摘 要:边缘计算技术能够有效地弥补传统云计算的不足,然而也带来了非常大的安全隐患。面对这一问题,相关学者从数据完整性、数据机密性以及隐私保护三个方面展开研究。文章针对原有研究在对于原始数据损害较大、相关算法框架较为复杂的基础上,引入一种基于混沌函数的理念来随机生成可逆矩阵,对原始数据进行加密,再使用逆矩阵进行解密,能够有效地保证数据原始的特征,提高安全性。文章最后通过实验证明该方案具有一定的可行性。
关键词:边缘计算;混沌函数;加密
DOI:10.19850/j.cnki.2096-4706.2021.08.05
中图分类号:TP309 文献标识码:A 文章编号:2096-4706(2021)08-0183-03
Encryption Algorithm Based on Randomly Generated Matrix
XING Wei,CHEN Dawen
(Jiangsu Golden Shield Detection Technology Co.,Ltd.,Nanjing 210042,China)
Abstract:Edge computing technology can effectively make up for the shortcomings of traditional cloud computing,but it also brings great security risks. Faced with this problem,relevant scholars have started their research from three aspects:data integrity, data confidentiality and privacy protection. In view of the original research,on the basis of great damage to the original data and complex algorithm framework,this paper introduces a idea based on chaotic function to randomly generate the reversible matrix,encrypt the original data,and then use the inverse matrix to decrypt,which can effectively guarantee the original characteristics of the data and improve the security. Finally,experiments show that the scheme has a certain feasibility.
Keywords:edge computing;chaotic function;encryption
参考文献:
[1] MONTRESOR A. Reflecting on the Past,Preparing for the Future:From Peer-to-Peer to Edge-Centric Computing [C]//IEEE International Conference on Distributed Computing Systems.IEEE,2016.
[2] MAO Y,YOU C,ZHANG J,et al. A Survey on Mobile Edge Computing:The Communication Perspective [J].IEEE Communications Surveys and Tutorials,2017,19(4):2322-2358.
[3] 施巍松,孙辉,曹杰,等 . 边缘计算:万物互联时代新型 计算模型 [J]. 计算机研究与发展,2017,54(5):907-924.
[4] 冯登国,张敏,张妍,等 . 云计算安全研究 [J]. 软件学报, 2011,22(1):71-83.
[5] 王于丁,杨家海,徐聪,等 . 云计算访问控制技术研究综 述 [J]. 软件学报,2015,26(5):1129-1150.
[6] 郑方,艾斯卡尔 • 肉孜,王仁宇,等 . 生物特征识别技术 综述 [J]. 信息安全研究,2016,2(1):12-26.
[7] 李顺东,王道顺 . 基于同态加密的高效多方保密计算 [J]. 电子学报,2013,41(4):798-803.
[8] 李强,颜浩,陈克非 . 安全多方计算协议的研究与应用 [J]. 计算机科学,2003(8):52-55.
[9] PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes [J].EUROCRYPT’99:Proceedings of the 17th international conference on Theory and application of cryptographic techniques,1999(5):223-238.
[10] 陈智罡,王箭,宋新霞 . 全同态加密研究 [J]. 计算机应 用研究,2014,31(6):1624-1631.
[11] KIM J,CAMTEPES ,SUSILO W ,et al. Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing [J].s.n.,2019:55-66.
[12] 剧高峰,罗安 . 离散小波变换用于电能质量扰动数据实 时压缩 [J]. 电力系统自动化,2002(19):61-63.
[13] 黄茂峰,倪巍伟,王佳俊,等 . 一种面向聚类的对数螺 线数据扰动方法 [J]. 计算机学报,2012,35(11):2275-2282.
[14] MUKHERJEE S,CHEN Z,GANGOPADHYAY A. A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms [J].The VLDB Journal, 2006,15(4):293-315.
[15] 彭一哲 . 混沌单向 Hash 函数的构造研究 [D]. 长沙:长 沙理工大学,2013.
[16] 徐丽新,吴明珠 . 基于整数矩阵乘法的图像加密算法 [J]. 电子制作,2019,373(9):45-47.
作者简介:邢伟(1986.10—),男,汉族,江苏南京人,中级 工程师,高级测评师,CISP,CIIPT,本科,研究方向:网络应用与 安全;陈大文(1989.11—),男,汉族,江苏南京人,中级工程师, 高级测评师,CISP,CIIPT,本科,研究方向:网络应用与安全。