Security vulnerability and encryption technology of computer information technology data under big data environment

In recent years, the traditional encryption storage technology and management methods have been difficult to satisfy the demand of big data in terms of speed, capacity, storage efficiency and security, along with the rapid increase of data volume. Data security is facing great challenges and challen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of physics. Conference series 2021-02, Vol.1800 (1), p.12012
Hauptverfasser: Chen, Weijie, Chen, Guodong, Zhao, Yanheng, Zhang, Jinghua
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In recent years, the traditional encryption storage technology and management methods have been difficult to satisfy the demand of big data in terms of speed, capacity, storage efficiency and security, along with the rapid increase of data volume. Data security is facing great challenges and challenges. To solve this problem, this paper proposes a de-redundancy method based big data encryption algorithm. Firstly, bloom filter technology is used to decrease the dimension of big data. Based on its remarkable advantages, bloom filter space and query efficiency and variable-length block detection scheme with less additional overhead, duplicate data detection and deletion algorithm suitable for large data is designed and implemented. Secondly, based on eliminating redundancy of big data, combined with the characteristics of the elliptic curve encryption algorithm and AES block cipher mode in terms of computing speed, parallelism and security, an encryption approach based on data de-redundancy technology is presented. According to the evaluation system of the encryption algorithm, the encryption time, keyspace and security of the new algorithm are evaluated. Experimental results reveal that the scheme has better security, and the presented approach can increase the speed of the encryption process, and decrease the encryption time and consumption.
ISSN:1742-6588
1742-6596
DOI:10.1088/1742-6596/1800/1/012012