Abstract
In recent years, aquatic product quality and safety problems occur frequently make aquatic product traceability is increasingly important, and the problems of data security exposure in the tracing process also must be resolved. In this paper, the research object is based on the system of aquatic product traceability system, and two kinds of encryption technology (symmetric encryption and asymmetric encryption technology) has been introduced. After considering the features of the information in the tracing process and the advantages and disadvantages of the two encryption technologies, three specific data encryption scheme in the three major data processing of aquatic product traceability have been designed. And the encryption scheme has been programmed to realize, which is proved to be feasible.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, Y.: Analysis of application of data encryption technology in computer security. Inf. Commun. 02, 160–161 (2012)
Jiang, W.: Brief comments on the principle and application of information encryption technology. Comput. Era 05, 10–11 (2011)
Zhuo, X., Zhao, F., Zeng, D.: Study on asymmetric encryption technology. J. Sichuan Univ. Sci. Eng. (Nat. Sci. Ed.) 05, 562–564 (2010)
Rabah, K.: Theory and implementation of data encryption standard: a review. Inf. Technol. J. 44, 210–211 (2010)
Penchalaiah, N., Seshadri, R.: Effective comparison and evaluation of DES and Rijndael Algorithm (AES). Int. J. Comput. Sci. Eng. 25, 88–89 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zu, Q., Liu, L. (2016). The Information Encryption Design and Application of the Aquatic Product Tracing Process. In: Zu, Q., Hu, B. (eds) Human Centered Computing. HCC 2016. Lecture Notes in Computer Science(), vol 9567. Springer, Cham. https://doi.org/10.1007/978-3-319-31854-7_85
Download citation
DOI: https://doi.org/10.1007/978-3-319-31854-7_85
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31853-0
Online ISBN: 978-3-319-31854-7
eBook Packages: Computer ScienceComputer Science (R0)