CN116894272B - Cloud computing system data processing method based on high-speed encryption technology - Google Patents

Cloud computing system data processing method based on high-speed encryption technology Download PDF

Info

Publication number
CN116894272B
CN116894272B CN202311155173.6A CN202311155173A CN116894272B CN 116894272 B CN116894272 B CN 116894272B CN 202311155173 A CN202311155173 A CN 202311155173A CN 116894272 B CN116894272 B CN 116894272B
Authority
CN
China
Prior art keywords
data
sequence
value
index
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311155173.6A
Other languages
Chinese (zh)
Other versions
CN116894272A (en
Inventor
朱云
李元骅
可为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shudun Information Technology Co ltd
Original Assignee
Beijing Shudun Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shudun Information Technology Co ltd filed Critical Beijing Shudun Information Technology Co ltd
Priority to CN202311155173.6A priority Critical patent/CN116894272B/en
Publication of CN116894272A publication Critical patent/CN116894272A/en
Application granted granted Critical
Publication of CN116894272B publication Critical patent/CN116894272B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/214Database migration support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2272Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Automation & Control Theory (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a cloud computing system data processing method based on a high-speed encryption technology, which is characterized in that source data is at least classified into first data, second data and third data according to database types; establishing a direct index relationship with respect to the first data and the second data; establishing an indirect index relationship with respect to the first data and the second data; migrating the fourth data into the accommodating pool, and simultaneously injecting the second data into the backup pool to generate direct access data and indirect access data of the second data; an accommodation index is constructed for the accommodation pool and the backup pool, the accommodation index being configured to index indirect access data. The application realizes multiple encryption and access in the process of system data migration and backup, establishes different access modes and decryption modes, and realizes multiple protection of system data.

Description

Cloud computing system data processing method based on high-speed encryption technology
Technical Field
The application belongs to the technical field of data transmission, and particularly relates to a network data transmission method and device of a high-speed encryption algorithm.
Background
Along with the progress of socialization, network data transmission becomes an indispensable social communication tool in society, but network data security transmission has long been a concern, along with the gradual increase of data security requirements, and the gradual increase of computing power of the existing personal computing terminals, the requirement of data transmission under a new encryption algorithm is generated.
Disclosure of Invention
Therefore, the application provides a cloud computing system data processing method based on a high-speed encryption technology, so as to solve encryption requirements in network data transmission.
The application provides a cloud computing system data processing method based on a high-speed encryption technology, which comprises the following steps:
acquiring source data;
classifying the source data into at least first data, second data and third data according to the database type;
the first data is database header data, the second data is a data storage bit, and the third data is a preset update bit;
establishing a direct index between the first data and the second data:
the second data is indexed by at least one first data through an index value, and the index value of the second data is recorded in the header of the first data;
establishing an indirect index between the first data and the second data:
injecting the first data into a first backup pool, adding noise into the first data to obtain fourth data, and migrating the fourth data to an initial storage bit of the first data;
the noise is generated by encrypting the index value through a first encryption algorithm, and the noise value is recorded in the header of the fourth data;
and injecting the fourth data into the first backup pool, simultaneously injecting the second data into the second backup pool, and generating direct access data and indirect access data of the second data.
Further, when the parallel noise processing is executed;
acquiring index response time of the first data for indexing a plurality of second data with an index value;
sequencing the index response time to generate a first index time sequence, and calculating the poisson rate of a sub-sequence slice in the index time sequence corresponding to a first preset time period in a fixed time interval to obtain a first poisson value;
performing graphic binarization scattering on the index value according to the first poisson value to obtain a distribution sequence, and calculating a scattered data value;
or alternatively
Acquiring index response time when the second data is indexed by a plurality of the first data;
sequencing the index response time to generate a second index time sequence, and calculating the poisson rate of a sub-sequence slice in the corresponding index time sequence in a second preset time period in a fixed time interval to obtain a second poisson value;
graphically dispersing the index value according to the second poisson value, and calculating a dispersed data value;
repeatedly sampling the poisson value for preset times according to the obtained data value, calculating the repetition rate of each imaging scattering, and obtaining common noise according to the repetition rate and all the imaging scattering values;
the common noise is written into the fourth data.
Further, the patterned spreading includes the steps of:
and establishing a two-dimensional image comprising a preset pixel lattice, wherein the preset pixel number of the two-dimensional image is equal to the total data byte amount of the second data corresponding to the poisson value when the graphical dispersion occurs.
Further, when indirect access data based on the second data is generated, constructing an original data sequence related to the first data and the second data;
each sequence unit of the original data sequence is expressed as a first data # second data # sequence padding bit;
generating a first encryption sequence and a key sequence according to the original data sequence, wherein the total number of bytes of sequence units in the key sequence is larger than that of the first encryption sequence;
each sequence unit of the first encryption sequence is expressed as a first data #second data shift value #encryption value;
the second data shift value is the byte number of the adjacent unit or the interval unit of the preset bit number of the sequence unit to the moving position of the sequence unit;
wherein, # is a preset fill bit.
Further, when indirect access data based on second data is generated, constructing an original data matrix related to the first data and the second data;
each matrix unit of the original data matrix is expressed as first data # second data;
generating a key matrix and a first encryption matrix according to the original data matrix sequence, wherein the number of bytes of a matrix unit in the key matrix is larger than that of the original data matrix;
each matrix element of the first encryption matrix is expressed as a first data # second data shift value;
the second data shift value is a shift byte of an adjacent row unit or an adjacent column unit of the matrix unit to the matrix unit.
Further, the construction of the shift byte is any one of the following settings:
direct displacement;
and (5) displacement.
Further, adding a random number at the tail of the unit byte, wherein the random number is the decimal number of the mobile byte; if the missing unit exists in the matrix after the matrix is moved, filling the corresponding original unit at the unit.
Further, the first encryption algorithm is a sha encryption algorithm.
In a second aspect of the present application, there is provided a cloud computing system data processing apparatus based on high-speed encryption technology, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method provided in the first aspect of the present application when executing the program.
Compared with the prior art, the technical scheme provided by the application has the following advantages:
according to the application, through an encryption algorithm, different access modes and decryption modes are established for multiple encryption and access in the system data migration process, and multiple protection of system data is realized.
Drawings
FIG. 1 is a flow chart of a method according to a first embodiment of the present application;
fig. 2 is a schematic structural diagram of a device according to a second embodiment of the present application.
Detailed Description
So that the manner in which the features and techniques of the disclosed embodiments can be understood in more detail, a more particular description of the embodiments of the disclosure, briefly summarized below, may be had by reference to the appended drawings, which are not intended to be limiting of the embodiments of the disclosure. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may still be practiced without these details. In other instances, well-known structures and devices may be shown simplified in order to simplify the drawing.
Example 1
The embodiment provides a cloud computing system data processing method based on a high-speed encryption technology, as shown in fig. 1, comprising the following steps:
acquiring source data;
classifying the source data into at least first data, second data and third data according to the database type;
the first data is database header data, the second data is a data storage bit, and the third data is a preset update bit;
establishing a direct index between the first data and the second data:
the second data is indexed by at least one first data through an index value, and the index value of the second data is recorded in the header of the first data;
establishing an indirect index between the first data and the second data:
injecting the first data into a first backup pool, adding noise into the first data to obtain fourth data, and migrating the fourth data to an initial storage bit of the first data;
the noise is generated by encrypting the index value through a first encryption algorithm, and the noise value is recorded in the header of the fourth data;
and injecting the fourth data into the first backup pool, simultaneously injecting the second data into the second backup pool, and generating direct access data and indirect access data of the second data.
Further, when the parallel noise processing is executed;
acquiring index response time of the first data for indexing a plurality of second data with an index value;
sequencing the index response time to generate a first index time sequence, and calculating the poisson rate of a sub-sequence slice in the index time sequence corresponding to a first preset time period in a fixed time interval to obtain a first poisson value;
performing graphic binarization scattering on the index value according to the first poisson value to obtain a distribution sequence, and calculating a scattered data value;
or alternatively
Acquiring index response time when the second data is indexed by a plurality of the first data;
sequencing the index response time to generate a second index time sequence, and calculating the poisson rate of a sub-sequence slice in the corresponding index time sequence in a second preset time period in a fixed time interval to obtain a second poisson value;
graphically dispersing the index value according to the second poisson value, and calculating a dispersed data value;
repeatedly sampling the poisson value for preset times according to the obtained data value, calculating the repetition rate of each imaging scattering, and obtaining common noise according to the repetition rate and all the imaging scattering values;
the common noise is written into the fourth data.
Further, the patterned spreading includes the steps of:
and establishing a two-dimensional image comprising a preset pixel lattice, wherein the preset pixel number of the two-dimensional image is equal to the total data byte amount of the second data corresponding to the poisson value when the graphical dispersion occurs.
Further, when indirect access data based on the second data is generated, constructing an original data sequence related to the first data and the second data;
each sequence unit of the original data sequence is expressed as a first data # second data # sequence padding bit;
generating a first encryption sequence and a key sequence according to the original data sequence, wherein the total number of bytes of sequence units in the key sequence is larger than that of the first encryption sequence;
each sequence unit of the first encryption sequence is expressed as a first data #second data shift value #encryption value;
the second data shift value is the byte number of the adjacent unit or the interval unit of the preset bit number of the sequence unit to the moving position of the sequence unit;
wherein, # is a preset fill bit.
Further, when indirect access data based on second data is generated, constructing an original data matrix related to the first data and the second data;
each matrix unit of the original data matrix is expressed as first data # second data;
generating a key matrix and a first encryption matrix according to the original data matrix sequence, wherein the number of bytes of a matrix unit in the key matrix is larger than that of the original data matrix;
each matrix element of the first encryption matrix is expressed as a first data # second data shift value;
the second data shift value is a shift byte of an adjacent row unit or an adjacent column unit of the matrix unit to the matrix unit.
Further, the construction of the shift byte is any one of the following settings:
direct displacement;
and (5) displacement.
Further, adding a random number at the tail of the unit byte, wherein the random number is the decimal number of the mobile byte; if the missing unit exists in the matrix after the matrix is moved, filling the corresponding original unit at the unit.
Further, the first encryption algorithm is a sha encryption algorithm.
In one option of the embodiments of the present disclosure, the first encryption algorithm is a SHA encryption algorithm, and it is worth to say that the setting of the first encryption algorithm is.
Example two
As shown in connection with fig. 2, an embodiment of the present disclosure provides a network data transmission apparatus based on a high-speed encryption algorithm, including a processor (processor) 30 and a memory (memory) 31. Optionally, the electronic device may also include a communication interface (communication interface) 32 and a bus 33. The processor 30, the communication interface 32, and the memory 31 may communicate with each other via the bus 33. The communication interface 32 may be used for information transfer. Processor 30 may invoke logic instructions in memory 31 to perform the value co-creation based cloud computing system data processing method of the enterprise based on high-speed encryption technology of the above embodiments.
The disclosed embodiments provide a storage medium storing computer executable instructions configured to perform the foregoing value co-creation based cloud computing system data processing method for enterprises based on high-speed encryption technology.
The storage medium may be a transitory computer readable storage medium or a non-transitory computer readable storage medium. A non-transitory storage medium comprising: a plurality of media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or a transitory storage medium.
The above description and the drawings illustrate embodiments of the disclosure sufficiently to enable those skilled in the art to practice them. Other embodiments may involve structural, logical, electrical, process, and other changes. The embodiments represent only possible variations. Individual components and acts are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in, or substituted for, those of others. Moreover, the terminology used in the present application is for the purpose of describing embodiments only and is not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a," "an," and "the" (the) are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this disclosure is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, when used in the present disclosure, the terms "comprises," "comprising," and/or variations thereof, mean that the recited features, integers, steps, operations, elements, and/or components are present, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising one …" does not exclude the presence of other like elements in a process, method or apparatus comprising such elements. In this context, each embodiment may be described with emphasis on the differences from the other embodiments, and the same similar parts between the various embodiments may be referred to each other. For the methods, products, etc. disclosed in the embodiments, if they correspond to the method sections disclosed in the embodiments, the description of the method sections may be referred to for relevance.

Claims (9)

1. The cloud computing system data processing method based on the high-speed encryption technology is characterized by comprising the following steps of:
acquiring source data;
classifying the source data into at least first data, second data and third data according to the database type;
the first data is database header data, the second data is a data storage bit, and the third data is a preset update bit;
establishing a direct index between the first data and the second data:
the second data is indexed by at least one first data through an index value, and the index value of the second data is recorded in the header of the first data;
establishing an indirect index between the first data and the second data:
injecting the first data into a first backup pool, adding noise into the first data to obtain fourth data, and migrating the fourth data to an initial storage bit of the first data;
the noise is generated by encrypting the index value through a first encryption algorithm, and the noise value is recorded in the header of the fourth data;
and injecting the fourth data into the first backup pool, simultaneously injecting the second data into the second backup pool, and generating direct access data and indirect access data of the second data.
2. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 1, wherein when parallel noise processing is performed;
acquiring index response time of the first data for indexing a plurality of second data with an index value;
sequencing the index response time to generate a first index time sequence, and calculating the poisson rate of a sub-sequence slice in the index time sequence corresponding to a first preset time period in a fixed time interval to obtain a first poisson value;
performing graphic binarization scattering on the index value according to the first poisson value to obtain a distribution sequence, and calculating a scattered data value;
or alternatively
Acquiring index response time when the second data is indexed by a plurality of the first data;
sequencing the index response time to generate a second index time sequence, and calculating the poisson rate of a sub-sequence slice in the corresponding index time sequence in a second preset time period in a fixed time interval to obtain a second poisson value;
graphically dispersing the index value according to the second poisson value, and calculating a dispersed data value;
repeatedly sampling the poisson value for preset times according to the obtained data value, calculating the repetition rate of each imaging scattering, and obtaining common noise according to the repetition rate and all the imaging scattering values;
the common noise is written into the fourth data.
3. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 2, wherein the graphical dispersion comprises the steps of:
and establishing a two-dimensional image comprising a preset pixel lattice, wherein the preset pixel number of the two-dimensional image is equal to the total data byte amount of the second data corresponding to the poisson value when the graphical dispersion occurs.
4. A cloud computing system data processing method based on a high-speed encryption technique according to claim 3, wherein when indirect access data based on second data is generated, an original data sequence concerning the first data and the second data is constructed;
each sequence unit of the original data sequence is expressed as a first data # second data # sequence padding bit;
generating a first encryption sequence and a key sequence according to the original data sequence, wherein the total number of bytes of sequence units in the key sequence is larger than that of the first encryption sequence;
each sequence unit of the first encryption sequence is expressed as a first data #second data shift value #encryption value;
the second data shift value is the byte number of the adjacent unit or the interval unit of the preset bit number of the sequence unit to the moving position of the sequence unit;
wherein, # is a preset fill bit.
5. A cloud computing system data processing method based on a high-speed encryption technique according to claim 3, wherein when indirect access data based on second data is generated, an original data matrix concerning the first data and the second data is constructed;
each matrix unit of the original data matrix is expressed as first data # second data;
generating a key matrix and a first encryption matrix according to the original data matrix sequence, wherein the number of bytes of a matrix unit in the key matrix is larger than that of the original data matrix;
each matrix element of the first encryption matrix is expressed as a first data # second data shift value;
the second data shift value is a shift byte of an adjacent row unit or an adjacent column unit of the matrix unit to the matrix unit;
wherein, # is a preset fill bit.
6. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 5, wherein the construction of the shift byte is any one of the following settings:
direct displacement;
and (5) displacement.
7. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 6, wherein a nonce is added at the end of the unit byte, the nonce being a decimal number of a moving byte; if the missing unit exists in the matrix after the matrix is moved, filling the corresponding original unit at the unit.
8. The method for processing data of a cloud computing system based on a high-speed encryption technology according to claim 7, wherein the first encryption algorithm is a sha encryption algorithm.
9. A network data transmission device based on a high-speed encryption algorithm, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, said processor implementing the method according to any one of claims 1 to 7 when executing said program.
CN202311155173.6A 2023-09-08 2023-09-08 Cloud computing system data processing method based on high-speed encryption technology Active CN116894272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311155173.6A CN116894272B (en) 2023-09-08 2023-09-08 Cloud computing system data processing method based on high-speed encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311155173.6A CN116894272B (en) 2023-09-08 2023-09-08 Cloud computing system data processing method based on high-speed encryption technology

Publications (2)

Publication Number Publication Date
CN116894272A CN116894272A (en) 2023-10-17
CN116894272B true CN116894272B (en) 2023-11-28

Family

ID=88312425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311155173.6A Active CN116894272B (en) 2023-09-08 2023-09-08 Cloud computing system data processing method based on high-speed encryption technology

Country Status (1)

Country Link
CN (1) CN116894272B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117201198B (en) * 2023-11-07 2024-01-26 北京数盾信息科技有限公司 Distributed high-speed encryption computing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104412266A (en) * 2012-06-29 2015-03-11 诺基亚公司 Method and apparatus for multidimensional data storage and file system with a dynamic ordered tree structure
CN109903212A (en) * 2019-01-28 2019-06-18 郑州轻工业学院 A kind of image encryption method based on H Geometric Fractal and Hilbert curve
CN110138561A (en) * 2019-03-22 2019-08-16 西安电子科技大学 Efficient cipher text retrieval method, the cloud computing service system automatically corrected based on CP-ABE
CN114531220A (en) * 2022-01-12 2022-05-24 重庆邮电大学 Efficient fault-tolerant dynamic phrase searching method based on forward privacy and backward privacy

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10805281B2 (en) * 2017-09-25 2020-10-13 Palo Alto Research Center Incorporated System and method for secure two-party evaluation of utility of sharing data
EP3961508A1 (en) * 2020-08-31 2022-03-02 Xephor Solutions GmbH System and method for data processing and computation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104412266A (en) * 2012-06-29 2015-03-11 诺基亚公司 Method and apparatus for multidimensional data storage and file system with a dynamic ordered tree structure
CN109903212A (en) * 2019-01-28 2019-06-18 郑州轻工业学院 A kind of image encryption method based on H Geometric Fractal and Hilbert curve
CN110138561A (en) * 2019-03-22 2019-08-16 西安电子科技大学 Efficient cipher text retrieval method, the cloud computing service system automatically corrected based on CP-ABE
CN114531220A (en) * 2022-01-12 2022-05-24 重庆邮电大学 Efficient fault-tolerant dynamic phrase searching method based on forward privacy and backward privacy

Also Published As

Publication number Publication date
CN116894272A (en) 2023-10-17

Similar Documents

Publication Publication Date Title
CN116894272B (en) Cloud computing system data processing method based on high-speed encryption technology
CN111177302B (en) Service bill processing method, device, computer equipment and storage medium
CN106209739A (en) Cloud storage method and system
DE102011010613A1 (en) A method of storing and restoring data, using the methods in a storage cloud, storage server and computer program product
EP2779522B1 (en) Configurable key-based data shuffling and encryption
CN108199828B (en) Method and device for encrypting color picture
CN105320613A (en) Systems and methods for dynamic data storage
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN105279198A (en) Data table storage method, data table modification method, data table query method and data table statistical method
CN111611621A (en) Block chain based distributed data encryption storage method and electronic equipment
EP3522137B1 (en) Secure equijoin system, secure equijoin device, secure equijoin method, and program
US10700934B2 (en) Communication control device, communication control method, and computer program product
CN111898135A (en) Data processing method, data processing apparatus, computer device, and medium
US9442890B2 (en) Distribution apparatus, restoration apparatus, distribution method, restoration method, and distribution and restoration system
CN109446827B (en) Data encryption and decryption method and system
CN115858322A (en) Log data processing method and device and computer equipment
WO2013080290A1 (en) Data dividing device and data dividing program
CN111368316B (en) File encryption and decryption method and device
JP4789536B2 (en) Data division apparatus, data division method, and computer program
CN113645025A (en) Data encryption storage method, storage device, user equipment and storage medium
DE112016006318T5 (en) Method for accelerated secure data storage capabilities
CN114301588B (en) Key generation method and device and electronic equipment
CN113965314B (en) Homomorphic encryption processing method and related equipment
CN117201198B (en) Distributed high-speed encryption computing method
JP6397564B2 (en) Image file distribution device, image file restoration device, method thereof, program thereof, and recording medium storing the program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant