CN111181938A - Edge calculation distributed data encryption transmission method based on fragment transmission - Google Patents

Edge calculation distributed data encryption transmission method based on fragment transmission Download PDF

Info

Publication number
CN111181938A
CN111181938A CN201911325976.5A CN201911325976A CN111181938A CN 111181938 A CN111181938 A CN 111181938A CN 201911325976 A CN201911325976 A CN 201911325976A CN 111181938 A CN111181938 A CN 111181938A
Authority
CN
China
Prior art keywords
data
data information
combined data
matrix
combined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911325976.5A
Other languages
Chinese (zh)
Inventor
张振江
孙枫
沈波
米昆
应志红
李晓明
赵雅静
朱凯歌
李英龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Thunisoft Information Technology Co ltd
Beijing Jiaotong University
Original Assignee
Beijing Thunisoft Information Technology Co ltd
Beijing Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Thunisoft Information Technology Co ltd, Beijing Jiaotong University filed Critical Beijing Thunisoft Information Technology Co ltd
Priority to CN201911325976.5A priority Critical patent/CN111181938A/en
Publication of CN111181938A publication Critical patent/CN111181938A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides an edge computing distributed data encryption transmission method based on fragment transmission, which comprises two parts of data fragment transmission and distributed encryption algorithm realization; the mutual prime integer group can be sent separately from the data packet, even if an attacker has to intercept two data packets at the same time, and because the prime integer group is encrypted by using an RSA algorithm, the attacker still cannot crack the data under the condition that the security of a private key is ensured; the method provided by the invention uses the fragment type transmission scheme, so that even if part of data is intercepted and cracked, effective information can not be obtained, and the safety is further improved.

Description

Edge calculation distributed data encryption transmission method based on fragment transmission
Technical Field
The invention relates to the technical field of edge computing data security, in particular to an edge computing distributed data encryption transmission method based on fragment transmission.
Background
The edge computing migrates the cloud computing platform to the network edge, and attempts to perform deep fusion on services such as the traditional mobile communication network, the internet of things and the like, so that the end-to-end time delay of service delivery is reduced, the internal capability of the network is explored, and the user experience is improved.
Conventional encryption techniques are mainly classified into symmetric encryption techniques and asymmetric encryption techniques. The symmetric encryption technology utilizes the same secret key to encrypt and decrypt data, and the main algorithms include a DES algorithm, a TDEA algorithm, an IDEA algorithm and the like. The asymmetric encryption technology utilizes a pair of public key and private key to encrypt and decrypt data, however, the two methods have high computational complexity and need to be established on infrastructure with strong computational power, and in addition, when the data volume is large, the defects of high time cost and the like exist, and the requirements of edge computing equipment on low complexity and low power consumption are not met.
The fragmentation transmission technology is a relatively new data transmission mechanism for a distributed system. The data can be divided into a plurality of data segments at a sending end, the data segments are encrypted by the existing encryption algorithm and then transmitted through different paths, finally the data can be gathered to a receiving end, and at the receiving end, all the fragment decrypted data are decrypted, merged and added, and finally the original data can be recovered. In the transmission process, because the fragment transmission is adopted, if all attackers cannot intercept all data fragments, the attackers can only recover partial information even if the attackers possess decrypted keys finally, and the data fragmentation mechanism also greatly improves the security of data.
The Chinese remainder theorem can find the minimum positive integer solution in the congruence equation set, the form of the minimum integer solution is related to the prime positive integer set in the congruence equation set, and the original data can be restored by using the minimum positive integer solution and the initial positive integer of one set of prime.
In the existing edge calculation data transmission scheme, the calculation complexity of an encryption algorithm is high, so that high calculation capacity and energy consumption are required, and the requirement of edge calculation cannot be met.
Disclosure of Invention
The embodiment of the invention provides an edge computing distributed data encryption transmission method based on fragment transmission.
In order to achieve the purpose, the invention adopts the following technical scheme.
An edge computing distributed data encryption transmission method based on fragment transmission comprises the following steps:
splitting original data to be sent by certain edge equipment to obtain a plurality of output data segments and a self-contained data segment;
the certain edge device sends the output data segments to different adjacent edge devices;
the certain edge device receives output data segments sent by a plurality of adjacent edge devices, combines the output data segments with the self-reserved data segments to obtain combined data information, encrypts the combined data information through a distributed encryption algorithm and sends the combined data information to the cloud server;
executing the three steps for multiple times to enable each edge device to send the encrypted combined data information to the cloud server;
the cloud server obtains a plurality of combined data information through a decryption algorithm, and obtains original data based on the plurality of combined data information.
Preferably, the step of the certain edge device receiving the output data segments sent by the plurality of adjacent edge devices, combining the output data segments with the self-sustained data segments to obtain combined data information, and encrypting the combined data information by using a distributed encryption algorithm and sending the encrypted combined data information to the cloud server includes:
a certain edge device sets received output data segments sent from M-1 adjacent edge devices to G1,G2,...GM-1The self-contained data segment is GMCombining the output data segment with the self-sustaining data segment and dividing the combined data segment into N units to obtain an M x N matrix, wherein each element of the matrix is expressed as u11,u12,...u1N;u21,u22,...u2N;...;uM1,uM2,...,uMNThe matrix representation is of the form:
Figure BDA0002328387100000021
randomly selecting an integer q of N reciprocals1,q2,...,qNAnd satisfies that the nth integer is greater than all elements of the nth column in the matrix, i.e.
Figure BDA0002328387100000022
M congruence equation sets shown below are constructed by using data of each row in the matrix (1)
Figure BDA0002328387100000031
Solving the congruence equation set (2) by the property of Chinese remainder theorem to respectively obtain xiAnd minimum solution
Figure BDA0002328387100000032
In the formula (I), the compound is shown in the specification,
Figure BDA0002328387100000033
QiQ′i≡1(modqi) Obtaining Q'iIs QiModulus q ofiThe reciprocal of the number theory of (1);
based on xiObtaining the following matrix
Figure BDA0002328387100000034
X in the matrix (4)1,x2,...,xMAnd sequentially connecting to obtain the encrypted combined data information.
Preferably, the obtaining, by the cloud server, the combined data information through a decryption algorithm, and based on the combined data information, the original data includes:
the cloud server restores the encrypted combined data information in a matrix (4) form to obtain restored combined data information;
for each row x of the restored combined data informationiThe following congruence equation set is constructed
Figure BDA0002328387100000035
Solving the congruence equation set (5) to obtain a matrix (1);
sequentially connecting elements of the matrix (1) to obtain certain combined data information;
and repeating the substeps to obtain a plurality of combined data information, and obtaining a plurality of original data based on the plurality of combined data information.
Preferably, the method further includes the step of splitting the original data to be transmitted by a certain edge device to obtain a plurality of output data segments and a self-contained data segment:
task offloading is performed for each edge device.
As can be seen from the technical solutions provided by the embodiments of the present invention, the edge computing distributed data encryption transmission method based on fragment transmission provided by the present invention has the following advantages: although the invention uses the asymmetric encryption mode, the invention is only limited in the process of transmitting the mutual prime positive integer, and the encryption algorithm adopted by the data at the edge is low in algorithm complexity compared with the prior art, and meanwhile, in terms of safety, the encryption algorithm in the invention can be cracked only by decoding the data in the ciphertext encrypted by using RSA, so that the safety is guaranteed to be higher. The invention uses the transmission scheme of the fragment type, therefore, even if part of data is intercepted and cracked, the effective information can not be obtained, and the safety is further improved; the encryption and decryption algorithm in the method is low in complexity and suitable for an edge calculation scene.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a processing flow chart of an edge computing distributed data encryption transmission method based on fragmented transmission according to the present invention;
fig. 2 is a flowchart of an encryption algorithm of an edge computing distributed data encryption transmission method based on fragmented transmission according to the present invention;
fig. 3 is a flowchart of a second embodiment of an edge computing distributed data encryption transmission method based on fragmentation transmission according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or coupled. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
For the convenience of understanding the embodiments of the present invention, the following description will be further explained by taking several specific embodiments as examples in conjunction with the drawings, and the embodiments are not to be construed as limiting the embodiments of the present invention.
Referring to fig. 1, the edge computing distributed data encryption transmission method based on fragment transmission provided by the present invention includes a plurality of edge devices and a cloud server, and the execution steps include:
splitting original data to be sent by certain edge equipment to obtain a plurality of output data segments and a self-contained data segment;
the certain edge device sends the output data segments to different adjacent edge devices, so that each output data segment is sent to different single edge devices;
the certain edge device receives output data segments sent by a plurality of adjacent edge devices, combines the output data segments with the self-reserved data segments to obtain combined data information, encrypts the combined data information through a distributed encryption algorithm and sends the combined data information to the cloud server;
executing the three steps for multiple times to enable all the edge devices to receive the corresponding output data segments, combining the output data segments with the respective self-reserved data segments to obtain combined data information, and sending the encrypted combined data information to the cloud server; namely, the cloud server receives a plurality of encrypted combined data information;
the cloud server obtains a plurality of combined data information through a decryption algorithm, and obtains original data based on the plurality of combined data information.
Further, in some preferred embodiments, the above-mentioned certain edge device receives output data segments sent by a plurality of adjacent edge devices, combines the output data segments with the self-sustained data segments to obtain combined data information, and encrypts the combined data information by using a distributed encryption algorithm and sends the encrypted combined data information to the cloud server, including:
a certain edge device sets received output data segments sent from M-1 adjacent edge devices to G1,G2,...GM-1The self-contained data segment is GMCombining the output data segment with the self-sustaining data segment and dividing the combined data segment into N units to obtain an M x N matrix, wherein each element of the matrix is expressed as u11,u12,...u1N;u21,u22,...u2N;...;uM1,uM2,...,uMNThe matrix representation is of the form:
Figure BDA0002328387100000061
selecting an integer q of N reciprocals at random1,q2,...,qNAnd satisfies that the nth integer is greater than all elements of the nth column in the matrix, i.e.
Figure BDA0002328387100000062
M congruence equation sets shown below are constructed by using data of each row in the matrix (1)
Figure BDA0002328387100000063
Solving the congruence equation set (2) by the property of Chinese remainder theorem to respectively obtain xiAnd minimum solution
Figure BDA0002328387100000064
In the formula (I), the compound is shown in the specification,
Figure BDA0002328387100000065
QiQ′i≡1(modqi) Obtaining Q'iIs QiModulus q ofiThe reciprocal of the number theory of (1);
based on xiObtaining the following matrix
Figure BDA0002328387100000071
X in the matrix (4)1,x2,...,xMAnd sequentially connecting to obtain the encrypted combined data information.
Further, the process of decrypting the single encrypted combined data information by the cloud server through the decryption algorithm is as follows:
the cloud server restores the encrypted combined data information in a matrix (4) form to obtain restored combined data information;
for each row x of the restored combined data informationiThe following congruence equation set is constructed
Figure BDA0002328387100000072
Solving the congruence equation set (5) to obtain a matrix (1);
sequentially connecting elements of the matrix (1) to obtain certain combined data information;
and repeating the substeps to obtain a plurality of combined data information, and obtaining a plurality of original data based on the plurality of combined data information.
The invention also provides a preferred embodiment, which is used for exemplarily displaying the process of data transmission by applying the method provided by the invention; the invention aims at the communication design between edge equipment and an edge server or a cloud server in edge computing, wherein the edge equipment can comprise intelligent terminals such as a mobile phone, a notebook computer and a sensor, and key nodes in an edge computing network such as an intelligent gateway. The invention provides safety guarantee for data communication between the edge device and the edge server or the cloud server. It includes:
s1, when each edge device carries out task unloading and needs to communicate with a server, the data to be sent is divided into a plurality of data segments, and except one data segment reserved by the edge device, all other data segments are sent to different adjacent edge devices;
s2 as shown in fig. 2, the edge device divides the whole packet into M parts and sends M-1 data segments to other edge devices. After each edge device receives the data segments transmitted by other devices, combining the locally reserved data segments, and sorting the data segments into an M-N matrix, wherein M is the number of the edge devices transmitting data, N is the number of each data segment after being segmented again, and u is setijThe elements in the matrix are sent to an encryption module;
in the encryption module, firstly, a positive integer q of N reciprocity elements needs to be found1,q2,...,qNAnd is and
Figure BDA0002328387100000081
a congruence equation set is then constructed using each row element in the incoming matrix and the set of positive integers,
Figure BDA0002328387100000082
from the Chinese remainder theorem, the minimum positive integer solution of the equation set is:
Figure BDA0002328387100000083
wherein the content of the first and second substances,
Figure BDA0002328387100000084
QiQ′i≡1(modqi) I.e. Q'iIs QiModulus q ofiReciprocal of the number theory. Finally, M minimum positive integer solutions can be obtained, and the M data are ciphertext;
the sending end of the edge device directly sends the M data to the receiving end of the cloud server, and simultaneously, the N prime positive integers mentioned in the steps are separately sent to the cloud server, the data need to be transmitted in an encryption mode, in the embodiment, an RSA encryption algorithm is selected, a public key of the cloud server is used for encryption at the sending end, and a private key is used for corresponding decryption at the receiving end;
s3, the receiving end of the cloud server receives the M data and the encrypted N prime integers, the N prime integers are decrypted by a private key, and then a congruence equation set is constructed by each data in the M data and the N prime integers:
Figure BDA0002328387100000091
since the divisors of the modulus operation before and after encryption all correspond to the divisors before encryption one by one, u isij=u′ijFinally, a plaintext can be successfully obtained; after a plaintext is obtained, the information belonging to one device is integrated together according to the information in the lighting text, and finally, the safe transmission of the edge computing network information is realized.
The invention provides an edge computing distributed data encryption transmission method based on fragment transmission, which is realized by the following aspects of ensuring the safety of transmitted data:
(1) an attacker does not know the specific number of N, so that the data packets in the channel are difficult to divide;
(2) even if an attacker knows the number of the groups and does not have a positive integer group of the reciprocity elements, a congruence equation set cannot be constructed;
(3) the prime integer group of the mutualin can be sent separately from the data packet, the attacker must intercept two data packets at the same time, and because the prime integer group is encrypted by using the RSA algorithm, the attacker still cannot crack the data under the condition that the security of the private key is ensured;
(4) the data is sent in a fragmentation mode, a certain data packet is captured and decoded in time, original information cannot be recovered, and safety is further improved.
In summary, the edge computing distributed data encryption transmission method based on fragment transmission provided by the present invention has the following advantages:
(1) although the invention uses the asymmetric encryption mode, the invention is only limited in the process of transmitting the mutual prime positive integer, and the encryption algorithm adopted by the data at the edge is low in algorithm complexity compared with the prior art, and meanwhile, in terms of safety, the encryption algorithm in the invention can be cracked only by decoding the data in the ciphertext encrypted by using RSA, so that the safety is guaranteed to be higher.
(2) The invention uses the fragment type transmission scheme, so that even if part of data is intercepted and cracked, effective information still cannot be obtained, and the safety is further improved.
(3) The encryption and decryption algorithm in the method is low in complexity and suitable for an edge calculation scene.
Those of ordinary skill in the art will understand that: the figures are merely schematic representations of one embodiment, and the blocks or flow diagrams in the figures are not necessarily required to practice the present invention.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for apparatus or system embodiments, since they are substantially similar to method embodiments, they are described in relative terms, as long as they are described in partial descriptions of method embodiments. The above-described embodiments of the apparatus and system are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (4)

1. An edge computing distributed data encryption transmission method based on fragment transmission is characterized by comprising the following steps:
splitting original data to be sent by certain edge equipment to obtain a plurality of output data segments and a self-contained data segment;
the certain edge device sends the output data segments to different adjacent edge devices;
the certain edge device receives output data segments sent by a plurality of adjacent edge devices, combines the output data segments with the self-reserved data segments to obtain combined data information, encrypts the combined data information through a distributed encryption algorithm and sends the combined data information to the cloud server;
executing the three steps for multiple times to enable each edge device to send the encrypted combined data information to the cloud server;
the cloud server obtains a plurality of combined data information through a decryption algorithm, and obtains original data based on the plurality of combined data information.
2. The method of claim 1, wherein the certain edge device receives output data segments sent by a plurality of adjacent edge devices, combines the output data segments with the self-sustained data segments to obtain combined data information, and encrypts the combined data information through a distributed encryption algorithm and sends the combined data information to the cloud server, including:
a certain edge device sets received output data segments sent from M-1 adjacent edge devices to G1,G2,...GM-1The self-contained data segment is GMCombining the output data segment with the self-sustaining data segment and dividing the combined data segment into N units to obtain an M x N matrix, wherein each element of the matrix is expressed as u11,u12,...u1N;u21,u22,...u2N;...;uM1,uM2,...,uMNThe matrix representation is of the form:
Figure FDA0002328387090000011
randomly selecting an integer q of N reciprocals1,q2,...,qNAnd satisfies that the nth integer is greater than all elements of the nth column in the matrix, i.e.
Figure FDA0002328387090000012
M congruence equation sets shown below are constructed by using data of each row in the matrix (1)
Figure FDA0002328387090000021
Solving the congruence equation set (2) by the property of Chinese remainder theorem to respectively obtain xiAnd minimum solution
Figure FDA0002328387090000022
In the formula (I), the compound is shown in the specification,
Figure FDA0002328387090000023
QiQ′i≡1(mod qi) Obtaining Q'iIs QiModulus q ofiThe reciprocal of the number theory of (1);
based on xiObtaining the following matrix
Figure FDA0002328387090000024
X in the matrix (4)1,x2,...,xMAnd sequentially connecting to obtain the encrypted combined data information.
3. The method of claim 2, wherein the cloud server obtains the combined data information through a decryption algorithm, and obtaining the original data based on the combined data information comprises:
the cloud server restores the encrypted combined data information in a matrix (4) form to obtain restored combined data information;
for each row x of the restored combined data informationiThe following congruence equation set is constructed
Figure FDA0002328387090000025
Solving the congruence equation set (5) to obtain a matrix (1);
sequentially connecting elements of the matrix (1) to obtain certain combined data information;
and repeating the substeps to obtain a plurality of combined data information, and obtaining a plurality of original data based on the plurality of combined data information.
4. A method according to any one of claims 1 to 3, further comprising a step of splitting the original data to be transmitted by the edge device to obtain a plurality of output data segments and a self-contained data segment, before:
task offloading is performed for each edge device.
CN201911325976.5A 2019-12-20 2019-12-20 Edge calculation distributed data encryption transmission method based on fragment transmission Pending CN111181938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911325976.5A CN111181938A (en) 2019-12-20 2019-12-20 Edge calculation distributed data encryption transmission method based on fragment transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911325976.5A CN111181938A (en) 2019-12-20 2019-12-20 Edge calculation distributed data encryption transmission method based on fragment transmission

Publications (1)

Publication Number Publication Date
CN111181938A true CN111181938A (en) 2020-05-19

Family

ID=70650296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911325976.5A Pending CN111181938A (en) 2019-12-20 2019-12-20 Edge calculation distributed data encryption transmission method based on fragment transmission

Country Status (1)

Country Link
CN (1) CN111181938A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112700152A (en) * 2021-01-06 2021-04-23 南方电网科学研究院有限责任公司 Hierarchical safe multi-party computing method and device based on Chinese remainder theorem
CN113507482A (en) * 2021-07-27 2021-10-15 御风科技(海南)有限公司 Data secure transmission method, secure transaction method, system, medium, and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070113293A1 (en) * 2004-11-17 2007-05-17 Steven Blumenau Systems and methods for secure sharing of information
CN102572585A (en) * 2010-12-08 2012-07-11 中国科学院声学研究所 Method and system for high speed and parallel data reception and processing
CN105682089A (en) * 2015-12-29 2016-06-15 北京交通大学 Data protection method and device based on fragments
CN105847279A (en) * 2016-05-03 2016-08-10 深圳市永兴元科技有限公司 Distributed data processing method and data center
CN106611127A (en) * 2016-04-29 2017-05-03 四川用联信息技术有限公司 Encryption method for information access in cloud computing
CN106713137A (en) * 2015-11-13 2017-05-24 中国电信股份有限公司 VPN method based on segment routing and SDN technology and device and system thereof
CN109523362A (en) * 2018-11-16 2019-03-26 大唐高鸿信息通信研究院(义乌)有限公司 A kind of second-hand house transaction system and method based on 5G framework and block chain
CN109586894A (en) * 2018-11-16 2019-04-05 重庆邮电大学 The encryption method of data in OPC UA edge calculations is realized based on pseudo-random permutation
CN110474893A (en) * 2019-07-30 2019-11-19 同济大学 A kind of isomery is across the close state data safety sharing method of trust domain and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070113293A1 (en) * 2004-11-17 2007-05-17 Steven Blumenau Systems and methods for secure sharing of information
CN102572585A (en) * 2010-12-08 2012-07-11 中国科学院声学研究所 Method and system for high speed and parallel data reception and processing
CN106713137A (en) * 2015-11-13 2017-05-24 中国电信股份有限公司 VPN method based on segment routing and SDN technology and device and system thereof
CN105682089A (en) * 2015-12-29 2016-06-15 北京交通大学 Data protection method and device based on fragments
CN106611127A (en) * 2016-04-29 2017-05-03 四川用联信息技术有限公司 Encryption method for information access in cloud computing
CN105847279A (en) * 2016-05-03 2016-08-10 深圳市永兴元科技有限公司 Distributed data processing method and data center
CN109523362A (en) * 2018-11-16 2019-03-26 大唐高鸿信息通信研究院(义乌)有限公司 A kind of second-hand house transaction system and method based on 5G framework and block chain
CN109586894A (en) * 2018-11-16 2019-04-05 重庆邮电大学 The encryption method of data in OPC UA edge calculations is realized based on pseudo-random permutation
CN110474893A (en) * 2019-07-30 2019-11-19 同济大学 A kind of isomery is across the close state data safety sharing method of trust domain and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112700152A (en) * 2021-01-06 2021-04-23 南方电网科学研究院有限责任公司 Hierarchical safe multi-party computing method and device based on Chinese remainder theorem
CN113507482A (en) * 2021-07-27 2021-10-15 御风科技(海南)有限公司 Data secure transmission method, secure transaction method, system, medium, and device
CN113507482B (en) * 2021-07-27 2023-10-10 御风科技(海南)有限公司 Data security transmission method, security transaction method, system, medium and equipment

Similar Documents

Publication Publication Date Title
Padmavathi et al. A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution
CN104023013B (en) Data transmission method, server side and client
JP2022017542A (en) Device and method for resonant encryption
US9172529B2 (en) Hybrid encryption schemes
US10367640B2 (en) Shared secret data production system
CN112532613A (en) Block chain address-based covert communication method
WO2008143652A1 (en) Distributed encryption authentication methods and systems
WO2018227174A1 (en) Data security apparatus with analog component
US10505722B2 (en) Shared secret communication system with use of cloaking elements
KR20110129961A (en) A method for secure communication in a network, a communication device, a network and a computer program therefor
CN112104454B (en) Data secure transmission method and system
Rege et al. Bluetooth communication using hybrid encryption algorithm based on AES and RSA
CN107534558B (en) Method for protecting the information security of data transmitted via a data bus and data bus system
US20220069995A1 (en) System and method for securing data
Alghamdi et al. Routing-aware and malicious node detection in a concealed data aggregation for WSNs
CN111224974A (en) Method, system, electronic device and storage medium for network communication content encryption
Alghamdi et al. Reliable and secure end-to-end data aggregation using secret sharing in wsns
CN107666491B (en) Data transmission method of air-ground integrated network based on symmetric encryption
Subedar et al. Hybrid cryptography: Performance analysis of various cryptographic combinations for secure communication
CN111181938A (en) Edge calculation distributed data encryption transmission method based on fragment transmission
Priyanka et al. A survey of image encryption for healthcare applications
CN114567427B (en) Block chain hidden data segmented transmission method
Jana et al. An Overview on Security Issues in Modern Cryptographic Techniques
Somaiya et al. Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed
EP3883178A1 (en) Encryption system and method employing permutation group-based encryption technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519

RJ01 Rejection of invention patent application after publication