Abstract
In order to improve the data integrity encryption ability of cloud storage users, a cloud storage user data integrity encryption technology based on random linear coding is proposed. Firstly, the cloud storage user data integrity encryption key of cloud storage user data integrity object is constructed, then the encryption and decryption coding design are carried out, and the random linear coding is used to optimize the digital encryption key to improve the anti-deciphering level. Finally, the simulation results show that the cloud storage user data integrity encryption technology has high random distribution of encryption, the deciphering rate of encrypted data is effectively controlled, and the performance of the cloud storage user data encryption technology is better than that of the traditional method. It effectively ensures the integrity of cloud storage user data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhou, S.B., Xu, W.X.: A novel clustering algorithm based on relative density and decision graph. Control Decis. 33(11), 1921–1930 (2018)
He, H., Tan, Y.: Automatic pattern recognition of ECG signals using entropy-based adaptive dimensionality reduction and clustering. Appl. Soft Comput. 55, 238–252 (2017)
Zhu, Y., Zhu, X., Wang, J.: Time series motif discovery algorithm based on subsequence full join and maximum clique. J. Comput. Appl. 39(2), 414–420 (2019)
Dai, H., Huang, Y., Li, C., et al.: Energy-efficient resource allocation for device-to-device communication with WPT. IET Commun. 11(3), 326–334 (2017)
Helmy, A., Hedayat, A., Al-Dhahir, N.: Robust weighted sum-rate maximization for the multi-stream MIMO interference channel with sparse equalization. IEEE Trans. Commun. 60(10), 3645–3659 (2015)
Seo, D.W., Lee, J.H., Lee, H.S.: Optimal coupling to achieve maximum output power in a WPT system. IEEE Trans. Power Electron. 31(6), 3994–3998 (2016)
Ma, Z., Chen, W.: Friction torque calculation method of ball bearings based on rolling creepage theory. J. Mech. Eng. 53(22), 219–224 (2017)
Alfaro, V.M., Vilanovab, R.: Robust tuning of 2DoF five-parameter PID controllers for inverse response controlled processes. J. Process Control 23(4), 453–462 (2013)
Zhang, R., Zhao, F.: Foggy image enhancement algorithm based on bidirectional diffusion and shock filtering. Comput. Eng. 44(10), 221–227 (2018)
Liu, D., Zhou, D., Nie, R., Hou, R.: Multi-focus image fusion based on phase congruency motivate pulse coupled neural network-based in NSCT domain. J. Comput. Appl. 38(10), 3006–3012 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, L., Shen, Y. (2019). Research on Data Integrity Encryption Method of Cloud Storage Users Based on Big Data Analysis. In: Gui, G., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 302. Springer, Cham. https://doi.org/10.1007/978-3-030-36405-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-36405-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36404-5
Online ISBN: 978-3-030-36405-2
eBook Packages: Computer ScienceComputer Science (R0)