期刊文献+

基于大数据分析的用户信息多重加密存储技术 被引量:13

Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis
在线阅读 下载PDF
导出
摘要 在大数据的分析中,当前方法对信息进行加密存储时,主要以线性微分求解对混合加密存储方法进行优化。在对密钥进行扩展的过程中,信息链路加密存储的信息出现非线性的突变,造成加密存储的信息安全性较低。鉴于此,提出一种基于超带宽的用户信息多重加密存储方法。利用混沌映射给用户信息增加反破解的保护外壳,以达到大数据分析下用户信息多重加密的目的,克服了当前方法存在的弊端,降低了加密信息存储产生的非线性突变。利用超带宽多重加密存储技术对用户信息进行多重加密存储,有效地增强了加密存储信息的抗攻击性,提高了用户信息多重加密存储的安全性,完成了对基于大数据分析的用户信息多重加密存储技术的研究。实验结果表明,利用该方法进行信息的多重加密存储提高了信息的安全性。 In the analysis of big data,when information is encrypted and stored,the method of linear differential solution is used to optimize the mixed encrypted storage method.In the process of the key expansion,information encrypted and stored in information link has a nonlinear mutation,resulting in low security of the encrypted storage.This paper proposed a multiple encrypted storage method for user information based on ultra bandwidth.Chaos mapping is used to increase the protection shell of user information to achieve the purpose of multiple encryption of user information under big data analysis.The disadvantages of current methods are overcomed,and the nonlinear mutation of encrypted information storage is reduced.Multiple encrypted storage is implemented for user information by using super bandwidth multiple encryption storage technology,which effectively enhances the anti-attack of the encrypted storage information,improves the security of the multiple encrypted storage of the user information,and completes the research on multiple encrypted storage technology of the user information based on big data analysis.The experimental results show that the security of information is improved by using this method to store multiple encrypted information.
作者 陈贵平 王子牛 CHEN Gui-ping;WANG Zi-niu(School of Big Data and Computer Science,Guizhou Normal University,Guiyang 550001,China;College of Big Data and Information Engineering,Guizhou University,Guiyang 550025,China)
出处 《计算机科学》 CSCD 北大核心 2018年第7期150-153,共4页 Computer Science
基金 2016年贵州省科学技术协会研究项目:基于大数据技术的黔归人才现状分析与研究(201602号) 贵州省教育厅高等学校人文社会科学研究项目:贵州高校师范类毕业生教师专业发展状况研究(13GH052号)资助
关键词 大数据分析 用户信息 加密存储技术 混沌参数调制映射 Big data analysis User information Encrypted storage technology Chaos parameter modulation mapping
  • 相关文献

参考文献11

二级参考文献107

  • 1牛德华,马建峰,马卓,李辰楠,王蕾.基于属性的安全增强云存储访问控制方案[J].通信学报,2013,34(S1):276-284. 被引量:12
  • 2邹德清,金海,羌卫中,等.云计算安全挑战与实践[J].中国计算机学会通讯,2011,7(12):55-61.
  • 3SEAH W K G, ZHI ANG EU, TAN H. Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) - survey and challenges [ C] // Wireless VITAE 2009: Proceedings of the 1st In- ternational Conference on Wireless Communication, Vehicular Tech- nology, Information Theory and Aerospace & Electronic SystemsTechnology. Piscataway: IEEE, 2009:1-5.
  • 4CHI K, ZHU Y, CHENG Z. Network coding based mesh-under mu- ting in 6LoWPAN with high end-to-end packet delivery rate [ C]// MSN 2012: Proceedings of the 2012 Eighth International Conference on Mobile Ad-Hoc and Sensor Networks. Piscataway: IEEE, 2012: 1-5.
  • 5SROUJI M S, WANG Z, HENKEL J. RDTS: a reliable erasure- coding based data transfer scheme for wireless sensor networks [ C]//ICPADS 2011 : Proceedings of the 2011 IEEE 17th Interna- tional Conference on Parallel and Distributed Systems. Piscataway: IEEE, 2011:481-488.
  • 6JAMES A, MADHUKUMAR A S, KURNIAWAN E, et al. Per- formance analysis of fountain codes in multihop relay networks [ J]. IEEE Transactions on Vehicular Technology, 2013, 62(9): 4379 - 4391.
  • 7KANSAL A, HSU J, ZAHEDI S, et al. Power management in ener- gy harvesting sensor networks [ J]. ACM Transactions on EmbeddedComputing Systems, 2007, 6(4) : Article No. 32.
  • 8PIORNO J R, BERGONZINI C, ATIENZA D, et al. Prediction and management in energy harvested wireless sensor nodes [ C]//Wire- less VITAE 2009: Proceedings of the 1 st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology. Piscataway: IEEE, 2009: 6- 10.
  • 9CHIN K, PHAM D, PANG C. Markovian models for harvested en- ergy in wireless communications [ C]// ICCS 2010: Proceedings of the 2010 IEEE International Conference on Communication Systems. Piscataway: IEEE, 2010:311-315.
  • 10LIN L, SHROFF N B, SRIKANT R. Asymptotically optimal energy- aware routing for multihop wireless networks with renewable energy sources [ J]. IEEE/ACM Transactions on Networking, 2007, 15 (5) : 1021 - 1034.

共引文献83

同被引文献140

引证文献13

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部