A realization method of distributed cloud encryption algorithm

A technology of encryption algorithm and implementation method, applied in the field of information security, can solve problems such as imperfect functions, and achieve the effects of improving security, improving efficiency and convenient layout

Active Publication Date: 2021-10-01
XIDIAN UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the research on functional encryption is still in its infancy, and its functions are still not perfect, and it cannot realize all functions like homomorphic encryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A realization method of distributed cloud encryption algorithm
  • A realization method of distributed cloud encryption algorithm
  • A realization method of distributed cloud encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] Glossary

[0032] [1] Search onion (eigenvector, searchable encryption) is mainly used to obtain probability and implement probability-related machine learning algorithms.

[0033] [2] Basic operation onion (digital data, trapdoor Paillier encryption) is mainly used to cooperate with dot product onion to realize convolutional neural network, deep neural network and other machine learning algorithms that require complex operations, using double trapdoor ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the field of information security, specifically a method for implementing a distributed cloud encryption algorithm, including the following steps: 1) Constructing a storage model that cooperates with multiple encryption modes, and the encryption modes include search onion, basic operation onion, and Euclidean distance Onion and dot product onion; 2) Correspond to different types of data mining algorithms in step 1) of search onion, basic operation onion, Euclidean distance onion and dot product onion; 3) Encrypt the data mining algorithm in step 2) text optimization. The present invention utilizes a cooperative scheme of multiple encryption algorithms, which can theoretically prove the security of the system, greatly improves the efficiency, and can also provide important references for realizing other ciphertext data mining algorithms, uses hardware encryption, and realizes The function of anti-access mode leakage does not require any modification of the cloud platform and user application layer during the deployment process. It is convenient to deploy, has versatility and ease of use, and effectively improves the security of the cloud platform.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for realizing a distributed cloud encryption algorithm. Background technique [0002] With the vigorous development of Internet technology, data presents a trend of rapid growth. The cloud platform has powerful storage and big data analysis capabilities, which help to promote information circulation and resource sharing. It is considered to be another major change in information technology after personal computers and the Internet, and will bring fundamental changes in working methods and business models. In order to change, the world's powerful countries, including my country, have identified cloud computing as the development focus of strategic emerging industries for support and cultivation. [0003] However, there are serious hidden dangers in data security in the existing cloud service system. The cloud platform must know the data content before it can provide se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06H04L29/08G06F21/60
CPCG06F21/602H04L9/008H04L63/0428H04L67/10
Inventor 万泽康纪涵司晨曦
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products