z-logo
open-access-imgOpen Access
Security vulnerability and encryption technology of computer information technology data under big data environment
Author(s) -
Weijie Chen,
Guodong Chen,
Yanheng Zhao,
Jinghua Zhang
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1800/1/012012
Subject(s) - encryption , computer science , 56 bit encryption , 40 bit encryption , multiple encryption , probabilistic encryption , on the fly encryption , client side encryption , big data , data security , disk encryption theory , disk encryption hardware , data redundancy , bloom filter , cipher , distributed computing , algorithm , data mining , computer network , attribute based encryption , database , public key cryptography
In recent years, the traditional encryption storage technology and management methods have been difficult to satisfy the demand of big data in terms of speed, capacity, storage efficiency and security, along with the rapid increase of data volume. Data security is facing great challenges and challenges. To solve this problem, this paper proposes a de-redundancy method based big data encryption algorithm. Firstly, bloom filter technology is used to decrease the dimension of big data. Based on its remarkable advantages, bloom filter space and query efficiency and variable-length block detection scheme with less additional overhead, duplicate data detection and deletion algorithm suitable for large data is designed and implemented. Secondly, based on eliminating redundancy of big data, combined with the characteristics of the elliptic curve encryption algorithm and AES block cipher mode in terms of computing speed, parallelism and security, an encryption approach based on data de-redundancy technology is presented. According to the evaluation system of the encryption algorithm, the encryption time, keyspace and security of the new algorithm are evaluated. Experimental results reveal that the scheme has better security, and the presented approach can increase the speed of the encryption process, and decrease the encryption time and consumption.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here