic detection And alert.Even if big data platform of the invention is encroached on by attack or virus or wooden horse, system provided by the present invention is utilized Integrity checking techniques (hash algorithm technology) can be recovered accurately and original identical system.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the encryption method of big data provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Fig. 1 is the schematic flow sheet of the encryption method of big data provided in an embodiment of the present invention, and the method comprising the steps of:
S101, after receiving target big data, the target big data is handled according to preset rules, and described in determination Whether target big data, which needs, is encrypted, if it is, performing S102.
It is understood that big data acquisition system needs to be acquired and pre-process with data by preparatory condition, obtain To target big data, obtain checking whether it is encrypted data after big data, if not encrypted, perform encryption Step S102, is otherwise disregarded.
S102, a key request is formed to the target big data, and the key request is put into object queue It is interior.
A key request is formed for the data for needing to be encrypted respectively, the key request is included to number to be encrypted According to encryption type request, such as MD5.All key requests can be added in object queue.
S103, key request is taken out from the object queue successively, and propose to produce to big data key production module The request of data encryption key.
Specifically, key request can be taken out from the object queue successively according to the principle of FIFO, and to big Data key generation module proposes the request of creation data encryption key, so that data to be encrypted to be encrypted.
S104, the encryption key message that the key production module is sent is received, and according to the encryption key message pair The big data is encrypted.
Key generation module is specifically used for generation key, so as to which be-encrypted data be encrypted by the key of generation. Specific ciphering process is prior art, and the embodiment of the present invention is not repeated it herein.
A kind of method that system for realizing big data safety realizes big data safety, will be adopted to big data safeguard protection originally With the pattern of software and network topology architecture, upgrade to and directly use hardware protection, and by protection level by former software protection level Hardware protection rank is indescribably upgraded to, is greatly improved the ability of big data platform attack protection, big data safety can be effectively improved Property.
After receiving target big data, rule is handled according to the piecemeal of data piecemeal processing is carried out to the target big data, And whether each piece need to be encrypted is determined respectively to the target big data after piecemeal processing;
It is described if it is, form a key request to the target big data, and the key request is put into mesh Mark in queue, including:
If it is, a key request is formed to each piece in the target big data data block for needing to be encrypted, And the key request is put into object queue.
It is understood that carrying out piecemeal (segmentation) to data as needed, regard one piece with a file.
The sensitivity of file is drawn according to the keyword computation rule of setting, the judgement needs for reaching certain threshold value add It is close, if user's selection does not reach the file of threshold value, it can also encrypt, can be added using two kinds of algorithms of AES128 or AES256 It is close.If file is not belonging to both situations above, do not encrypt.
Block key is produced, the various parameters of cryptographic block is selected, file is encrypted, and whether file is encrypted, such as Fruit is encrypted, and to key public key encryption, is stored in encryption information table, and the information for uniquely determining this segmentation is included in table (fullpath of file, include filename), the key of public key encryption, the algorithm and block length of encryption, initial vector, encryption Pattern, correlative coding information etc..
Decryption is an opposite process, for each block number evidence, first determines whether it encrypts, if it is, Then need to decrypt, obtain the information such as its key.Data block is decrypted.Without block length in encryption information table, initially to Amount, the information of encryption mode.
Exemplary, a hash function SHA256 can be chosen, is produced with file path A, master key (initial key) K It is raw.Calculate HASH (K, A) value, before the binary system intercept the key length that encrypted data chunk uses symmetric encipherment algorithm Corresponding digit 128 or 256bit.Algorithm can also replace with stream cipher.
In theory, we, which only need to store well initial decryption, can encrypt the encryption key of each file.Public affairs can be used Sectional encryption key after key encryption, and by segment information, segmentation whether encrypt, data block corresponding to the encryption key that is segmented Information, cryptography information, the type of coding etc. of clear data, be stored in encryption information table.
It is possible to further be initial key that each user has oneself, so he can encrypt and decrypt himself and be responsible for File, encryption information is also stored in encryption information table, and the initial key of public key encryption should be included in encryption information table, with And the information of foregoing encryption information table.
Further, if single piece of key leakage, key is produced using new initial key and removes encryption leakage key Block, and update encryption information table.Further, if single piece of key leakage, in one-way function calculation block key When, increase the information of an information change key number, do not add for the first time, use HASH (K, A, 1) for the second time, third time Using HASH (K, A, 2), by that analogy, the information of key change is included in encryption information table on the basis of above.Encryption is calculated Method not only includes symmetry algorithm, in addition to homomorphic cryptography, asymmetrical encryption method.Because some data carry out commission meter The needs of calculation, and need for confidentiality, so the numerical value that some needs are used for this carries out homomorphic cryptography using public key.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply and deposited between these entities or operation In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Other identical element also be present in process, method, article or equipment including the key element.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent substitution and improvements made within the spirit and principles in the present invention etc., are all contained in protection scope of the present invention It is interior.

Claims (4)

1. a kind of encryption method of big data, it is characterised in that methods described includes:
After receiving target big data, the target big data is handled according to preset rules, and determine the big number of the target According to whether needing to be encrypted;
If it is, forming a key request to the target big data, and the key request is put into object queue;
Key request is taken out from the object queue successively, and proposes that creation data encryption is close to big data key production module The request of key;
The encryption key message that the key production module is sent is received, and according to the encryption key message to the big data It is encrypted.
2. the encryption method of big data according to claim 1, it is characterised in that after the reception target big data, root The target big data is handled according to preset rules, and determines whether the target big data needs to be encrypted, including:
After receiving target big data, rule is handled according to the piecemeal of data piecemeal processing is carried out to the target big data, and it is right The target big data after piecemeal processing determines whether each piece need to be encrypted respectively;
It is described if it is, form a key request to the target big data, and the key request is put into target team In row, including:
If it is, a key request is formed to each piece in the target big data data block for needing to be encrypted, and will The key request is put into object queue.
3. the encryption method of big data according to claim 1, it is characterised in that described successively from the object queue Key request is taken out, and the request of creation data encryption key is proposed to big data key production module, including:
According to the principle of FIFO, key request is taken out from the object queue successively, and mould is generated to big data key Block proposes the request of creation data encryption key.
4. the encryption method of big data according to claim 1, it is characterised in that the encryption information includes initial key Information, when single piece of key leaks, key is produced using new initial key and removes the block of encryption leakage key, and is updated Initial key in encryption information table, the information of block encryption key;When one-way function calculates, increase an information change The information of key number, it is M (F (K, A, f (N))) that block symmetric key, which produces function, in encryption information table on the basis of above Include the information N of key change.
CN201710646447.XA 2017-08-01 2017-08-01 A kind of encryption method of big data Withdrawn CN107592295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710646447.XA CN107592295A (en) 2017-08-01 2017-08-01 A kind of encryption method of big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710646447.XA CN107592295A (en) 2017-08-01 2017-08-01 A kind of encryption method of big data

Publications (1)

Publication Number Publication Date
CN107592295A true CN107592295A (en) 2018-01-16

Family

ID=61041911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710646447.XA Withdrawn CN107592295A (en) 2017-08-01 2017-08-01 A kind of encryption method of big data

Country Status (1)

Country Link
CN (1) CN107592295A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109522742A (en) * 2018-10-26 2019-03-26 贵州斯曼特信息技术开发有限责任公司 A kind of batch processing method of computer big data
CN111625843A (en) * 2019-07-23 2020-09-04 方盈金泰科技(北京)有限公司 Data transparent encryption and decryption system suitable for big data platform
CN112181292A (en) * 2020-09-10 2021-01-05 绍兴无相智能科技有限公司 Safe storage method and device based on big data and computer readable storage medium
CN112214771A (en) * 2020-09-10 2021-01-12 绍兴无相智能科技有限公司 Information analysis method and device based on big data and computer readable storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109522742A (en) * 2018-10-26 2019-03-26 贵州斯曼特信息技术开发有限责任公司 A kind of batch processing method of computer big data
CN111625843A (en) * 2019-07-23 2020-09-04 方盈金泰科技(北京)有限公司 Data transparent encryption and decryption system suitable for big data platform
CN112181292A (en) * 2020-09-10 2021-01-05 绍兴无相智能科技有限公司 Safe storage method and device based on big data and computer readable storage medium
CN112214771A (en) * 2020-09-10 2021-01-12 绍兴无相智能科技有限公司 Information analysis method and device based on big data and computer readable storage medium

Similar Documents

Publication Publication Date Title
EP3356988B1 (en) Method and system for verifiable searchable symmetric encryption
CN112543187B (en) Industrial Internet of things safety data sharing method based on edge block chain
CN107592295A (en) A kind of encryption method of big data
CN103401678A (en) Method for ensuring data transmission safety of Internet of things
Miriam et al. Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology.
CN103716157A (en) Grouped multiple-key encryption method and grouped multiple-key encryption device
CN103414690A (en) Publicly-verifiable cloud data possession checking method
CN110149209A (en) Internet of things equipment and its method and apparatus of improve data transfer safety
CN110413652B (en) Big data privacy retrieval method based on edge calculation
CN105791207A (en) network security method and network security service system
US10129025B2 (en) Binding data to a network in the presence of an entity with revocation capabilities
US12058112B2 (en) Binding data to a network in the presence of an entity
CN106657002A (en) Novel crash-proof base correlation time multi-password identity authentication method
Kim et al. A secret sharing-based distributed cloud system for privacy protection
CN112398861B (en) Encryption system and method for sensitive data in web configuration system
Chen et al. Privacy-preserving anomaly detection of encrypted smart contract for blockchain-based data trading
CN116822661B (en) Privacy protection verifiable federal learning method based on double-server architecture
CN113326518A (en) Data processing method and device
CN102223229A (en) Method for safe transmission of data in public network
CN115809459B (en) Data protection and decryption method, system, equipment and medium of software cryptographic module
CN116405320A (en) Data transmission method and device
CN115085898A (en) Homomorphic encryption-based unmanned aerial vehicle data anomaly detection method
CN115865461A (en) Method and system for distributing data in high-performance computing cluster
CN110519278B (en) Data security authentication method and system based on BIM
Jain et al. Enhanced data privacy in cyber-physical system using improved Chacha20 algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180116