期刊文献+

一种安全性高的医疗大数据隐私保护模型 被引量:8

A High Security Medical Big Data Privacy Protection Model
下载PDF
导出
摘要 为了改善国内医疗云数据存储与共享中患者隐私泄露问题,加快互联网+医疗与医疗云建设,提出一种针对医疗大数据安全共享的隐私保护模型。模型将数据共享过程划分为3个阶段,明确各部分功能。采用一种适合医疗云数据加密场景的RS-Blowfish混合加密算法用于模型数据传输,在数据安全共享的同时兼具数字加密及身份认证功能。增添明文与密钥的Z形置换,改善初始密钥安全性,增添密钥认证,将传统的RSA算法、Blowfish算法和SHA-256算法结合为一个整体。实验结果表明,RS-Blowfish混合加密算法在增强Blowfish安全性的同时,加密速度较3DES快30%,较AES快10%。 In order to improve the patient privacy leakage in the domestic medical cloud data storage and sharing,and accelerate the construction of the Internet + medical and medical cloud,this paper first proposes a privacy protection model for medical big data security sharing.Through the establishment of the model,the data sharing process is divided into three stages,and the role of each part in the model is clarified,so that the model has both digital encryption and identity authentication functions in the secure data sharing.Then for the medical cloud data encryption problem,an RS-Blowfish hybrid encryption algorithm suitable for medical scenarios is proposed for model data transmission.The algorithm first adds Z-shaped permutation of plaintext and key,improves the security of the initial key,and then adds key authentication.Finally,the traditional RSA algorithm,Blowfish algorithm and SHA-256 algorithm are combined into one.The experimental results show that the proposed RS-Blowfish hybrid encryption algorithm enhances the security of Blowfish,and the encryption speed has a 30% advantage over 3DES;compared with AES,it has a 10% advantage.
作者 刘浩然 LIU Hao-ran(College of Computer Science and Engineering,Shandong University of Science and Technology,Qingdao 266590,China)
出处 《软件导刊》 2019年第8期200-203,共4页 Software Guide
关键词 医疗大数据 隐私保护 密码学算法 数据安全 混合加密 medical big data privacy protection cryptography algorithms data security hybrid encryption
  • 相关文献

参考文献7

二级参考文献72

  • 1Stallings W.密码编码学与网络安全:原理与实践[M].孟庆树,王丽娜,傅建明,等译.北京:电子工业出版社,2006.
  • 2杨波.现代密码学[M].2版.北京:清华大学出版社,2007.
  • 3SCHNEIER B. Description of a new variable-length key,64 bit block cipher (Blowfish) [ C ]//Proc of FastSoftware Encryption, the Cambridge Security Workshop. London : Springer-Verlag, 1994 : 191-204.
  • 4MANZANARES A I,SIERRA C J M, MARQUEZ J T. On the implementation of security policies with adaptative encryption [J]. Computer Communications ,2006,29 ( 2 ) :2750-2758.
  • 5HARRIS S, ADAMS C. Key-dependent S-box manipulations [ C ]// Proc of the Selected Areas in Cryptography. Berlin: Springer-Verlag, 1999:631-632.
  • 6SCHNEIER B. The Blowfish encryption algorithm[ EB/OL]. (1995- 09 ). http ://www. schneier, com/paper-blowfish-oneyear, html.
  • 7BIRYUKOV A, WAGNER D. Slide attacks [ C ]//Proc of FastSoftware Encryption. Berlin : Springer-Verlag, 1999:245- 259.
  • 8NAKAHARA J. A linear analysis of Blowfish and Khufu [ C ]//Proc of Information Security Practice and Experience. Berlin : Springer-Verlag, 2007 : 20- 32.
  • 9VAUDENAY S. On the weak keys of Blowfish[ C]//Proc of the 3rd International Workshop on FastSoftware Encryption. London:SpringerVerlag, 1996 : 27- 32.
  • 10KARA O, MANAP C. A new class of weak keys for Blowfish [ C ]// Proc of FastSoftware Encryption. Berlin: Springer-Verlag, 2007 : 167- 180.

共引文献194

同被引文献78

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部