计算机科学 ›› 2018, Vol. 45 ›› Issue (7): 150-153.doi: 10.11896/j.issn.1002-137X.2018.07.025
陈贵平1,王子牛2
CHEN Gui-ping1,WANG Zi-niu2
摘要: 在大数据的分析中,当前方法对信息进行加密存储时,主要以线性微分求解对混合加密存储方法进行优化。在对密钥进行扩展的过程中,信息链路加密存储的信息出现非线性的突变,造成加密存储的信息安全性较低。鉴于此,提出一种基于超带宽的用户信息多重加密存储方法。利用混沌映射给用户信息增加反破解的保护外壳,以达到大数据分析下用户信息多重加密的目的,克服了当前方法存在的弊端,降低了加密信息存储产生的非线性突变。利用超带宽多重加密存储技术对用户信息进行多重加密存储,有效地增强了加密存储信息的抗攻击性,提高了用户信息多重加密存储的安全性,完成了对基于大数据分析的用户信息多重加密存储技术的研究。实验结果表明,利用该方法进行信息的多重加密存储提高了信息的安全性。
中图分类号:
[1]SONG K,WU H J.Cloud storage based on privacy protection and efficient micro-encryption scheme[J].Application of Electronic Technique,2016,42(7):111-113.(in Chinese) 宋可,吴宏建.云存储中基于隐私保护的高效的微型加密方案[J].电子技术应用,2016,42(7):111-113. [2]LEI L,CAI Q W,JING J W,et al.Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding[J].Journal of Software,2016,27(6):1432-1450.(in Chinese) 雷蕾,蔡权伟,荆继武,等.支持策略隐藏的加密云存储访问控制机制[J].软件学报,2016,27(6):1432-1450. [3]LI J,LI J F,FANG F.Research of File Encryption Storage and Deletion Mechanism in Cloud Storage[J].Journal of Chinese Computer Systems,2015,36(4):836-839.(in Chinese) 李杰,李景峰,房方.云存储中文件加密存储和删除方法研究[J].小型微型计算机系统,2015,36(4):836-839. [4]PAN Q H.A Double Thread Complementary Information En-cryption Algorithm Based on Random Amplitude Modulation[J].Bulletin of Science and Technology,2015,31(12):144-146.(in Chinese) 潘期辉.采用随机码幅度调制的双线程互补信息加密算法[J].科技通报,2015,31(12):144-146. [5]WANG S,LU Y,CHEN L Y.Research of mixed encryption algorithm in cloud storage[J].Electronic Design Engineering,2016,24(23):54-57.(in Chinese) 王双,卢昱,陈立云.云存储中的混合加密算法研究[J].电子设计工程,2016,24(23):54-57. [6]CHENG X X,HAN X Z,CHEN X J,et al.An Optimization Encryption Algorithm for Cloud Storage and Its Simulation[J].Computer Simulation,2016,33(4):356-359.(in Chinese) 程肖肖,韩宪忠,陈雪蛟,等.一种用于云存储的优化加密算法的研究与仿真[J].计算机仿真,2016,33(4):356-359. [7]LU Y,WANG S,CHEN L Y.Research of Mixed Encryption Algorithm Based on Cloud Storage[J].Computer Measurement &Control,2016,24(3):129-132.(in Chinese) 卢昱,王双,陈立云.基于云存储的混合加密算法研究[J].计算机测量与控制,2016,24(3):129-132. [8]HANG T X,DING J Y.A Cloud-storage Privilege RevokingOptimizing Mechanism Based on Dynamic Re-encryption[J].Science Technology and Engineering,2015,15(20):108-115.(in Chinese) 韩同欣,丁建元.基于动态重加密的云计算存储平台权限撤销优化机制[J].科学技术与工程,2015,15(20):108-115. [9]DU Z H,ZHU W Y.Implementation of secure data retrieval schema in cloud storage by using ABE technology[J].Application Research of Computers,2016,33(3):860-865.(in Chinese) 杜朝晖,朱文耀.云存储中利用属性基加密技术的安全数据检索方案[J].计算机应用研究,2016,33(3):860-865. [10]QIU S W,LI Y Y.Reliable data delivery with low delay in energy harvesting wireless sensor network[J].Journal of Computer Applications,2015,35(2):345-350.(in Chinese) 邱树伟,李琰琰.能量捕获无线传感器网络中低时延的可靠数据传递[J].计算机应用,2015,35(2):345-350. [11]HU X D,CAI D Q.Design and research of secure encryptionclustering algorithm for wireless sensor networks.Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2009,21(3):421-424.(in Chinese) 胡向东,蔡东强.无线传感器网络安全加密成簇算法的设计及研究.重庆邮电大学学报(自然科学版),2009,21(3):421-424. |
[1] | 常庚, 赵岚, 陈文. MLSTM:一种基于多序列长度LSTM的口令猜测方法 MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM 计算机科学, 2022, 49(4): 354-361. https://doi.org/10.11896/jsjkx.210300008 |
[2] | 谢志杰, 张旻, 李振汉, 王红军. 基于攻击算法的海量真实用户口令数据分析 Analysis of Large-scale Real User Password Data Based on Cracking Algorithms 计算机科学, 2020, 47(11): 48-54. https://doi.org/10.11896/jsjkx.200900077 |
[3] | 冯贵兰, 李正楠, 周文刚. 大数据分析技术在网络领域中的研究综述 Research on Application of Big Data Analytics in Network 计算机科学, 2019, 46(6): 1-20. https://doi.org/10.11896/j.issn.1002-137X.2019.06.001 |
[4] | 张建安. 基于移动切换认证的分层异构网络中的用户敏感信息隐藏方法 Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication 计算机科学, 2019, 46(3): 217-220. https://doi.org/10.11896/j.issn.1002-137X.2019.03.032 |
[5] | 刘桂阳,郭欣桐,席桂清,刘金明. 昆虫标本图像的多角度采集与三维观察 Multi Angle Acquisition and 3D Observation of Insect Specimen Image 计算机科学, 2016, 43(Z6): 239-241. https://doi.org/10.11896/j.issn.1002-137X.2016.6A.058 |
[6] | 佘侃侃,胡孔法,王珍. 基于加权变精度容差粗糙集模型的属性约简及应用研究 Research and Application on Reduction of Weighted Variable Precision Model Based on Tolerance Theory 计算机科学, 2014, 41(Z11): 351-353. |
[7] | 谢铭,吴产乐. 用户信息保护下的学习资源知识点自动提取 Topic Extracting with User Information Protection on Web 计算机科学, 2011, 38(3): 203-205. |
[8] | 蔡登 卢增祥 李衍达. 信息协同过滤 计算机科学, 2002, 29(6): 1-4. |
|