Advanced Search
    Yang Guoqiang, Ding Hangchao, Zou Jing, Jiang Han, Chen Yanqin. A Big Data Security Scheme Based on High-Performance Cryptography Implementation[J]. Journal of Computer Research and Development, 2019, 56(10): 2207-2215. DOI: 10.7544/issn1000-1239.2019.20190390
    Citation: Yang Guoqiang, Ding Hangchao, Zou Jing, Jiang Han, Chen Yanqin. A Big Data Security Scheme Based on High-Performance Cryptography Implementation[J]. Journal of Computer Research and Development, 2019, 56(10): 2207-2215. DOI: 10.7544/issn1000-1239.2019.20190390

    A Big Data Security Scheme Based on High-Performance Cryptography Implementation

    • At present, the trend of information technology development is the artificial intelligence technology based on big data computing. Although it has made enormous contribution in the economic development, big data processing technology which includes cloud computing, fog computing, edge computing and other computing modes also brings a great risk of data security. Cryptographic technology is the kernel of the big data security. Confidentiality, authentication and privacy protection of big data need to solve the following three security problems: firstly, high-speed encryption and decryption of massive data; secondly, the authentication problem of high concurrency and large scale user; thirdly, privacy protection in data mining. The solution of these problems requires the fast implementation of the underlying cryptographic algorithm. Aiming at the logic architecture of big data security application, this paper gives a fast calculation algorithm for the cryptographic standard algorithm SM4-XTS, SM2 and modular exponentiation of large integers. It is verified on the KC705 development board based on Xilinx company, the results of experiment show that our work has certain advancement: 1) The implementation of SM4-XTS fills the blank of this direction in China. 2) SM2 signature has high performance, leading domestic similar products. 3) Modular exponentiation is applied to the productization of homomorphism cryptography, and its performance is ahead of other similar products.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return