CN116894272B - Cloud computing system data processing method based on high-speed encryption technology - Google Patents
Cloud computing system data processing method based on high-speed encryption technology Download PDFInfo
- Publication number
- CN116894272B CN116894272B CN202311155173.6A CN202311155173A CN116894272B CN 116894272 B CN116894272 B CN 116894272B CN 202311155173 A CN202311155173 A CN 202311155173A CN 116894272 B CN116894272 B CN 116894272B
- Authority
- CN
- China
- Prior art keywords
- data
- sequence
- value
- index
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000005516 engineering process Methods 0.000 title claims abstract description 16
- 238000003672 processing method Methods 0.000 title claims abstract description 11
- 238000000034 method Methods 0.000 claims abstract description 20
- 239000011159 matrix material Substances 0.000 claims description 45
- 230000004044 response Effects 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 8
- 238000006073 displacement reaction Methods 0.000 claims description 6
- 238000003384 imaging method Methods 0.000 claims description 6
- 238000012163 sequencing technique Methods 0.000 claims description 6
- 239000006185 dispersion Substances 0.000 claims description 4
- 238000010276 construction Methods 0.000 claims description 3
- 238000013500 data storage Methods 0.000 claims description 3
- 238000005070 sampling Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 abstract description 4
- 230000005012 migration Effects 0.000 abstract description 2
- 238000013508 migration Methods 0.000 abstract description 2
- 230000004308 accommodation Effects 0.000 abstract 3
- 238000004891 communication Methods 0.000 description 5
- 230000007480 spreading Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/214—Database migration support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2272—Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Automation & Control Theory (AREA)
- Power Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a cloud computing system data processing method based on a high-speed encryption technology, which is characterized in that source data is at least classified into first data, second data and third data according to database types; establishing a direct index relationship with respect to the first data and the second data; establishing an indirect index relationship with respect to the first data and the second data; migrating the fourth data into the accommodating pool, and simultaneously injecting the second data into the backup pool to generate direct access data and indirect access data of the second data; an accommodation index is constructed for the accommodation pool and the backup pool, the accommodation index being configured to index indirect access data. The application realizes multiple encryption and access in the process of system data migration and backup, establishes different access modes and decryption modes, and realizes multiple protection of system data.
Description
Technical Field
The application belongs to the technical field of data transmission, and particularly relates to a network data transmission method and device of a high-speed encryption algorithm.
Background
Along with the progress of socialization, network data transmission becomes an indispensable social communication tool in society, but network data security transmission has long been a concern, along with the gradual increase of data security requirements, and the gradual increase of computing power of the existing personal computing terminals, the requirement of data transmission under a new encryption algorithm is generated.
Disclosure of Invention
Therefore, the application provides a cloud computing system data processing method based on a high-speed encryption technology, so as to solve encryption requirements in network data transmission.
The application provides a cloud computing system data processing method based on a high-speed encryption technology, which comprises the following steps:
acquiring source data;
classifying the source data into at least first data, second data and third data according to the database type;
the first data is database header data, the second data is a data storage bit, and the third data is a preset update bit;
establishing a direct index between the first data and the second data:
the second data is indexed by at least one first data through an index value, and the index value of the second data is recorded in the header of the first data;
establishing an indirect index between the first data and the second data:
injecting the first data into a first backup pool, adding noise into the first data to obtain fourth data, and migrating the fourth data to an initial storage bit of the first data;
the noise is generated by encrypting the index value through a first encryption algorithm, and the noise value is recorded in the header of the fourth data;
and injecting the fourth data into the first backup pool, simultaneously injecting the second data into the second backup pool, and generating direct access data and indirect access data of the second data.
Further, when the parallel noise processing is executed;
acquiring index response time of the first data for indexing a plurality of second data with an index value;
sequencing the index response time to generate a first index time sequence, and calculating the poisson rate of a sub-sequence slice in the index time sequence corresponding to a first preset time period in a fixed time interval to obtain a first poisson value;
performing graphic binarization scattering on the index value according to the first poisson value to obtain a distribution sequence, and calculating a scattered data value;
or alternatively
Acquiring index response time when the second data is indexed by a plurality of the first data;
sequencing the index response time to generate a second index time sequence, and calculating the poisson rate of a sub-sequence slice in the corresponding index time sequence in a second preset time period in a fixed time interval to obtain a second poisson value;
graphically dispersing the index value according to the second poisson value, and calculating a dispersed data value;
repeatedly sampling the poisson value for preset times according to the obtained data value, calculating the repetition rate of each imaging scattering, and obtaining common noise according to the repetition rate and all the imaging scattering values;
the common noise is written into the fourth data.
Further, the patterned spreading includes the steps of:
and establishing a two-dimensional image comprising a preset pixel lattice, wherein the preset pixel number of the two-dimensional image is equal to the total data byte amount of the second data corresponding to the poisson value when the graphical dispersion occurs.
Further, when indirect access data based on the second data is generated, constructing an original data sequence related to the first data and the second data;
each sequence unit of the original data sequence is expressed as a first data # second data # sequence padding bit;
generating a first encryption sequence and a key sequence according to the original data sequence, wherein the total number of bytes of sequence units in the key sequence is larger than that of the first encryption sequence;
each sequence unit of the first encryption sequence is expressed as a first data #second data shift value #encryption value;
the second data shift value is the byte number of the adjacent unit or the interval unit of the preset bit number of the sequence unit to the moving position of the sequence unit;
wherein, # is a preset fill bit.
Further, when indirect access data based on second data is generated, constructing an original data matrix related to the first data and the second data;
each matrix unit of the original data matrix is expressed as first data # second data;
generating a key matrix and a first encryption matrix according to the original data matrix sequence, wherein the number of bytes of a matrix unit in the key matrix is larger than that of the original data matrix;
each matrix element of the first encryption matrix is expressed as a first data # second data shift value;
the second data shift value is a shift byte of an adjacent row unit or an adjacent column unit of the matrix unit to the matrix unit.
Further, the construction of the shift byte is any one of the following settings:
direct displacement;
and (5) displacement.
Further, adding a random number at the tail of the unit byte, wherein the random number is the decimal number of the mobile byte; if the missing unit exists in the matrix after the matrix is moved, filling the corresponding original unit at the unit.
Further, the first encryption algorithm is a sha encryption algorithm.
In a second aspect of the present application, there is provided a cloud computing system data processing apparatus based on high-speed encryption technology, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method provided in the first aspect of the present application when executing the program.
Compared with the prior art, the technical scheme provided by the application has the following advantages:
according to the application, through an encryption algorithm, different access modes and decryption modes are established for multiple encryption and access in the system data migration process, and multiple protection of system data is realized.
Drawings
FIG. 1 is a flow chart of a method according to a first embodiment of the present application;
fig. 2 is a schematic structural diagram of a device according to a second embodiment of the present application.
Detailed Description
So that the manner in which the features and techniques of the disclosed embodiments can be understood in more detail, a more particular description of the embodiments of the disclosure, briefly summarized below, may be had by reference to the appended drawings, which are not intended to be limiting of the embodiments of the disclosure. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may still be practiced without these details. In other instances, well-known structures and devices may be shown simplified in order to simplify the drawing.
Example 1
The embodiment provides a cloud computing system data processing method based on a high-speed encryption technology, as shown in fig. 1, comprising the following steps:
acquiring source data;
classifying the source data into at least first data, second data and third data according to the database type;
the first data is database header data, the second data is a data storage bit, and the third data is a preset update bit;
establishing a direct index between the first data and the second data:
the second data is indexed by at least one first data through an index value, and the index value of the second data is recorded in the header of the first data;
establishing an indirect index between the first data and the second data:
injecting the first data into a first backup pool, adding noise into the first data to obtain fourth data, and migrating the fourth data to an initial storage bit of the first data;
the noise is generated by encrypting the index value through a first encryption algorithm, and the noise value is recorded in the header of the fourth data;
and injecting the fourth data into the first backup pool, simultaneously injecting the second data into the second backup pool, and generating direct access data and indirect access data of the second data.
Further, when the parallel noise processing is executed;
acquiring index response time of the first data for indexing a plurality of second data with an index value;
sequencing the index response time to generate a first index time sequence, and calculating the poisson rate of a sub-sequence slice in the index time sequence corresponding to a first preset time period in a fixed time interval to obtain a first poisson value;
performing graphic binarization scattering on the index value according to the first poisson value to obtain a distribution sequence, and calculating a scattered data value;
or alternatively
Acquiring index response time when the second data is indexed by a plurality of the first data;
sequencing the index response time to generate a second index time sequence, and calculating the poisson rate of a sub-sequence slice in the corresponding index time sequence in a second preset time period in a fixed time interval to obtain a second poisson value;
graphically dispersing the index value according to the second poisson value, and calculating a dispersed data value;
repeatedly sampling the poisson value for preset times according to the obtained data value, calculating the repetition rate of each imaging scattering, and obtaining common noise according to the repetition rate and all the imaging scattering values;
the common noise is written into the fourth data.
Further, the patterned spreading includes the steps of:
and establishing a two-dimensional image comprising a preset pixel lattice, wherein the preset pixel number of the two-dimensional image is equal to the total data byte amount of the second data corresponding to the poisson value when the graphical dispersion occurs.
Further, when indirect access data based on the second data is generated, constructing an original data sequence related to the first data and the second data;
each sequence unit of the original data sequence is expressed as a first data # second data # sequence padding bit;
generating a first encryption sequence and a key sequence according to the original data sequence, wherein the total number of bytes of sequence units in the key sequence is larger than that of the first encryption sequence;
each sequence unit of the first encryption sequence is expressed as a first data #second data shift value #encryption value;
the second data shift value is the byte number of the adjacent unit or the interval unit of the preset bit number of the sequence unit to the moving position of the sequence unit;
wherein, # is a preset fill bit.
Further, when indirect access data based on second data is generated, constructing an original data matrix related to the first data and the second data;
each matrix unit of the original data matrix is expressed as first data # second data;
generating a key matrix and a first encryption matrix according to the original data matrix sequence, wherein the number of bytes of a matrix unit in the key matrix is larger than that of the original data matrix;
each matrix element of the first encryption matrix is expressed as a first data # second data shift value;
the second data shift value is a shift byte of an adjacent row unit or an adjacent column unit of the matrix unit to the matrix unit.
Further, the construction of the shift byte is any one of the following settings:
direct displacement;
and (5) displacement.
Further, adding a random number at the tail of the unit byte, wherein the random number is the decimal number of the mobile byte; if the missing unit exists in the matrix after the matrix is moved, filling the corresponding original unit at the unit.
Further, the first encryption algorithm is a sha encryption algorithm.
In one option of the embodiments of the present disclosure, the first encryption algorithm is a SHA encryption algorithm, and it is worth to say that the setting of the first encryption algorithm is.
Example two
As shown in connection with fig. 2, an embodiment of the present disclosure provides a network data transmission apparatus based on a high-speed encryption algorithm, including a processor (processor) 30 and a memory (memory) 31. Optionally, the electronic device may also include a communication interface (communication interface) 32 and a bus 33. The processor 30, the communication interface 32, and the memory 31 may communicate with each other via the bus 33. The communication interface 32 may be used for information transfer. Processor 30 may invoke logic instructions in memory 31 to perform the value co-creation based cloud computing system data processing method of the enterprise based on high-speed encryption technology of the above embodiments.
The disclosed embodiments provide a storage medium storing computer executable instructions configured to perform the foregoing value co-creation based cloud computing system data processing method for enterprises based on high-speed encryption technology.
The storage medium may be a transitory computer readable storage medium or a non-transitory computer readable storage medium. A non-transitory storage medium comprising: a plurality of media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or a transitory storage medium.
The above description and the drawings illustrate embodiments of the disclosure sufficiently to enable those skilled in the art to practice them. Other embodiments may involve structural, logical, electrical, process, and other changes. The embodiments represent only possible variations. Individual components and acts are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in, or substituted for, those of others. Moreover, the terminology used in the present application is for the purpose of describing embodiments only and is not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a," "an," and "the" (the) are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this disclosure is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, when used in the present disclosure, the terms "comprises," "comprising," and/or variations thereof, mean that the recited features, integers, steps, operations, elements, and/or components are present, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising one …" does not exclude the presence of other like elements in a process, method or apparatus comprising such elements. In this context, each embodiment may be described with emphasis on the differences from the other embodiments, and the same similar parts between the various embodiments may be referred to each other. For the methods, products, etc. disclosed in the embodiments, if they correspond to the method sections disclosed in the embodiments, the description of the method sections may be referred to for relevance.
Claims (9)
1. The cloud computing system data processing method based on the high-speed encryption technology is characterized by comprising the following steps of:
acquiring source data;
classifying the source data into at least first data, second data and third data according to the database type;
the first data is database header data, the second data is a data storage bit, and the third data is a preset update bit;
establishing a direct index between the first data and the second data:
the second data is indexed by at least one first data through an index value, and the index value of the second data is recorded in the header of the first data;
establishing an indirect index between the first data and the second data:
injecting the first data into a first backup pool, adding noise into the first data to obtain fourth data, and migrating the fourth data to an initial storage bit of the first data;
the noise is generated by encrypting the index value through a first encryption algorithm, and the noise value is recorded in the header of the fourth data;
and injecting the fourth data into the first backup pool, simultaneously injecting the second data into the second backup pool, and generating direct access data and indirect access data of the second data.
2. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 1, wherein when parallel noise processing is performed;
acquiring index response time of the first data for indexing a plurality of second data with an index value;
sequencing the index response time to generate a first index time sequence, and calculating the poisson rate of a sub-sequence slice in the index time sequence corresponding to a first preset time period in a fixed time interval to obtain a first poisson value;
performing graphic binarization scattering on the index value according to the first poisson value to obtain a distribution sequence, and calculating a scattered data value;
or alternatively
Acquiring index response time when the second data is indexed by a plurality of the first data;
sequencing the index response time to generate a second index time sequence, and calculating the poisson rate of a sub-sequence slice in the corresponding index time sequence in a second preset time period in a fixed time interval to obtain a second poisson value;
graphically dispersing the index value according to the second poisson value, and calculating a dispersed data value;
repeatedly sampling the poisson value for preset times according to the obtained data value, calculating the repetition rate of each imaging scattering, and obtaining common noise according to the repetition rate and all the imaging scattering values;
the common noise is written into the fourth data.
3. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 2, wherein the graphical dispersion comprises the steps of:
and establishing a two-dimensional image comprising a preset pixel lattice, wherein the preset pixel number of the two-dimensional image is equal to the total data byte amount of the second data corresponding to the poisson value when the graphical dispersion occurs.
4. A cloud computing system data processing method based on a high-speed encryption technique according to claim 3, wherein when indirect access data based on second data is generated, an original data sequence concerning the first data and the second data is constructed;
each sequence unit of the original data sequence is expressed as a first data # second data # sequence padding bit;
generating a first encryption sequence and a key sequence according to the original data sequence, wherein the total number of bytes of sequence units in the key sequence is larger than that of the first encryption sequence;
each sequence unit of the first encryption sequence is expressed as a first data #second data shift value #encryption value;
the second data shift value is the byte number of the adjacent unit or the interval unit of the preset bit number of the sequence unit to the moving position of the sequence unit;
wherein, # is a preset fill bit.
5. A cloud computing system data processing method based on a high-speed encryption technique according to claim 3, wherein when indirect access data based on second data is generated, an original data matrix concerning the first data and the second data is constructed;
each matrix unit of the original data matrix is expressed as first data # second data;
generating a key matrix and a first encryption matrix according to the original data matrix sequence, wherein the number of bytes of a matrix unit in the key matrix is larger than that of the original data matrix;
each matrix element of the first encryption matrix is expressed as a first data # second data shift value;
the second data shift value is a shift byte of an adjacent row unit or an adjacent column unit of the matrix unit to the matrix unit;
wherein, # is a preset fill bit.
6. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 5, wherein the construction of the shift byte is any one of the following settings:
direct displacement;
and (5) displacement.
7. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 6, wherein a nonce is added at the end of the unit byte, the nonce being a decimal number of a moving byte; if the missing unit exists in the matrix after the matrix is moved, filling the corresponding original unit at the unit.
8. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 7, wherein the first encryption algorithm is a sha encryption algorithm.
9. A network data transmission device based on a high-speed encryption algorithm, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, said processor implementing the method according to any one of claims 1 to 7 when executing said program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311155173.6A CN116894272B (en) | 2023-09-08 | 2023-09-08 | Cloud computing system data processing method based on high-speed encryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311155173.6A CN116894272B (en) | 2023-09-08 | 2023-09-08 | Cloud computing system data processing method based on high-speed encryption technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116894272A CN116894272A (en) | 2023-10-17 |
CN116894272B true CN116894272B (en) | 2023-11-28 |
Family
ID=88312425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311155173.6A Active CN116894272B (en) | 2023-09-08 | 2023-09-08 | Cloud computing system data processing method based on high-speed encryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116894272B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117201198B (en) * | 2023-11-07 | 2024-01-26 | 北京数盾信息科技有限公司 | Distributed high-speed encryption computing method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104412266A (en) * | 2012-06-29 | 2015-03-11 | 诺基亚公司 | Method and apparatus for multidimensional data storage and file system with a dynamic ordered tree structure |
CN109903212A (en) * | 2019-01-28 | 2019-06-18 | 郑州轻工业学院 | A kind of image encryption method based on H Geometric Fractal and Hilbert curve |
CN110138561A (en) * | 2019-03-22 | 2019-08-16 | 西安电子科技大学 | Efficient cipher text retrieval method, the cloud computing service system automatically corrected based on CP-ABE |
CN114531220A (en) * | 2022-01-12 | 2022-05-24 | 重庆邮电大学 | Efficient fault-tolerant dynamic phrase searching method based on forward privacy and backward privacy |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10805281B2 (en) * | 2017-09-25 | 2020-10-13 | Palo Alto Research Center Incorporated | System and method for secure two-party evaluation of utility of sharing data |
EP3961508A1 (en) * | 2020-08-31 | 2022-03-02 | Xephor Solutions GmbH | System and method for data processing and computation |
-
2023
- 2023-09-08 CN CN202311155173.6A patent/CN116894272B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104412266A (en) * | 2012-06-29 | 2015-03-11 | 诺基亚公司 | Method and apparatus for multidimensional data storage and file system with a dynamic ordered tree structure |
CN109903212A (en) * | 2019-01-28 | 2019-06-18 | 郑州轻工业学院 | A kind of image encryption method based on H Geometric Fractal and Hilbert curve |
CN110138561A (en) * | 2019-03-22 | 2019-08-16 | 西安电子科技大学 | Efficient cipher text retrieval method, the cloud computing service system automatically corrected based on CP-ABE |
CN114531220A (en) * | 2022-01-12 | 2022-05-24 | 重庆邮电大学 | Efficient fault-tolerant dynamic phrase searching method based on forward privacy and backward privacy |
Also Published As
Publication number | Publication date |
---|---|
CN116894272A (en) | 2023-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116894272B (en) | Cloud computing system data processing method based on high-speed encryption technology | |
CN111177302B (en) | Service bill processing method, device, computer equipment and storage medium | |
CN106209739A (en) | Cloud storage method and system | |
DE102011010613A1 (en) | A method of storing and restoring data, using the methods in a storage cloud, storage server and computer program product | |
EP2779522B1 (en) | Configurable key-based data shuffling and encryption | |
CN108199828B (en) | Method and device for encrypting color picture | |
CN105320613A (en) | Systems and methods for dynamic data storage | |
CN110704854B (en) | Stream type encryption method aiming at text data reserved format | |
CN105279198A (en) | Data table storage method, data table modification method, data table query method and data table statistical method | |
CN111611621A (en) | Block chain based distributed data encryption storage method and electronic equipment | |
EP3522137B1 (en) | Secure equijoin system, secure equijoin device, secure equijoin method, and program | |
US10700934B2 (en) | Communication control device, communication control method, and computer program product | |
CN111898135A (en) | Data processing method, data processing apparatus, computer device, and medium | |
US9442890B2 (en) | Distribution apparatus, restoration apparatus, distribution method, restoration method, and distribution and restoration system | |
CN109446827B (en) | Data encryption and decryption method and system | |
CN115858322A (en) | Log data processing method and device and computer equipment | |
WO2013080290A1 (en) | Data dividing device and data dividing program | |
CN111368316B (en) | File encryption and decryption method and device | |
JP4789536B2 (en) | Data division apparatus, data division method, and computer program | |
CN113645025A (en) | Data encryption storage method, storage device, user equipment and storage medium | |
DE112016006318T5 (en) | Method for accelerated secure data storage capabilities | |
CN114301588B (en) | Key generation method and device and electronic equipment | |
CN113965314B (en) | Homomorphic encryption processing method and related equipment | |
CN117201198B (en) | Distributed high-speed encryption computing method | |
JP6397564B2 (en) | Image file distribution device, image file restoration device, method thereof, program thereof, and recording medium storing the program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |