检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:郑有庆 孙光灵 ZHENG Youqing;SUN Guangling(School of Information Engineering,Anhui Finance&Trade Vocational College,Hefei 230601,Anhui,China;School of Electronic and Information Engineering,Anhui Jianzhu University,Hefei 230601,Anhui,China)
机构地区:[1]安徽财贸职业学院信息工程学院,安徽合肥230601 [2]安徽建筑大学电子与信息工程学院,安徽合肥230601
出 处:《咸阳师范学院学报》2023年第4期18-23,共6页Journal of Xianyang Normal University
基 金:安徽高校自然科学研究项目(KJ2020A1122)。
摘 要:针对大数据部署过程中存在的密钥分发复杂、节点抗攻击性不强、冗余数据比例偏高等不足,提出了一种基于分层密文非对称机制的大数据密钥分发方案。采用分层机制,针对网络核心控制节点等重要节点采用矢量机制进行密钥生成,基于非对称方式对密钥予以时域冲激响应,对未通过响应判决的节点采用逆向映射方式生成新的密钥副本。仿真实验表明,文中算法具有节点沦陷比例较低和冗余数据占比不高的特点,特别是节点处于高速运动时,文中算法节点沦陷比例较MHC算法低32.4%,较SCQV算法低58.4%,冗余数据占比较MHC算法平均降低25.6%,较SCQV算法平均降低52.1%。文中算法提高了密钥分发安全性能,降低了各层节点在数据鉴权复杂度,使得网络数据冗余情况有了显著的改善。In order to solve the problems of complex key distribution,weak anti-attack ability of nodes,and high proportion of redundant data in the process of big data deployment,a big data key distribution scheme based on hierarchical ciphertext asymmetric mechanism is proposed.The hierarchical mechanism is used to generate the key for important nodes such as the core control node of the network by using the vector mechanism.The key is given a time-domain impulse response based on the asymmetric method,and the node that fails to pass the response decision is generated a new key copy by using the reverse mapping method.Simulation experiments show that the algorithm proposed in this paper has the characteristics of low node failure rate and low proportion of redundant data.Especially when the nodes are in high-speed motion,the node failure rate of the algorithm proposed in this paper is 32.4%lower than that of the MHC algorithm and 58.4%lower than that of the SCQV algorithm.The proportion of redundant data is reduced by an average of 25.6%compared to the MHC algorithm and 52.1%compared to the SCQV algorithm.The algorithm in this paper improves the security performance of key distribution,reduces the complexity of data authentication of nodes at each layer,and makes the network data redundancy situation significantly improved.
关 键 词:大数据密钥 分层机制 数据鉴权 时域冲击 逆向映射
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.22.194.5