期刊文献+

大数据环境下船员信息加密保护方法分析 被引量:1

Analysis of seafarer information encryption and protection method in large data environment
下载PDF
导出
摘要 传统船员信息加密保护方法比较单一,着重点仅限于人员信息数据存储状态下的加密计算,无法对大数据环境下人员信息数据交互前与交互中进行加密保护。针对问题产生根源,提出数据环境下船员信息加密保护方法。首先通过引入展开基于椭圆曲线的传输加密算法,对信息私钥数据进行重新计算,使其具有交互保护的特性;其次,通过引入同态加密频码保护编码算法对人员信息数据进行大数据交互保护计算,完成数据交互中的安全保护处理;最后,通过仿真对比实验证明提出的大数据环境下船员信息加密保护方法,在解决数据安全保护上具有显著的效果,并且效果稳定。 The traditional methods of crew information encryption and protection are relatively simple,and the emphasis is limited to the encryption calculation in the storage state of crew information data.It is impossible to encrypt and protect personnel information and data before they interact in large data environment.Aiming at the root cause of the problem,a method of crew information encryption and protection in data environment is proposed.Firstly,by introducing the transmission encryption algorithm based on elliptic curve,the information private key data is recalculated to make it have the characteristics of interactive protection;secondly,by introducing the homomorphic encrypted frequency code protection coding algorithm to calculate the large data interactive protection of personnel information data,the security protection processing in data interaction is completed;finally,the proposed method is proved by simulation and comparison experiments.The method of crew information encryption and protection in large data environment has remarkable effect in solving data security protection,and the effect is stable.
作者 陈小莉 CHEN Xiao-li(Chongqing Institure of Engineering,Chongqing 400056,China)
机构地区 重庆工程学院
出处 《舰船科学技术》 北大核心 2019年第14期181-183,共3页 Ship Science and Technology
基金 重庆市教育科学“十三五”规划2016年度规划课题(2016-GX-058)
关键词 大数据 存储 船员信息 加密保护 large data storage crew information encryption protection
  • 相关文献

参考文献4

二级参考文献28

  • 1国家质量技术监督局.GB/T18284-2000快速响应矩阵码[S].北京:中国标准出版社,2000.
  • 2McGrew F. Statistical Analysis of the Alleged RC4 Keystream Generator [ C ]//Proceedings of the 7th International Workshop on Fast Software Encryption. Berlin, Germany : Springer-Verlag, 2000 : 19-30.
  • 3Rivest R L. The RC4 Encryption Algorithm [ J/OL ]. ( 2011-06-23 ). http ://www. vocal, com/data, sheets/ RC4. pdf.
  • 4Knusen L R, Meier W, Preneel B, et al. Analysis Methods for ( Alleged ) RC4 [ C ]//Proceedings of International Conference on the Theory and Application of Cryptology. Berlin, Germany : Springer-Verlag, 1998 : 327-341.
  • 5Chen Jiageng, Miyaji A. Generalized RC4 Key Collisions and Hash Collisions [ C ]//Proceedings of the 7th International Conference on Security and Crypto- graphy for Networks. Berlin, Germany: Springer-Velag, 2010:73-87.
  • 6Hoch J J,Shamir A. Fault Analysis of Stream Ciphers[C]// Proceedings of CHES' 04. Berlin, Germany : Springer-Verlag, 2004 : 240-253.
  • 7Ismail I A. A Digital Image Encryption Algorithm Based a Composition of Two Chaotic Logistic Maps [ J]. International Journal of Network Security, 2010,11 ( 1 ) : 6-9.
  • 8Andrew R,Juan S,James N. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Aapplications[ Z] . 2001.
  • 9王信敏,郑世慧.PRGA的初始状态与RC4算法的安全性[J].计算机工程与应用,2009,45(8):107-108. 被引量:4
  • 10方炜炜,胡健,杨炳儒,周长胜.分布式决策树挖掘的隐私保护研究[J].计算机科学,2009,36(4):239-242. 被引量:4

共引文献50

同被引文献16

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部