Computer Science ›› 2018, Vol. 45 ›› Issue (7): 150-153.doi: 10.11896/j.issn.1002-137X.2018.07.025

• Information Security • Previous Articles     Next Articles

Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis

CHEN Gui-ping1,WANG Zi-niu2   

  1. School of Big Data and Computer Science,Guizhou Normal University,Guiyang 550001,China1;
    College of Big Data and Information Engineering,Guizhou University,Guiyang 550025,China2
  • Received:2017-10-09 Online:2018-07-30 Published:2018-07-30

Abstract: In the analysis of big data,when information is encrypted and stored,the method of linear differential solution is used to optimize the mixed encrypted storage method.In the process of the key expansion,information encrypted and stored in information link has a nonlinear mutation,resulting in low security of the encrypted storage.This paper proposed a multiple encrypted storage method for user information based on ultra bandwidth.Chaos mapping is used to increase the protection shell of user information to achieve the purpose of multiple encryption of user information under big data analysis.The disadvantages of current methods are overcomed,and the nonlinear mutation of encrypted information storage is reduced.Multiple encrypted storage is implemented for user information by using super bandwidth multiple encryption storage technology,which effectively enhances the anti-attack of the encrypted storage information,improves the security of the multiple encrypted storage of the user information,and completes the research on multiple encrypted storage technology of the user information based on big data analysis.The experimental results show that the security of information is improved by using this method to store multiple encrypted information.

Key words: Big data analysis, Chaos parameter modulation mapping, Encrypted storage technology, User information

CLC Number: 

  • TP309
[1]SONG K,WU H J.Cloud storage based on privacy protection and efficient micro-encryption scheme[J].Application of Electronic Technique,2016,42(7):111-113.(in Chinese)
宋可,吴宏建.云存储中基于隐私保护的高效的微型加密方案[J].电子技术应用,2016,42(7):111-113.
[2]LEI L,CAI Q W,JING J W,et al.Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding[J].Journal of Software,2016,27(6):1432-1450.(in Chinese)
雷蕾,蔡权伟,荆继武,等.支持策略隐藏的加密云存储访问控制机制[J].软件学报,2016,27(6):1432-1450.
[3]LI J,LI J F,FANG F.Research of File Encryption Storage and Deletion Mechanism in Cloud Storage[J].Journal of Chinese Computer Systems,2015,36(4):836-839.(in Chinese)
李杰,李景峰,房方.云存储中文件加密存储和删除方法研究[J].小型微型计算机系统,2015,36(4):836-839.
[4]PAN Q H.A Double Thread Complementary Information En-cryption Algorithm Based on Random Amplitude Modulation[J].Bulletin of Science and Technology,2015,31(12):144-146.(in Chinese)
潘期辉.采用随机码幅度调制的双线程互补信息加密算法[J].科技通报,2015,31(12):144-146.
[5]WANG S,LU Y,CHEN L Y.Research of mixed encryption algorithm in cloud storage[J].Electronic Design Engineering,2016,24(23):54-57.(in Chinese)
王双,卢昱,陈立云.云存储中的混合加密算法研究[J].电子设计工程,2016,24(23):54-57.
[6]CHENG X X,HAN X Z,CHEN X J,et al.An Optimization Encryption Algorithm for Cloud Storage and Its Simulation[J].Computer Simulation,2016,33(4):356-359.(in Chinese)
程肖肖,韩宪忠,陈雪蛟,等.一种用于云存储的优化加密算法的研究与仿真[J].计算机仿真,2016,33(4):356-359.
[7]LU Y,WANG S,CHEN L Y.Research of Mixed Encryption Algorithm Based on Cloud Storage[J].Computer Measurement &Control,2016,24(3):129-132.(in Chinese)
卢昱,王双,陈立云.基于云存储的混合加密算法研究[J].计算机测量与控制,2016,24(3):129-132.
[8]HANG T X,DING J Y.A Cloud-storage Privilege RevokingOptimizing Mechanism Based on Dynamic Re-encryption[J].Science Technology and Engineering,2015,15(20):108-115.(in Chinese)
韩同欣,丁建元.基于动态重加密的云计算存储平台权限撤销优化机制[J].科学技术与工程,2015,15(20):108-115.
[9]DU Z H,ZHU W Y.Implementation of secure data retrieval schema in cloud storage by using ABE technology[J].Application Research of Computers,2016,33(3):860-865.(in Chinese)
杜朝晖,朱文耀.云存储中利用属性基加密技术的安全数据检索方案[J].计算机应用研究,2016,33(3):860-865.
[10]QIU S W,LI Y Y.Reliable data delivery with low delay in energy harvesting wireless sensor network[J].Journal of Computer Applications,2015,35(2):345-350.(in Chinese)
邱树伟,李琰琰.能量捕获无线传感器网络中低时延的可靠数据传递[J].计算机应用,2015,35(2):345-350.
[11]HU X D,CAI D Q.Design and research of secure encryptionclustering algorithm for wireless sensor networks.Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2009,21(3):421-424.(in Chinese)
胡向东,蔡东强.无线传感器网络安全加密成簇算法的设计及研究.重庆邮电大学学报(自然科学版),2009,21(3):421-424.
[1] CHANG Geng, ZHAO Lan, CHEN Wen. MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM [J]. Computer Science, 2022, 49(4): 354-361.
[2] XIE Zhi-jie, ZHANG Min, LI Zhen-han, WANG Hong-jun. Analysis of Large-scale Real User Password Data Based on Cracking Algorithms [J]. Computer Science, 2020, 47(11): 48-54.
[3] ZHANG Jian-an. Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication [J]. Computer Science, 2019, 46(3): 217-220.
[4] SHE Kan-kan,HU Kong-fa and WANG Zhen. Research and Application on Reduction of Weighted Variable Precision Model Based on Tolerance Theory [J]. Computer Science, 2014, 41(Z11): 351-353.
[5] JIN Jing. Research on Optimization of Sorting Algorithm under MapReduce [J]. Computer Science, 2014, 41(12): 155-159.
[6] XIE Ming,WU Chan-le. Topic Extracting with User Information Protection on Web [J]. Computer Science, 2011, 38(3): 203-205.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!