CN114785591A - Encrypted information management system based on big data - Google Patents
Encrypted information management system based on big data Download PDFInfo
- Publication number
- CN114785591A CN114785591A CN202210423849.4A CN202210423849A CN114785591A CN 114785591 A CN114785591 A CN 114785591A CN 202210423849 A CN202210423849 A CN 202210423849A CN 114785591 A CN114785591 A CN 114785591A
- Authority
- CN
- China
- Prior art keywords
- module
- encryption
- information
- data
- algorithm encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000004044 response Effects 0.000 claims abstract description 33
- 238000004364 calculation method Methods 0.000 claims abstract description 30
- 238000013500 data storage Methods 0.000 claims abstract description 19
- 238000007726 management method Methods 0.000 claims abstract description 18
- 238000013468 resource allocation Methods 0.000 claims abstract description 8
- 238000000034 method Methods 0.000 claims description 16
- 238000013144 data compression Methods 0.000 claims description 15
- 230000006837 decompression Effects 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 6
- 238000007906 compression Methods 0.000 claims description 5
- 230000006835 compression Effects 0.000 claims description 5
- 230000009471 action Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an encrypted information management system based on big data, which comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module respectively, and the information receiving module is electrically connected with the response time calculation module; the system comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information, and the system also comprises a server resource allocation module.
Description
Technical Field
The invention relates to the technical field of big data, in particular to an encryption information management system based on big data.
Background
The management of information relates to information encryption, the information encryption relates to a symmetric algorithm and an asymmetric algorithm, and a special example of the symmetric algorithm is a disposable messy code book. The method provides a long and unique key for each piece of sent information to encrypt and decrypt, the algorithm speed is high, the key management cost is high, and server resources are occupied. The asymmetric algorithm, namely the encryption information and the decryption information adopt different keys. The method has the characteristics that double keys are adopted, the key management cost is extremely low, the method is suitable for large-scale network application, but the algorithm speed is low, and the practicability is poor. Therefore, it is necessary to design a big data-based encryption information management system having high practicability.
Disclosure of Invention
The present invention is directed to providing a big data-based encryption information management system to solve the problems set forth in the background art described above.
In order to solve the technical problems, the invention provides the following technical scheme: the encrypted information management system based on the big data comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module, and the information receiving module is electrically connected with the response time calculation module;
the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, and the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information.
According to the technical scheme, the system further comprises a server resource distribution module, wherein the server resource distribution module is electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module;
the server resource allocation module is used for allocating server resources occupied by the symmetric algorithm encryption and the asymmetric algorithm encryption.
According to the technical scheme, the system specifically comprises the following steps;
s1, when the server starts to work, the data to be encrypted is received into the server through the information receiving module;
s2, calculating the decryption time under two encryption modes under the condition that the memory size of the current information is calculated by using the response time calculation module, if the decryption time does not exceed a set value, encrypting by using the asymmetric algorithm encryption module, and if the decryption time exceeds the set value, encrypting by using the symmetric algorithm encryption module;
and S3, the encrypted information is transmitted to the data storage module for storage, so that the information is convenient to be subsequently processed.
According to the technical scheme, the working process of the server resource allocation module is as follows:
and S4, distributing the encryption workload proportion born by the symmetric algorithm encryption module and the asymmetric algorithm encryption module according to the corresponding time calculated by the response time calculation module, and transmitting the information to be encrypted to the symmetric algorithm encryption module and the asymmetric algorithm encryption module for cooperative encryption.
According to the above technical solution, in the step S4, the specific allocation method of the encryption workload proportion is as follows:
s4-1, when the amount of information to be encrypted is small, namely the decryption time estimated by the response time calculation module is less than a first-order set value, encrypting by using the asymmetric algorithm encryption module;
s4-2, when the amount of information to be encrypted begins to increase, namely the decryption time estimated by the response time calculation module is greater than a first-order set value and less than a second-order set value, reducing the proportion of the asymmetric algorithm encryption module for processing the encryption tasks and increasing the proportion of the symmetric algorithm encryption module for processing the encryption tasks;
s4-3, when the amount of information to be encrypted is large, namely the decryption time estimated by the response time calculation module is larger than a second-order set value, the symmetric algorithm encryption module is completely used for processing the encryption task.
According to the above technical solution, in the step S4-2, the allocation formula of the encryption task is:
wherein A is0A is the information amount of the encryption task processed by the symmetric algorithm encryption module, and A is the information amount of the total information amount needing encryption1Maximum value of information quantity, p, for processing encryption tasks by asymmetric algorithm encryption module0Decryption time, p, being a second order setting1The decryption time estimated for the response time calculation module.
According to the technical scheme, the data storage module comprises a data compression module and a data decompression module, and the data compression module and the data decompression module are both electrically connected with the asymmetric algorithm encryption module and the symmetric algorithm encryption module;
the data compression module is used for compressing and storing the encrypted data in the server to save occupied volume, and the data decompression module is used for decompressing the data before decryption to facilitate decryption.
According to the above technical solution, the compression information ratio α of the data compression module is related to the task ratio processed by the symmetric algorithm encryption module and the asymmetric algorithm encryption module, that is, the more information encrypted by the symmetric algorithm, the higher the compression information ratio α of the data compression module is, specifically:
α=A/A1k, where k is a scaling factor.
Compared with the prior art, the invention has the following beneficial effects: according to the invention, a technology combining a symmetric algorithm and an asymmetric algorithm is adopted, different instantaneous weights are given to the two encryption algorithms, the instantaneous weights are distributed according to the response time requirements of customers on the use scenes, a proper encryption information method distribution proportion is given to each scene, and the consumption of server resources can be reduced while the algorithm speed is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic overall principle of the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1, the present invention provides the following technical solutions: the encrypted information management system based on big data comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module, and the information receiving module is electrically connected with the response time calculation module;
the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, and the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information;
the server resource allocation module is electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module;
the server resource allocation module is used for allocating server resources occupied by the symmetric algorithm encryption and the asymmetric algorithm encryption;
the system specifically comprises the following steps;
s1, when the server starts to work, the data to be encrypted is received into the server through the information receiving module;
s2, calculating the decryption time under two encryption modes under the condition that the memory size of the current information is calculated by using the response time calculation module, if the decryption time does not exceed a set value, encrypting by using the asymmetric algorithm encryption module, and if the decryption time exceeds the set value, encrypting by using the symmetric algorithm encryption module;
s3, the encrypted information is transmitted to a data storage module for storage, so that the information is convenient to be subsequently processed;
the working process of the server resource allocation module is as follows:
s4, distributing the encryption workload proportion born by the symmetric algorithm encryption module and the asymmetric algorithm encryption module according to the corresponding time calculated by the response time calculation module, and transmitting the information to be encrypted to the symmetric algorithm encryption module and the asymmetric algorithm encryption module for cooperative encryption;
in the step S4, the specific allocation method of the encryption workload proportion includes:
s4-1, when the amount of information to be encrypted is small, namely the decryption time estimated by the response time calculation module is less than a first-order set value, encrypting by using an asymmetric algorithm encryption module;
s4-2, when the amount of information to be encrypted begins to increase, namely the decryption time estimated by the response time calculation module is greater than a first-order set value and less than a second-order set value, reducing the proportion of the asymmetric algorithm encryption module for processing the encryption tasks and increasing the proportion of the symmetric algorithm encryption module for processing the encryption tasks;
s4-3, when the amount of information to be encrypted is large, namely the decryption time estimated by the response time calculation module is larger than a second-order set value, completely utilizing the symmetric algorithm encryption module to process the encryption task;
in the step S4-2, the allocation formula of the encryption task is:
wherein A is0For the total amount of information to be encrypted, A is the amount of encryption task information processed by the symmetric algorithm encryption module, A1Maximum value of information quantity, p, for processing encryption tasks by asymmetric algorithm encryption module0Decryption time, p, being a second order setting1Calculating an estimated decryption time for the response time;
the data storage module comprises a data compression module and a data decompression module, and the data compression module and the data decompression module are both electrically connected with the asymmetric algorithm encryption module and the symmetric algorithm encryption module;
the data compression module is used for compressing and storing the encrypted data in the server to save occupied volume, and the data decompression module is used for decompressing the data before decryption to facilitate decryption;
the compression information ratio alpha of the data compression module is related to the task ratio processed by the symmetric algorithm encryption module and the asymmetric algorithm encryption module, that is, the more information encrypted by the symmetric algorithm, the higher the compression information ratio alpha of the data compression module is, specifically:
α=A/A1k, wherein k is a proportionality coefficient; the technology of combining a symmetric algorithm and an asymmetric algorithm is adopted, different instantaneous weights are given to the two encryption algorithms, the instantaneous weights are distributed according to the response time requirements of customers on the use scenes, a proper encryption information method distribution proportion is given to each scene, and the consumption of server resources can be reduced while the algorithm speed is improved.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (8)
1. Big data-based encrypted information management system, characterized in that: the system comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module respectively, and the information receiving module is electrically connected with the response time calculation module;
the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, and the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information.
2. The big-data based encryption information management system according to claim 1, wherein: the system also comprises a server resource distribution module which is electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module;
the server resource allocation module is used for allocating server resources occupied by the symmetric algorithm encryption and the asymmetric algorithm encryption.
3. The big-data based encryption information management system according to claim 2, wherein: the system specifically comprises the following steps;
s1, when the server starts to work, the data to be encrypted is received into the server through the information receiving module;
s2, calculating the decryption time under two encryption modes under the condition that the memory size of the current information is calculated by using the response time calculation module, if the decryption time does not exceed a set value, encrypting by using the asymmetric algorithm encryption module, and if the decryption time exceeds the set value, encrypting by using the symmetric algorithm encryption module;
and S3, the encrypted information is transmitted to a data storage module for storage, so that the information is convenient to be subsequently processed.
4. The big-data based encryption information management system according to claim 3, wherein: the working process of the server resource allocation module is as follows:
and S4, distributing the encryption workload proportion born by the symmetric algorithm encryption module and the asymmetric algorithm encryption module according to the corresponding time calculated by the response time calculation module, and transmitting the information to be encrypted to the symmetric algorithm encryption module and the asymmetric algorithm encryption module for cooperative encryption.
5. The big-data-based encryption information management system according to claim 4, wherein: in the step S4, the specific allocation method of the encryption workload proportion includes:
s4-1, when the amount of information to be encrypted is small, namely the decryption time estimated by the response time calculation module is less than a first-order set value, encrypting by using the asymmetric algorithm encryption module;
s4-2, when the amount of information to be encrypted begins to increase, namely the decryption time estimated by the response time calculation module is greater than a first-order set value and less than a second-order set value, reducing the proportion of the asymmetric algorithm encryption module for processing the encryption tasks and increasing the proportion of the symmetric algorithm encryption module for processing the encryption tasks;
s4-3, when the amount of information to be encrypted is large, namely the decryption time estimated by the response time calculation module is larger than a second-order set value, the symmetric algorithm encryption module is completely used for processing the encryption task.
6. The big-data-based encryption information management system according to claim 5, wherein: in step S4-2, the allocation formula of the encryption task is:
wherein A is0A is the information amount of the encryption task processed by the symmetric algorithm encryption module, and A is the information amount of the total information amount needing encryption1Maximum value of information quantity, p, for processing encryption tasks by asymmetric algorithm encryption module0Decryption time, p, being a second order setting1The decryption time estimated for the response time calculation module.
7. The big-data based encryption information management system according to claim 6, wherein: the data storage module comprises a data compression module and a data decompression module, and the data compression module and the data decompression module are both electrically connected with the asymmetric algorithm encryption module and the symmetric algorithm encryption module;
the data compression module is used for compressing and storing the encrypted data in the server to save occupied volume, and the data decompression module is used for decompressing the data before decryption to facilitate decryption.
8. The big-data-based encryption information management system according to claim 7, wherein: the compression information ratio alpha of the data compression module is related to the task ratio processed by the symmetric algorithm encryption module and the asymmetric algorithm encryption module, that is, the more the information encrypted by the symmetric algorithm, the higher the information ratio alpha compressed by the data compression module, specifically:
α=A/A1k, wherein k is a scaling factor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210423849.4A CN114785591A (en) | 2022-04-21 | 2022-04-21 | Encrypted information management system based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210423849.4A CN114785591A (en) | 2022-04-21 | 2022-04-21 | Encrypted information management system based on big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114785591A true CN114785591A (en) | 2022-07-22 |
Family
ID=82431073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210423849.4A Pending CN114785591A (en) | 2022-04-21 | 2022-04-21 | Encrypted information management system based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114785591A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201919030U (en) * | 2010-12-10 | 2011-08-03 | 航天信息股份有限公司 | System for storing and managing network files |
US20200259647A1 (en) * | 2019-02-12 | 2020-08-13 | Nxm Labs Canada Inc. | Quantum-augmentable hybrid encryption system and method |
CN112966284A (en) * | 2021-03-26 | 2021-06-15 | 知印信息技术(天津)有限公司 | File encryption and decryption method and system and computer readable storage medium |
-
2022
- 2022-04-21 CN CN202210423849.4A patent/CN114785591A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201919030U (en) * | 2010-12-10 | 2011-08-03 | 航天信息股份有限公司 | System for storing and managing network files |
US20200259647A1 (en) * | 2019-02-12 | 2020-08-13 | Nxm Labs Canada Inc. | Quantum-augmentable hybrid encryption system and method |
CN112966284A (en) * | 2021-03-26 | 2021-06-15 | 知印信息技术(天津)有限公司 | File encryption and decryption method and system and computer readable storage medium |
Non-Patent Citations (4)
Title |
---|
丁丙胜: ""对称密码和非对称密码在无线传感器网络中应用研究"", 《北部湾大学学报》, 20 February 2020 (2020-02-20), pages 2 - 3 * |
单康康;江肖强;: "混合加密机制降低计算复杂度", 中国教育网络, no. 1, 5 March 2011 (2011-03-05) * |
周金杰;: "一种基于基础安全机制构建的组合加密安全方案", 科技传播, no. 14, 23 July 2012 (2012-07-23) * |
金宁;张道远;高建桥;王赵峰;: "对称密码和非对称密码算法在无线传感器网络中应用研究", 传感技术学报, no. 06, 15 June 2011 (2011-06-15), pages 3 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1322699C (en) | Indirect public-key encryption | |
CN107154945A (en) | A kind of cloudy fragmentation method for secure storing and system based on correcting and eleting codes | |
Liu et al. | Mobile-edge computing framework with data compression for wireless network in energy internet | |
GB2324449A (en) | Key replacement in a public key cryptosystem | |
CN113765660B (en) | Method for distributing quantum keys of terminal equipment of Internet of things on demand | |
CN103152346B (en) | The method for secret protection of mass users, server and system | |
CN115146285A (en) | File encryption and decryption method and device | |
CN110300159A (en) | A kind of sensing cloud data safety low cost storage method based on edge calculations | |
CN110505062A (en) | A kind of Dynamic Oval curve cryptographic methods applied to alliance's chain | |
CN114125831B (en) | 5G smart grid user side data acquisition method and system based on proxy re-encryption | |
CN110378128A (en) | Data ciphering method, device and terminal device | |
CN108737353B (en) | Data encryption method and device based on data analysis system | |
CN109491591A (en) | A kind of information diffusion method suitable for cloudy storage system | |
CN114785591A (en) | Encrypted information management system based on big data | |
CN111798236A (en) | Transaction data encryption and decryption method, device and equipment | |
CN111931194A (en) | Security monitoring big data processing method and device based on cloud computing | |
CN110417868A (en) | A kind of cloud computing system | |
CN111191253A (en) | Data encryption combination method | |
CN112134872B (en) | Network system with multi-application-layer cloud computing function | |
CN114760602A (en) | Holographic communication method, device, system and computer readable storage medium | |
CN111414341B (en) | Data normalization description method in Internet of things environment | |
CN112073223B (en) | System and method for managing and controlling operation of cloud computing terminal and cloud server | |
CN107040921A (en) | One kind is based on point-to-point SMS encryption system | |
CN116204357B (en) | Mobile phone terminal data backup method and system based on hong Monte-go system | |
Chen et al. | Optimal resource allocation for multimedia applications offloading in mobile edge computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |