计算机科学 ›› 2018, Vol. 45 ›› Issue (7): 150-153.doi: 10.11896/j.issn.1002-137X.2018.07.025

• 信息安全 • 上一篇    下一篇

基于大数据分析的用户信息多重加密存储技术

陈贵平1,王子牛2   

  1. 贵州师范大学大数据与计算机科学学院 贵阳5500011;
    贵州大学大数据与信息工程学院 贵阳 5500252
  • 收稿日期:2017-10-09 出版日期:2018-07-30 发布日期:2018-07-30
  • 作者简介:陈贵平(1979-),男,硕士,副教授,主要研究方向为教育信息技术、大数据、信息安全,E-mail:jy203c@foxmail.com(通信作者);王子牛(1961-),男,硕士,副教授,主要研究方向为信息处理与分析。
  • 基金资助:
    本文受2016年贵州省科学技术协会研究项目:基于大数据技术的黔归人才现状分析与研究(201602号),贵州省教育厅高等学校人文社会科学研究项目:贵州高校师范类毕业生教师专业发展状况研究(13GH052号)资助。

Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis

CHEN Gui-ping1,WANG Zi-niu2   

  1. School of Big Data and Computer Science,Guizhou Normal University,Guiyang 550001,China1;
    College of Big Data and Information Engineering,Guizhou University,Guiyang 550025,China2
  • Received:2017-10-09 Online:2018-07-30 Published:2018-07-30

摘要: 在大数据的分析中,当前方法对信息进行加密存储时,主要以线性微分求解对混合加密存储方法进行优化。在对密钥进行扩展的过程中,信息链路加密存储的信息出现非线性的突变,造成加密存储的信息安全性较低。鉴于此,提出一种基于超带宽的用户信息多重加密存储方法。利用混沌映射给用户信息增加反破解的保护外壳,以达到大数据分析下用户信息多重加密的目的,克服了当前方法存在的弊端,降低了加密信息存储产生的非线性突变。利用超带宽多重加密存储技术对用户信息进行多重加密存储,有效地增强了加密存储信息的抗攻击性,提高了用户信息多重加密存储的安全性,完成了对基于大数据分析的用户信息多重加密存储技术的研究。实验结果表明,利用该方法进行信息的多重加密存储提高了信息的安全性。

关键词: 大数据分析, 混沌参数调制映射, 加密存储技术, 用户信息

Abstract: In the analysis of big data,when information is encrypted and stored,the method of linear differential solution is used to optimize the mixed encrypted storage method.In the process of the key expansion,information encrypted and stored in information link has a nonlinear mutation,resulting in low security of the encrypted storage.This paper proposed a multiple encrypted storage method for user information based on ultra bandwidth.Chaos mapping is used to increase the protection shell of user information to achieve the purpose of multiple encryption of user information under big data analysis.The disadvantages of current methods are overcomed,and the nonlinear mutation of encrypted information storage is reduced.Multiple encrypted storage is implemented for user information by using super bandwidth multiple encryption storage technology,which effectively enhances the anti-attack of the encrypted storage information,improves the security of the multiple encrypted storage of the user information,and completes the research on multiple encrypted storage technology of the user information based on big data analysis.The experimental results show that the security of information is improved by using this method to store multiple encrypted information.

Key words: Big data analysis, Chaos parameter modulation mapping, Encrypted storage technology, User information

中图分类号: 

  • TP309
[1]SONG K,WU H J.Cloud storage based on privacy protection and efficient micro-encryption scheme[J].Application of Electronic Technique,2016,42(7):111-113.(in Chinese)
宋可,吴宏建.云存储中基于隐私保护的高效的微型加密方案[J].电子技术应用,2016,42(7):111-113.
[2]LEI L,CAI Q W,JING J W,et al.Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding[J].Journal of Software,2016,27(6):1432-1450.(in Chinese)
雷蕾,蔡权伟,荆继武,等.支持策略隐藏的加密云存储访问控制机制[J].软件学报,2016,27(6):1432-1450.
[3]LI J,LI J F,FANG F.Research of File Encryption Storage and Deletion Mechanism in Cloud Storage[J].Journal of Chinese Computer Systems,2015,36(4):836-839.(in Chinese)
李杰,李景峰,房方.云存储中文件加密存储和删除方法研究[J].小型微型计算机系统,2015,36(4):836-839.
[4]PAN Q H.A Double Thread Complementary Information En-cryption Algorithm Based on Random Amplitude Modulation[J].Bulletin of Science and Technology,2015,31(12):144-146.(in Chinese)
潘期辉.采用随机码幅度调制的双线程互补信息加密算法[J].科技通报,2015,31(12):144-146.
[5]WANG S,LU Y,CHEN L Y.Research of mixed encryption algorithm in cloud storage[J].Electronic Design Engineering,2016,24(23):54-57.(in Chinese)
王双,卢昱,陈立云.云存储中的混合加密算法研究[J].电子设计工程,2016,24(23):54-57.
[6]CHENG X X,HAN X Z,CHEN X J,et al.An Optimization Encryption Algorithm for Cloud Storage and Its Simulation[J].Computer Simulation,2016,33(4):356-359.(in Chinese)
程肖肖,韩宪忠,陈雪蛟,等.一种用于云存储的优化加密算法的研究与仿真[J].计算机仿真,2016,33(4):356-359.
[7]LU Y,WANG S,CHEN L Y.Research of Mixed Encryption Algorithm Based on Cloud Storage[J].Computer Measurement &Control,2016,24(3):129-132.(in Chinese)
卢昱,王双,陈立云.基于云存储的混合加密算法研究[J].计算机测量与控制,2016,24(3):129-132.
[8]HANG T X,DING J Y.A Cloud-storage Privilege RevokingOptimizing Mechanism Based on Dynamic Re-encryption[J].Science Technology and Engineering,2015,15(20):108-115.(in Chinese)
韩同欣,丁建元.基于动态重加密的云计算存储平台权限撤销优化机制[J].科学技术与工程,2015,15(20):108-115.
[9]DU Z H,ZHU W Y.Implementation of secure data retrieval schema in cloud storage by using ABE technology[J].Application Research of Computers,2016,33(3):860-865.(in Chinese)
杜朝晖,朱文耀.云存储中利用属性基加密技术的安全数据检索方案[J].计算机应用研究,2016,33(3):860-865.
[10]QIU S W,LI Y Y.Reliable data delivery with low delay in energy harvesting wireless sensor network[J].Journal of Computer Applications,2015,35(2):345-350.(in Chinese)
邱树伟,李琰琰.能量捕获无线传感器网络中低时延的可靠数据传递[J].计算机应用,2015,35(2):345-350.
[11]HU X D,CAI D Q.Design and research of secure encryptionclustering algorithm for wireless sensor networks.Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2009,21(3):421-424.(in Chinese)
胡向东,蔡东强.无线传感器网络安全加密成簇算法的设计及研究.重庆邮电大学学报(自然科学版),2009,21(3):421-424.
[1] 常庚, 赵岚, 陈文.
MLSTM:一种基于多序列长度LSTM的口令猜测方法
MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM
计算机科学, 2022, 49(4): 354-361. https://doi.org/10.11896/jsjkx.210300008
[2] 谢志杰, 张旻, 李振汉, 王红军.
基于攻击算法的海量真实用户口令数据分析
Analysis of Large-scale Real User Password Data Based on Cracking Algorithms
计算机科学, 2020, 47(11): 48-54. https://doi.org/10.11896/jsjkx.200900077
[3] 冯贵兰, 李正楠, 周文刚.
大数据分析技术在网络领域中的研究综述
Research on Application of Big Data Analytics in Network
计算机科学, 2019, 46(6): 1-20. https://doi.org/10.11896/j.issn.1002-137X.2019.06.001
[4] 张建安.
基于移动切换认证的分层异构网络中的用户敏感信息隐藏方法
Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication
计算机科学, 2019, 46(3): 217-220. https://doi.org/10.11896/j.issn.1002-137X.2019.03.032
[5] 刘桂阳,郭欣桐,席桂清,刘金明.
昆虫标本图像的多角度采集与三维观察
Multi Angle Acquisition and 3D Observation of Insect Specimen Image
计算机科学, 2016, 43(Z6): 239-241. https://doi.org/10.11896/j.issn.1002-137X.2016.6A.058
[6] 佘侃侃,胡孔法,王珍.
基于加权变精度容差粗糙集模型的属性约简及应用研究
Research and Application on Reduction of Weighted Variable Precision Model Based on Tolerance Theory
计算机科学, 2014, 41(Z11): 351-353.
[7] 谢铭,吴产乐.
用户信息保护下的学习资源知识点自动提取
Topic Extracting with User Information Protection on Web
计算机科学, 2011, 38(3): 203-205.
[8] 蔡登 卢增祥 李衍达.
信息协同过滤

计算机科学, 2002, 29(6): 1-4.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!