Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A real-time big data privacy protection method based on symmetric encryption

A privacy protection and symmetric encryption technology, applied in the field of information security, can solve the problems of ignoring the importance of data change trends and the inefficiency of big data protection, etc., to reduce the cost of privacy protection, resist attacks without background knowledge, and simplify operations Efficient effect

Active Publication Date: 2017-07-14
STATE GRID CORP OF CHINA +4
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most privacy protection algorithms are based on protecting the information of the data value itself, while ignoring the importance of data change trends, and the current privacy protection algorithms focus on the protection of the data value itself, so the protection efficiency of big data is not high. considerable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A real-time big data privacy protection method based on symmetric encryption
  • A real-time big data privacy protection method based on symmetric encryption
  • A real-time big data privacy protection method based on symmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0073] The computational overhead of this method can be divided into two parts. The first part is the server's overhead of initializing data indexes and confusing data; the second part is mainly the server's overhead of restoring data order and real data values. The method of this embodiment completes the comparative simulation experiment with the existing symmetric encryption method DES on a machine with a Corei3 processor and a main frequency of 2.53 GHz in C language. The simulation comparison experiment uses a file to input 100,000 integer data, and compares the time overhead of encryption and decryption of the two methods. The average test results are as follows:

[0074] This embodiment DES Encryption time (ms) 102.8 1577.3 Decryption time (ms) 91.6 1582.4

[0075] It can be seen from the above results that the encryption and decryption time overhead of this embodiment is far superior to that of the DES symmetric encryption algorithm, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information security technology, in particular to a real-time big data privacy protection method based on symmetric encryption. According to the method, due to the fact that real-time data are continuously sampled at fixed points, privacy protection of a changing increment is obtained, and after a current data numerical value and a real-time changing increment are processed by a user side, the data are sent to a server to be stored in disorder; when the data are needed, the time sequence of original data is restored, the data changing increment is adjusted, and finally, the original data are obtained. The method includes the following steps that first, data indexes and data confusion are initialized by the server; second, data restoration is performed by the server. The method is high in running efficiency, the current full-permutation problem is still an NP-hard problem due to the random processing characteristic of an algorithm, and therefore the algorithm has high security, and can be widely applied to many scenes relevant to real-time big data privacy protection, and the data changing tendency is protected.

Description

technical field [0001] The invention relates to an information security technology, in particular to a real-time big data privacy protection method based on symmetric encryption. Background technique [0002] At present, the amount of data generated in real time around the world every day is very large, including mobile communications, electricity consumption data, network transactions, and real-time monitoring information. We have entered an era of massive data, and the amount of information has exploded. We can use this information to obtain better services, explore and apply the inherent laws of these data, solve problems, and further improve our lives. However, the accumulation of large amounts of data has also brought more security risks to people's lives and privacy. [0003] Among the security risks we face, a large amount of real-time data of users is outsourced and stored in cloud servers, and the changing trend of these real-time data will indirectly leak a large ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30G06F21/60
Inventor 张涛叶云邓松黄刘生聂熠文杨威
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products