期刊文献+

Hadoop平台下全局扩散性分组排列算法研究与实现

Study and implementation of block-encryption permutation algorithm based on Hadoop platform
下载PDF
导出
摘要 随着云计算技术的蓬勃发展,各种应用产生的数据量日益庞大,然而目前大规模数据集的安全并未得到充分保障。密码学是确保数据安全的有效手段,但是将传统加密方法直接应用于大数据加密存在安全隐患。提出了针对大规模数据集加密的排列算法,包括两方面工作:提出一种适用于大规模数据集的分组加密排列算法,对数据规模为2mN<2m+1的数据集,经过m+2轮加密可实现全局扩散;基于MapReduce编程模型,在Hadoop平台上实现了分组加密排列算法。理论分析与实验结果表明,该排列算法具有优异的全局扩散性。 With the development of the cloud-computing technology, the volume of data generated and processed by vari-ous applications is becoming increasingly large. However, the security of large-scale data sets is not well ensured currently. Although cryptography is an important tool to guarantee data security, secure problems occur when conventional encryp-tion algorithms are applied directly to large-scale data sets. In this paper, an algorithm for encrypting large-scale data sets is proposed. To implement this algorithm, it proposes a grading permutation algorithm for encrypting large-scale data sets. Global diffusion can be achieved for a data set with size of N (2mN〈2m+1) after the data set is encrypted for m+2 cycles. Then, the algorithm is implemented on the Hadoop platform based on the MapReduce programming model. Theoretical analyses and experiments show that this algorithm features splendid global diffusibility for large-scale data set encryption. Compared with traditional algorithms, the proposed algorithm has significant advantages in parallelism and computation efficiency.
作者 周庆 王宏
出处 《计算机工程与应用》 CSCD 2014年第20期91-95,129,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.61003246)
关键词 云计算 密码学 排列 扩散 HADOOP平台 MAPREDUCE cloud-computing cryptography permutation diffusion Hadoop platform MapReduce
  • 相关文献

参考文献13

  • 1Lynch C.Big data:how do your data grow?[J].Nature,2008,455:28-29.
  • 2Lohr S.The age of big data[N].New York Times,2012-02-11.
  • 3The digital universe in 2020:big data,bigger digital shadows,and biggest growth in the far east[EB/OL].[2013-05-15].http://www.emc.com/collateral/analyst-reports/idc-the-digitaluniverse-in-2020.pdf.
  • 4Weber S.Big data privacy and security challenges[C]//Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security,New York,USA,2012:1-2.
  • 5Manadhata P K.Big data for security:challenges,opportunities,and examples[C]//Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security,New York,USA,2012:3-4.
  • 6Li S,Li C,Lo K,et al.Cryptanalyzing an encryption scheme based on blind source separation[J].IEEE Transactions on Circuits and Systems,2008,55(4):1055-1063.
  • 7Awad A,Saadane A.Efficient chaotic permutations for image encryption algorithms[C]//Proceedings of the World Congress on Engineering,London,2010.
  • 8Indrakanti S P,Avadhani P S.Permutation based image encryption technique[J].International Journal of Computer Applications,2011,28(1):45-47.
  • 9周庆,胡月,廖晓峰.分组排列模式下图像加密算法的扩散性能分析与实现[J].电子与信息学报,2010,32(8):2015-2018. 被引量:1
  • 10Dean J,Ghemawat S.MapReduce:simplified data processing on large clusters[J].Communications of the ACM,2008,51(1):107-113.

二级参考文献20

  • 1刘家胜,黄贤武,朱灿焰,吕皖丽.基于m序列变换和混沌映射的图像加密算法[J].电子与信息学报,2007,29(6):1476-1479. 被引量:11
  • 2Chen L and Zhao D. Image encryption with fractional wavelet packet method, Optik, 2008, 119(6): 286-291.
  • 3Cheng H and Li X. Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 2000, 48(8): 2439-2451.
  • 4Bose R and Pathak S. A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Transactions on Circuits and Systems I, 2006, 53(4): 848-857.
  • 5Podesser M, Schmidt H, and Uhl A. Selective bitplane encryption for secure transmission of image data in mobile environments. Fifth IEEE Nordic signal processing symposium, Tromso-Trondheim. Norway, 2002.
  • 6Tong X J and Cui M G. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal Processing, 2009, 89(4): 480-491.
  • 7Maniccam S and Bourbakis N. Image and video encryption using SCAN patterns. Pattern Recognition, 2004, 37(4): 725-737.
  • 8Chen G, Zhao X Y, and Li J L. A self-adaptive algorithm on image encryption. Journal of Software, 2005, 16(11): 1975-1982.
  • 9Zhou Q, Wong K W, Liao X F, Xiang T, and Hu Y. Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons and Fractals, 2008, 38(4): 1081-1092.
  • 10Li S, Li C, Lo K, and Chen G. Cryptanalyzing an encryption scheme based on blind source separation. IEEE Transactions on Circuits and Systems, 2008, 55(4): 1055-1063.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部