CN114785591A - Encrypted information management system based on big data - Google Patents

Encrypted information management system based on big data Download PDF

Info

Publication number
CN114785591A
CN114785591A CN202210423849.4A CN202210423849A CN114785591A CN 114785591 A CN114785591 A CN 114785591A CN 202210423849 A CN202210423849 A CN 202210423849A CN 114785591 A CN114785591 A CN 114785591A
Authority
CN
China
Prior art keywords
module
encryption
information
data
algorithm encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210423849.4A
Other languages
Chinese (zh)
Inventor
冯小龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210423849.4A priority Critical patent/CN114785591A/en
Publication of CN114785591A publication Critical patent/CN114785591A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encrypted information management system based on big data, which comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module respectively, and the information receiving module is electrically connected with the response time calculation module; the system comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information, and the system also comprises a server resource allocation module.

Description

Encrypted information management system based on big data
Technical Field
The invention relates to the technical field of big data, in particular to an encryption information management system based on big data.
Background
The management of information relates to information encryption, the information encryption relates to a symmetric algorithm and an asymmetric algorithm, and a special example of the symmetric algorithm is a disposable messy code book. The method provides a long and unique key for each piece of sent information to encrypt and decrypt, the algorithm speed is high, the key management cost is high, and server resources are occupied. The asymmetric algorithm, namely the encryption information and the decryption information adopt different keys. The method has the characteristics that double keys are adopted, the key management cost is extremely low, the method is suitable for large-scale network application, but the algorithm speed is low, and the practicability is poor. Therefore, it is necessary to design a big data-based encryption information management system having high practicability.
Disclosure of Invention
The present invention is directed to providing a big data-based encryption information management system to solve the problems set forth in the background art described above.
In order to solve the technical problems, the invention provides the following technical scheme: the encrypted information management system based on the big data comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module, and the information receiving module is electrically connected with the response time calculation module;
the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, and the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information.
According to the technical scheme, the system further comprises a server resource distribution module, wherein the server resource distribution module is electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module;
the server resource allocation module is used for allocating server resources occupied by the symmetric algorithm encryption and the asymmetric algorithm encryption.
According to the technical scheme, the system specifically comprises the following steps;
s1, when the server starts to work, the data to be encrypted is received into the server through the information receiving module;
s2, calculating the decryption time under two encryption modes under the condition that the memory size of the current information is calculated by using the response time calculation module, if the decryption time does not exceed a set value, encrypting by using the asymmetric algorithm encryption module, and if the decryption time exceeds the set value, encrypting by using the symmetric algorithm encryption module;
and S3, the encrypted information is transmitted to the data storage module for storage, so that the information is convenient to be subsequently processed.
According to the technical scheme, the working process of the server resource allocation module is as follows:
and S4, distributing the encryption workload proportion born by the symmetric algorithm encryption module and the asymmetric algorithm encryption module according to the corresponding time calculated by the response time calculation module, and transmitting the information to be encrypted to the symmetric algorithm encryption module and the asymmetric algorithm encryption module for cooperative encryption.
According to the above technical solution, in the step S4, the specific allocation method of the encryption workload proportion is as follows:
s4-1, when the amount of information to be encrypted is small, namely the decryption time estimated by the response time calculation module is less than a first-order set value, encrypting by using the asymmetric algorithm encryption module;
s4-2, when the amount of information to be encrypted begins to increase, namely the decryption time estimated by the response time calculation module is greater than a first-order set value and less than a second-order set value, reducing the proportion of the asymmetric algorithm encryption module for processing the encryption tasks and increasing the proportion of the symmetric algorithm encryption module for processing the encryption tasks;
s4-3, when the amount of information to be encrypted is large, namely the decryption time estimated by the response time calculation module is larger than a second-order set value, the symmetric algorithm encryption module is completely used for processing the encryption task.
According to the above technical solution, in the step S4-2, the allocation formula of the encryption task is:
Figure BDA0003607673140000031
wherein A is0A is the information amount of the encryption task processed by the symmetric algorithm encryption module, and A is the information amount of the total information amount needing encryption1Maximum value of information quantity, p, for processing encryption tasks by asymmetric algorithm encryption module0Decryption time, p, being a second order setting1The decryption time estimated for the response time calculation module.
According to the technical scheme, the data storage module comprises a data compression module and a data decompression module, and the data compression module and the data decompression module are both electrically connected with the asymmetric algorithm encryption module and the symmetric algorithm encryption module;
the data compression module is used for compressing and storing the encrypted data in the server to save occupied volume, and the data decompression module is used for decompressing the data before decryption to facilitate decryption.
According to the above technical solution, the compression information ratio α of the data compression module is related to the task ratio processed by the symmetric algorithm encryption module and the asymmetric algorithm encryption module, that is, the more information encrypted by the symmetric algorithm, the higher the compression information ratio α of the data compression module is, specifically:
α=A/A1k, where k is a scaling factor.
Compared with the prior art, the invention has the following beneficial effects: according to the invention, a technology combining a symmetric algorithm and an asymmetric algorithm is adopted, different instantaneous weights are given to the two encryption algorithms, the instantaneous weights are distributed according to the response time requirements of customers on the use scenes, a proper encryption information method distribution proportion is given to each scene, and the consumption of server resources can be reduced while the algorithm speed is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic overall principle of the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1, the present invention provides the following technical solutions: the encrypted information management system based on big data comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module, and the information receiving module is electrically connected with the response time calculation module;
the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, and the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information;
the server resource allocation module is electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module;
the server resource allocation module is used for allocating server resources occupied by the symmetric algorithm encryption and the asymmetric algorithm encryption;
the system specifically comprises the following steps;
s1, when the server starts to work, the data to be encrypted is received into the server through the information receiving module;
s2, calculating the decryption time under two encryption modes under the condition that the memory size of the current information is calculated by using the response time calculation module, if the decryption time does not exceed a set value, encrypting by using the asymmetric algorithm encryption module, and if the decryption time exceeds the set value, encrypting by using the symmetric algorithm encryption module;
s3, the encrypted information is transmitted to a data storage module for storage, so that the information is convenient to be subsequently processed;
the working process of the server resource allocation module is as follows:
s4, distributing the encryption workload proportion born by the symmetric algorithm encryption module and the asymmetric algorithm encryption module according to the corresponding time calculated by the response time calculation module, and transmitting the information to be encrypted to the symmetric algorithm encryption module and the asymmetric algorithm encryption module for cooperative encryption;
in the step S4, the specific allocation method of the encryption workload proportion includes:
s4-1, when the amount of information to be encrypted is small, namely the decryption time estimated by the response time calculation module is less than a first-order set value, encrypting by using an asymmetric algorithm encryption module;
s4-2, when the amount of information to be encrypted begins to increase, namely the decryption time estimated by the response time calculation module is greater than a first-order set value and less than a second-order set value, reducing the proportion of the asymmetric algorithm encryption module for processing the encryption tasks and increasing the proportion of the symmetric algorithm encryption module for processing the encryption tasks;
s4-3, when the amount of information to be encrypted is large, namely the decryption time estimated by the response time calculation module is larger than a second-order set value, completely utilizing the symmetric algorithm encryption module to process the encryption task;
in the step S4-2, the allocation formula of the encryption task is:
Figure BDA0003607673140000051
wherein A is0For the total amount of information to be encrypted, A is the amount of encryption task information processed by the symmetric algorithm encryption module, A1Maximum value of information quantity, p, for processing encryption tasks by asymmetric algorithm encryption module0Decryption time, p, being a second order setting1Calculating an estimated decryption time for the response time;
the data storage module comprises a data compression module and a data decompression module, and the data compression module and the data decompression module are both electrically connected with the asymmetric algorithm encryption module and the symmetric algorithm encryption module;
the data compression module is used for compressing and storing the encrypted data in the server to save occupied volume, and the data decompression module is used for decompressing the data before decryption to facilitate decryption;
the compression information ratio alpha of the data compression module is related to the task ratio processed by the symmetric algorithm encryption module and the asymmetric algorithm encryption module, that is, the more information encrypted by the symmetric algorithm, the higher the compression information ratio alpha of the data compression module is, specifically:
α=A/A1k, wherein k is a proportionality coefficient; the technology of combining a symmetric algorithm and an asymmetric algorithm is adopted, different instantaneous weights are given to the two encryption algorithms, the instantaneous weights are distributed according to the response time requirements of customers on the use scenes, a proper encryption information method distribution proportion is given to each scene, and the consumption of server resources can be reduced while the algorithm speed is improved.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. Big data-based encrypted information management system, characterized in that: the system comprises a symmetric algorithm encryption module, an asymmetric algorithm encryption module, an information receiving module, a data storage module and a response time calculation module, wherein the information receiving module and the data storage module are electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module respectively, and the information receiving module is electrically connected with the response time calculation module;
the symmetric algorithm encryption module is used for encrypting by using a unique secret key, the asymmetric algorithm encryption module is used for encrypting by using double keys, the information receiving module is used for receiving information to be encrypted, the data storage module is used for storing the encrypted information, and the response time calculation module is used for estimating decryption time of two encryption modes according to the number of bytes of the information.
2. The big-data based encryption information management system according to claim 1, wherein: the system also comprises a server resource distribution module which is electrically connected with the symmetric algorithm encryption module and the asymmetric algorithm encryption module;
the server resource allocation module is used for allocating server resources occupied by the symmetric algorithm encryption and the asymmetric algorithm encryption.
3. The big-data based encryption information management system according to claim 2, wherein: the system specifically comprises the following steps;
s1, when the server starts to work, the data to be encrypted is received into the server through the information receiving module;
s2, calculating the decryption time under two encryption modes under the condition that the memory size of the current information is calculated by using the response time calculation module, if the decryption time does not exceed a set value, encrypting by using the asymmetric algorithm encryption module, and if the decryption time exceeds the set value, encrypting by using the symmetric algorithm encryption module;
and S3, the encrypted information is transmitted to a data storage module for storage, so that the information is convenient to be subsequently processed.
4. The big-data based encryption information management system according to claim 3, wherein: the working process of the server resource allocation module is as follows:
and S4, distributing the encryption workload proportion born by the symmetric algorithm encryption module and the asymmetric algorithm encryption module according to the corresponding time calculated by the response time calculation module, and transmitting the information to be encrypted to the symmetric algorithm encryption module and the asymmetric algorithm encryption module for cooperative encryption.
5. The big-data-based encryption information management system according to claim 4, wherein: in the step S4, the specific allocation method of the encryption workload proportion includes:
s4-1, when the amount of information to be encrypted is small, namely the decryption time estimated by the response time calculation module is less than a first-order set value, encrypting by using the asymmetric algorithm encryption module;
s4-2, when the amount of information to be encrypted begins to increase, namely the decryption time estimated by the response time calculation module is greater than a first-order set value and less than a second-order set value, reducing the proportion of the asymmetric algorithm encryption module for processing the encryption tasks and increasing the proportion of the symmetric algorithm encryption module for processing the encryption tasks;
s4-3, when the amount of information to be encrypted is large, namely the decryption time estimated by the response time calculation module is larger than a second-order set value, the symmetric algorithm encryption module is completely used for processing the encryption task.
6. The big-data-based encryption information management system according to claim 5, wherein: in step S4-2, the allocation formula of the encryption task is:
Figure FDA0003607673130000021
wherein A is0A is the information amount of the encryption task processed by the symmetric algorithm encryption module, and A is the information amount of the total information amount needing encryption1Maximum value of information quantity, p, for processing encryption tasks by asymmetric algorithm encryption module0Decryption time, p, being a second order setting1The decryption time estimated for the response time calculation module.
7. The big-data based encryption information management system according to claim 6, wherein: the data storage module comprises a data compression module and a data decompression module, and the data compression module and the data decompression module are both electrically connected with the asymmetric algorithm encryption module and the symmetric algorithm encryption module;
the data compression module is used for compressing and storing the encrypted data in the server to save occupied volume, and the data decompression module is used for decompressing the data before decryption to facilitate decryption.
8. The big-data-based encryption information management system according to claim 7, wherein: the compression information ratio alpha of the data compression module is related to the task ratio processed by the symmetric algorithm encryption module and the asymmetric algorithm encryption module, that is, the more the information encrypted by the symmetric algorithm, the higher the information ratio alpha compressed by the data compression module, specifically:
α=A/A1k, wherein k is a scaling factor.
CN202210423849.4A 2022-04-21 2022-04-21 Encrypted information management system based on big data Pending CN114785591A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210423849.4A CN114785591A (en) 2022-04-21 2022-04-21 Encrypted information management system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210423849.4A CN114785591A (en) 2022-04-21 2022-04-21 Encrypted information management system based on big data

Publications (1)

Publication Number Publication Date
CN114785591A true CN114785591A (en) 2022-07-22

Family

ID=82431073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210423849.4A Pending CN114785591A (en) 2022-04-21 2022-04-21 Encrypted information management system based on big data

Country Status (1)

Country Link
CN (1) CN114785591A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201919030U (en) * 2010-12-10 2011-08-03 航天信息股份有限公司 System for storing and managing network files
US20200259647A1 (en) * 2019-02-12 2020-08-13 Nxm Labs Canada Inc. Quantum-augmentable hybrid encryption system and method
CN112966284A (en) * 2021-03-26 2021-06-15 知印信息技术(天津)有限公司 File encryption and decryption method and system and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201919030U (en) * 2010-12-10 2011-08-03 航天信息股份有限公司 System for storing and managing network files
US20200259647A1 (en) * 2019-02-12 2020-08-13 Nxm Labs Canada Inc. Quantum-augmentable hybrid encryption system and method
CN112966284A (en) * 2021-03-26 2021-06-15 知印信息技术(天津)有限公司 File encryption and decryption method and system and computer readable storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
丁丙胜: ""对称密码和非对称密码在无线传感器网络中应用研究"", 《北部湾大学学报》, 20 February 2020 (2020-02-20), pages 2 - 3 *
单康康;江肖强;: "混合加密机制降低计算复杂度", 中国教育网络, no. 1, 5 March 2011 (2011-03-05) *
周金杰;: "一种基于基础安全机制构建的组合加密安全方案", 科技传播, no. 14, 23 July 2012 (2012-07-23) *
金宁;张道远;高建桥;王赵峰;: "对称密码和非对称密码算法在无线传感器网络中应用研究", 传感技术学报, no. 06, 15 June 2011 (2011-06-15), pages 3 *

Similar Documents

Publication Publication Date Title
CN1322699C (en) Indirect public-key encryption
CN107154945A (en) A kind of cloudy fragmentation method for secure storing and system based on correcting and eleting codes
Liu et al. Mobile-edge computing framework with data compression for wireless network in energy internet
GB2324449A (en) Key replacement in a public key cryptosystem
CN113765660B (en) Method for distributing quantum keys of terminal equipment of Internet of things on demand
CN103152346B (en) The method for secret protection of mass users, server and system
CN115146285A (en) File encryption and decryption method and device
CN110300159A (en) A kind of sensing cloud data safety low cost storage method based on edge calculations
CN110505062A (en) A kind of Dynamic Oval curve cryptographic methods applied to alliance's chain
CN114125831B (en) 5G smart grid user side data acquisition method and system based on proxy re-encryption
CN110378128A (en) Data ciphering method, device and terminal device
CN108737353B (en) Data encryption method and device based on data analysis system
CN109491591A (en) A kind of information diffusion method suitable for cloudy storage system
CN114785591A (en) Encrypted information management system based on big data
CN111798236A (en) Transaction data encryption and decryption method, device and equipment
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN110417868A (en) A kind of cloud computing system
CN111191253A (en) Data encryption combination method
CN112134872B (en) Network system with multi-application-layer cloud computing function
CN114760602A (en) Holographic communication method, device, system and computer readable storage medium
CN111414341B (en) Data normalization description method in Internet of things environment
CN112073223B (en) System and method for managing and controlling operation of cloud computing terminal and cloud server
CN107040921A (en) One kind is based on point-to-point SMS encryption system
CN116204357B (en) Mobile phone terminal data backup method and system based on hong Monte-go system
Chen et al. Optimal resource allocation for multimedia applications offloading in mobile edge computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination