Skip to main content

Research on Data Integrity Encryption Method of Cloud Storage Users Based on Big Data Analysis

  • Conference paper
  • First Online:
Book cover Advanced Hybrid Information Processing (ADHIP 2019)

Abstract

In order to improve the data integrity encryption ability of cloud storage users, a cloud storage user data integrity encryption technology based on random linear coding is proposed. Firstly, the cloud storage user data integrity encryption key of cloud storage user data integrity object is constructed, then the encryption and decryption coding design are carried out, and the random linear coding is used to optimize the digital encryption key to improve the anti-deciphering level. Finally, the simulation results show that the cloud storage user data integrity encryption technology has high random distribution of encryption, the deciphering rate of encrypted data is effectively controlled, and the performance of the cloud storage user data encryption technology is better than that of the traditional method. It effectively ensures the integrity of cloud storage user data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou, S.B., Xu, W.X.: A novel clustering algorithm based on relative density and decision graph. Control Decis. 33(11), 1921–1930 (2018)

    MATH  Google Scholar 

  2. He, H., Tan, Y.: Automatic pattern recognition of ECG signals using entropy-based adaptive dimensionality reduction and clustering. Appl. Soft Comput. 55, 238–252 (2017)

    Article  Google Scholar 

  3. Zhu, Y., Zhu, X., Wang, J.: Time series motif discovery algorithm based on subsequence full join and maximum clique. J. Comput. Appl. 39(2), 414–420 (2019)

    Google Scholar 

  4. Dai, H., Huang, Y., Li, C., et al.: Energy-efficient resource allocation for device-to-device communication with WPT. IET Commun. 11(3), 326–334 (2017)

    Article  Google Scholar 

  5. Helmy, A., Hedayat, A., Al-Dhahir, N.: Robust weighted sum-rate maximization for the multi-stream MIMO interference channel with sparse equalization. IEEE Trans. Commun. 60(10), 3645–3659 (2015)

    Article  Google Scholar 

  6. Seo, D.W., Lee, J.H., Lee, H.S.: Optimal coupling to achieve maximum output power in a WPT system. IEEE Trans. Power Electron. 31(6), 3994–3998 (2016)

    Article  Google Scholar 

  7. Ma, Z., Chen, W.: Friction torque calculation method of ball bearings based on rolling creepage theory. J. Mech. Eng. 53(22), 219–224 (2017)

    Article  Google Scholar 

  8. Alfaro, V.M., Vilanovab, R.: Robust tuning of 2DoF five-parameter PID controllers for inverse response controlled processes. J. Process Control 23(4), 453–462 (2013)

    Article  Google Scholar 

  9. Zhang, R., Zhao, F.: Foggy image enhancement algorithm based on bidirectional diffusion and shock filtering. Comput. Eng. 44(10), 221–227 (2018)

    Google Scholar 

  10. Liu, D., Zhou, D., Nie, R., Hou, R.: Multi-focus image fusion based on phase congruency motivate pulse coupled neural network-based in NSCT domain. J. Comput. Appl. 38(10), 3006–3012 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, L., Shen, Y. (2019). Research on Data Integrity Encryption Method of Cloud Storage Users Based on Big Data Analysis. In: Gui, G., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 302. Springer, Cham. https://doi.org/10.1007/978-3-030-36405-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36405-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36404-5

  • Online ISBN: 978-3-030-36405-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics