Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Large file selective encryption method for reducing write

An encryption method and selective technology, applied in the field of information security, can solve the problems of unrealistic data encryption, low homomorphic encryption efficiency, large amount of calculation, etc., to avoid complete encryption unrealistic, to facilitate later call calculations, and to solve large files. The effect of encryption

Active Publication Date: 2017-08-18
桂林傅里叶电子科技有限责任公司
View PDF11 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some big data files are stored in real time, such as video. After the file is recorded and stored, it may be found that some data needs to be kept confidential and needs to be encrypted. However, it is obviously unrealistic to encrypt a large amount of data.
For the encryption of cloud computing and big data, there are currently proxy re-encryption and homomorphic encryption. These encryptions have certain applications and limitations. For example, homomorphic encryption has low efficiency and high redundancy. Larger limitations, the above-mentioned encryption method is unrealistic to be used directly to encrypt large-scale data, because the amount of calculation is huge, and such as homomorphic encryption often brings data expansion, the cost is high, heavy proxy encryption is only suitable for Key conversion between specific users. In reality, it is not necessary to encrypt all data as described above
Homomorphic encryption is more suitable for the encryption of data that needs to be calculated, but the cost is relatively high
Encrypting these data with traditional encryption methods also has problems such as large amount of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment 1 is the embodiment of this encryption method, and we choose the SequenceFile file as an example, and the encryption steps are as follows:

[0037] 1. After reading the file, you can analyze each record and its length, and use one of its records as a data block. The start position and end position of the record are used as the positioning information of the data block.

[0038] 2. According to the set keyword calculation rules, the sensitivity of the records can be obtained. Records reaching a certain threshold need to be encrypted. At the same time, it can be determined according to the rules whether it is symmetric encryption or public key encryption (including some homomorphic encryption and proxy re-encryption. ), if the user chooses to encrypt the records that do not reach the threshold according to the needs, the block is also encrypted. If the file does not belong to the above two situations, it will not be encrypted.

[0039] 3. For the data that ne...

Embodiment 2

[0044] Embodiment 2 is a further improvement of Embodiment 1 of this encryption method. On the basis of Embodiment 1, considering that in files, text and numerical values ​​are often mixed together, when numerical values ​​and texts are mixed together, the text and numerical values ​​are mixed together. Isolation, using appropriate encryption methods for each, for example, for the initial segment, consider different encryption needs, further segment, use different encryption methods for values ​​and text, perform homomorphic encryption on values, and use general symmetric encryption for other data, So segment them as well to isolate them. For streaming files, there is no need to increase the number of records. When a certain record contains data that needs to be homomorphically encrypted, segment the data before and after the data. The ciphertexts of multiple segments in the record are put together, but the starting position of the first segment and the length of each segment ...

Embodiment 3

[0045] Embodiment 3 is a further improvement of Embodiment 1 of this encryption method. On the basis of Embodiment 1, the calculation functions that may be involved in the values ​​that require homomorphic encryption are analyzed to determine whether the data involved need to use the same State encryption, what kind of homomorphic encryption needs to be used, when performing certain entrusted calculations, other general encryption and non-fully homomorphic encryption cannot be directly calculated, when fully homomorphic encryption is required, fully homomorphic encryption is used , when both fully homomorphic encryption and non-holomorphic encryption are feasible, the non-fully homomorphic (semi-homomorphic) encryption method is used. When ordinary encryption is feasible, the ordinary encryption method is preferred, that is, when multiple methods are all When the purpose can be achieved, the preferred order is general encryption, semi-homomorphic encryption, and fully homomorph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, relating to a large file encryption method. The method considers the phenomenon that a large file has huge data and is not suitable for full encryption, a large number of data will choose not to be encrypted, and in order to reduce the read and write of the data, especially the write, the method disclosed by the invention adopts the following steps: storing an original plaintext, covering part of the plaintext that is encrypted, and separately storing an encrypted ciphertext. As different encryption methods have different advantages and disadvantages, fully homomorphic encryption also cannot solve all delegated calculations, and a high cost of encryption is needed, an encryption mode with a misleading function is required for some data, and only a general symmetric encryption mode is required for other data, thereby, the appropriate encryption methods are segmentally selected as required, only part of the data needs to be encrypted according to rules or selections; and meanwhile, an optimum scheme for reducing key management and guaranteeing security is proposed, and thus the encryption and decryption of the files can be achieved by only using fewer keys.

Description

technical field [0001] The invention belongs to the field of information security and relates to a method for selectively encrypting large files. Background technique [0002] With the development of information technology, some files are getting bigger and bigger. At present, some files of very popular big data (big data, mega data) are also very large. Taking Hadoop as an example, there are many file formats in Hadoop, and the more representative one is SequenceFile (and its similar file types) : SequenceFile is a binary file provided by Hadoop API, which serializes data into files in the form of <key, value>. This binary file internally uses Hadoop's standard Writable interface to implement serialization and deserialization. It is representative of the file format in the big data environment and is compatible with MapFile in the Hadoop API. Some big data files are stored in real time, such as video. After the file is recorded and stored, it may be found that some...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08G06F17/30
CPCG06F16/116G06F16/13H04L9/0861H04L9/0891H04L63/0464H04L63/10H04L67/06
Inventor 王勇付莉林震陈冬梅王会勇汪华登唐红武刘永宏付秀伟罗容丽
Owner 桂林傅里叶电子科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products