CN109684859A - A kind of safe encryption method of big data - Google Patents

A kind of safe encryption method of big data Download PDF

Info

Publication number
CN109684859A
CN109684859A CN201811604545.8A CN201811604545A CN109684859A CN 109684859 A CN109684859 A CN 109684859A CN 201811604545 A CN201811604545 A CN 201811604545A CN 109684859 A CN109684859 A CN 109684859A
Authority
CN
China
Prior art keywords
fragment
information
big data
coding
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811604545.8A
Other languages
Chinese (zh)
Inventor
葛星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Dachidu Network Media Co Ltd
Original Assignee
Anhui Dachidu Network Media Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Dachidu Network Media Co Ltd filed Critical Anhui Dachidu Network Media Co Ltd
Priority to CN201811604545.8A priority Critical patent/CN109684859A/en
Publication of CN109684859A publication Critical patent/CN109684859A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of safe encryption methods of big data, used method is: the segmentation of completion information and coding first, then pass through encryption, coding fragment is processed into hiding information file, finally they are sent to three-dimensional relationship and is stored on node different from each other, if system receives go back the instruction of prime information after, then from hiding information random screening goes out a certain number of files, restored after decryption by formula;The present invention realizes the storage of big data information using three-dimensional algorithm, using improved random phase encryption method, improve the storage security of big data important information, and it is easily achieved, new method is provided for big data information security storage, in actual use, improves image watermarking degree, and safety and stability performance gets a promotion, and facilitates and is handled to obtain encryption storage of the message reference structure to realize big data information according to thresholds.

Description

A kind of safe encryption method of big data
Technical field
The present invention relates to big data field of encryption, especially a kind of safe encryption method of big data.
Background technique
Data encryption is a time-honored technology, refer to will be changed into plain text by Encryption Algorithm and encryption key it is close Text, and decrypting is then to be restored ciphertext to by decipherment algorithm and decruption key in plain text, its core is cryptography, data encryption It is still a kind of most reliable method that computer system protects information, it encrypts information using cryptographic technique, Realize information hiding, to play the effect and the data encryption technology that is used cooperatively of firewall of the safety of protection information, be for Improve the safety and confidentiality of information system and data, the technical way for preventing secret data from being used by outside attack One of, it technically takes measures in terms of software and hardware two respectively, according to the difference of effect, data encryption technology can be divided into Data transmit the authentication technique and key management technology of encryption technology, data store encryption technology, data integrity;
Present data ciphering method, in actual use, image watermarking degree are not high enough, and safety and stability performance is not good enough, no Facilitate the encryption storage for handling to obtain message reference structure according to thresholds to realize big data information, need further to improve with Reinforce.
Summary of the invention
The main purpose of the present invention is to provide a kind of safe encryption methods of big data, can effectively solve background technique The problems in.
To achieve the above object, the technical scheme adopted by the invention is as follows:
A kind of safe encryption method of big data, follows the steps below to implement:
A kind of safe encryption method of big data, used method is: then the segmentation of completion information and coding first pass through Coding fragment is processed into hiding information file, finally they is sent to section with three-dimensional relationship and different from each other by encryption It is stored on point, if system receives after going back the instruction of prime information, then random screening goes out certain amount from hiding information File, restored after decryption by formula.
Preferably, the sensitive information of storage is divided into the identical sensitive information fragment of k size, is then deposited by three-dimensional Storage algorithm encodes this k sensitive information fragment, and the sensitive information fragment after coding is indicated with n, and the sensitivity after coding Information fragment is identical as original sensitive information fragment size, but the two asks that there is no any associations, sensitivity in encoded R sensitive information fragment is chosen in information fragment, can be restored to the state of original sensitive data, and n >=r >=k > l to the greatest extent.
Preferably, data are exactly divided into several fragmentation of data when being divided by data information, then to obtaining Fragment coding, certain sample fragment is filtered out from set of patches, pass through its carry out initial data reduction.It is assumed herein that Fragment sum be k, coding fragment be n, the fragment sample number restored be r, and they there are relationship n >=r >=k > l.It is setting Y is determined for coding fragment, and F is the big data information of script, and G then represents the three-dimensional storage matrix of n × k.According to coding fragment Y and Storage matrix G, reduction obtain big data information, and calculation formula indicates are as follows: F=Y'(G') -1, in reduction process, fragment sum It can be changed according to system dynamic with coding fragment number, and must assure that condition n >=r >=k > l establishment, be otherwise unable to complete Restore work.
Compared with prior art, the invention has the following beneficial effects:
In the present invention, the storage of big data information is realized using three-dimensional algorithm, using improved random phase encryption method, is improved The storage security of big data important information, and be easily achieved, for big data information security storage provide new method.
Specific embodiment
A kind of safe encryption method of big data, used method is: the segmentation of completion information and coding first, then By encryption, coding fragment is processed into hiding information file, finally they are sent to three-dimensional relationship and different from each other Node on stored, if system receives after going back the instruction of prime information, then random screening is certain out from hiding information The file of quantity, is restored after decryption by formula;
The sensitive information of storage is divided into the identical sensitive information fragment of k size, then by three-dimensional storage algorithm to this k A sensitive information fragment is encoded, and the sensitive information fragment after coding is indicated with n, and sensitive information fragment and original after coding The sensitive information fragment size of beginning is identical, but the two asks that there is no any associations, selects in sensitive information fragment in encoded R sensitive information fragment is taken, the state of original sensitive data, and n >=r >=k > l can be restored to the greatest extent;Data information is being drawn Data are exactly divided into several fragmentation of data by timesharing, then encode to obtained fragment, one is filtered out from set of patches Fixed sample fragment carries out the reduction of initial data by it.It is assumed herein that fragment sum is k, coding fragment is n, is gone back Former fragment sample number is r, and they there are relationship n >=r >=k > l.It is that the big data of script is believed setting Y to encode fragment, F Breath, G then represent the three-dimensional storage matrix of n × k.According to coding fragment Y and storage matrix G, reduction obtains big data information, counts Calculating formula indicates are as follows: F=Y'(G') -1, in reduction process, fragment sum and coding fragment number can change according to system dynamic Become, and must assure that condition n >=r >=k > l establishment, is otherwise unable to complete reduction work.
It should be noted that the present invention is a kind of safe encryption method of big data, safety is being carried out to big data information When storage, it usually needs the design of key is carried out for storage system, with the encrypted work of file in this completion system, thus The characteristic set of big data information is obtained, is then handled to obtain message reference structure according to thresholds, just realizes big data in this way The encryption of information stores, and guarantees the storage safety of big data information, big data information is handled according to phase calculation, constructs it Three-dimensional information saves the important information of big data in these three-dimensional informations, the sensitive information of storage is divided into k size phase Then same sensitive information fragment encodes this k sensitive information fragment by three-dimensional storage algorithm, the sensitivity after coding Information fragment indicates with n, and the sensitive information fragment after encoding is identical as original sensitive information fragment size, but the two is asked There is no any associations, and r sensitive information fragment is chosen in sensitive information fragment in encoded, can be restored to the greatest extent original quick Feel the state of data, and n >=r >=k > l, data are exactly divided into several fragmentation of data by the three-dimensional storage of big data information, Then obtained fragment is encoded, certain sample fragment is filtered out from set of patches, going back for initial data is carried out by it It is former.It is assumed herein that fragment sum be k, coding fragment be n, the fragment sample number restored be r, and they there are relationship n >=r ≥k>l.It is the big data information of script setting Y to encode fragment, F, G then represents the three-dimensional storage matrix of n × k.According to Fragment Y and storage matrix G is encoded, reduction obtains big data information, and calculation formula indicates are as follows:
F=Y'(G') -1, in reduction process, fragment sum and coding fragment number can change according to system dynamic, and necessary Guaranteed conditions n >=r >=k > l establishment, is otherwise unable to complete reduction work, in conclusion the three-dimensional of big data information stored Coding fragment is processed into hiding information file, finally handle then by encryption by journey, the first segmentation of completion information and coding They are sent to three-dimensional relationship and are stored on node different from each other, if system receives the instruction for going back prime information Afterwards, random screening goes out a certain number of files then from hiding information, is restored after decryption by formula.
Finally, it is stated that the above examples are only used to illustrate the technical scheme of the present invention, rather than its limitations;Although ginseng Invention is described in detail according to previous embodiment, it will be understood by those of skill in the art that it still can be to aforementioned implementation Technical solution documented by example is modified, or to part of technical characteristic equivalent replacement;And these are modified or replaceed, The essence of technical solution is not set to be detached from the spirit and scope of technical solution of the embodiment of the present invention.

Claims (3)

1. a kind of safe encryption method of big data, which is characterized in that used method is: first completion information segmentation with Coding fragment is processed into hiding information file then by encryption by coding, finally they be sent to three-dimensional relationship and It is stored on node different from each other, if system receives after going back the instruction of prime information, then sieves at random from hiding information A certain number of files are selected, are restored after decryption by formula.
2. a kind of safe encryption method of big data according to right 1, which is characterized in that comprise the concrete steps that: by storage Sensitive information is divided into the identical sensitive information fragment of k size, then by three-dimensional storage algorithm to this k sensitive information point Piece is encoded, and the sensitive information fragment after coding is indicated with n, and sensitive information fragment and original sensitive information after coding Fragment size is identical, but the two asks that there is no any associations, and r sensitive information is chosen in sensitive information fragment in encoded Fragment can be restored to the greatest extent the state of original sensitive data, and n >=r >=k > l.
3. a kind of safe encryption method of big data according to right 2, it is characterised in that: data information is being divided When, data are exactly divided into several fragmentation of data, then obtained fragment is encoded, are filtered out from set of patches certain Sample fragment, pass through its carry out initial data reduction, it is assumed here that fragment sum be k, coding fragment be n, restored Fragment sample number be r, and they are there are relationship n >=r >=k > l, set Y as coding fragment, F for script big data letter Breath, G then represent the three-dimensional storage matrix of n × k, and according to coding fragment Y and storage matrix G, reduction obtains big data information, count Calculating formula indicates are as follows: F=Y'(G') -1, in reduction process, fragment sum and coding fragment number can change according to system dynamic Become, and must assure that condition n >=r >=k > l establishment, is otherwise unable to complete reduction work.
CN201811604545.8A 2018-12-26 2018-12-26 A kind of safe encryption method of big data Pending CN109684859A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811604545.8A CN109684859A (en) 2018-12-26 2018-12-26 A kind of safe encryption method of big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811604545.8A CN109684859A (en) 2018-12-26 2018-12-26 A kind of safe encryption method of big data

Publications (1)

Publication Number Publication Date
CN109684859A true CN109684859A (en) 2019-04-26

Family

ID=66189871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811604545.8A Pending CN109684859A (en) 2018-12-26 2018-12-26 A kind of safe encryption method of big data

Country Status (1)

Country Link
CN (1) CN109684859A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115834239A (en) * 2022-12-26 2023-03-21 南京喜悦科技股份有限公司 Information security processing system and method based on state cryptographic algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蔡玺等: "大数据信息安全的三维存储加密方法", 《电子技术与软件工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115834239A (en) * 2022-12-26 2023-03-21 南京喜悦科技股份有限公司 Information security processing system and method based on state cryptographic algorithm
CN115834239B (en) * 2022-12-26 2023-10-20 南京喜悦科技股份有限公司 Information security processing system and method based on cryptographic algorithm

Similar Documents

Publication Publication Date Title
US8401186B2 (en) Cloud storage data access method, apparatus and system based on OTP
US10009170B2 (en) Apparatus and method for providing Feistel-based variable length block cipher
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
TW200828938A (en) Method for securely extending key stream to encrypt high-entropy data
JP2004534333A (en) Integrated protection method and system for distributed data processing in computer networks
CN103368975B (en) A kind of method and system of batch data safe transmission
CN104660590B (en) A kind of file encryption secure cloud storage scheme
CN105022937B (en) For white box to be realized to the interface compatibility method for being tightly attached to program around
CN105024992A (en) Implementing use-dependent security settings in a single white-box implementation
US20010033654A1 (en) W-EC1 encryption and decryption method and system
CN102811124B (en) Based on the system Authentication method of two card trigram technology
KR20230175185A (en) File sharing method and system based on the safety of national password algorithm
CN105978680A (en) Implementing padding in a white-box implementation
JP6703706B2 (en) Ciphertext management method, ciphertext management device and program
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
CN109684859A (en) A kind of safe encryption method of big data
CN103313097B (en) Method and system for encrypting and decrypting encoded file
JP5113630B2 (en) Secret sharing method, program, and apparatus
CN114205144B (en) Data transmission method, apparatus, device, storage medium and program product
CN114244635B (en) Encryption type data coding method of communication equipment
CN102647428A (en) Encrypting and decrypting system and method adopting trusteeship control based on communication network
CN111010386B (en) Privacy protection and data supervision control method based on shared account book
CN108809889A (en) A kind of data certainty delet method negated based on data block random site
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
AB et al. A New Security Mechanism for Secured Communications Using Steganography and CBA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190426

RJ01 Rejection of invention patent application after publication