Skip to main content

Research on Big Data Encryption Algorithm Based on Data Redundancy Elimination Technology

  • Conference paper
  • First Online:
2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City (BDCPS 2021)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 102))

  • 1400 Accesses

Abstract

Data has the characteristics of high speed, high value and high efficiency. In recent years, with the rapid development of cloud computing, Internet of things and social network technology, the amount of data carried by push network has increased dramatically. The traditional encryption storage technology and management methods have been difficult to meet the requirements of large data capacity, storage efficiency and security. In the big data environment, the data security and privacy protection of users are closely related to the academic circles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xiaoqiang Z, Mengmeng W, Guiliang Z (2012) New progress of image encryption algorithm. Comput Eng Sci (recommended article of the second National Postdoctoral Forum on Computer Science) 34(5):1–6

    Google Scholar 

  2. Yizhe Z, Mengmeng W, Guiliang Z (2013) Research on an improved algorithm for reducing the misjudgment rate of fingerprint image. Comput Eng design. 34(3):993–997

    Google Scholar 

  3. Duan Y (2012) Lang Bo’s extended ciphertext policy attribute based encryption mechanism. J Huazhong Univ Sci Technol (NATURAL SCIENCE EDITION), 40(1):113–115

    Google Scholar 

  4. Su J, Cao D, Wang X, et al. (2011) J Softw J (6):1299–1315

    Google Scholar 

  5. Mao X (2019) Analysis of new data encryption algorithm in big data environment. Inf Commun (11)

    Google Scholar 

  6. Li Q, Chen L, Feng M, Li C, Fang J (2017) Analysis of several typical data encryption algorithms. Inf Syst Eng (11)

    Google Scholar 

  7. Zuo X, Tan H (2017) Analysis and comparison of common data encryption algorithms. J Luohe Polytech (02)

    Google Scholar 

  8. Li S (2007) Analysis of popular data encryption algorithm. J Liaoning Commun Coll (02)

    Google Scholar 

  9. Liu Z (2020) Application of big data encryption algorithm in data security protection. Electron Test (12)

    Google Scholar 

  10. Ren H (2016) Overview of data encryption algorithms. Electron world (18)

    Google Scholar 

  11. Li P (1990) A data encryption algorithm and its implementation. Microcomput Appl (06)

    Google Scholar 

  12. Zeng L (2017) Research on new data encryption algorithm in big data environment. Sci Technol Bull (06)

    Google Scholar 

  13. Wang M, Hao Y, Chu Y (2014) Data encryption algorithm with privacy protection function. Comput Eng Appl (23)

    Google Scholar 

  14. Feng K (2020) Research on risk monitoring system of big data platform based on Hadoop. Autom Technol Appl (09)

    Google Scholar 

  15. Yan P, Zhang L (2020) Analysis and research on intelligent characteristics of traffic big data based on Hadoop platform. J North China Univ Technol (NATURAL SCIENCE EDITION) (03)

    Google Scholar 

Download references

Acknowledgements

Research and Practice on the training mode of industry-University-Research collaborative Innovation talents based on Ali Cloud big data Technology and Application in Higher Vocational Colleges,No 192097.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojing Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, G. (2022). Research on Big Data Encryption Algorithm Based on Data Redundancy Elimination Technology. In: Atiquzzaman, M., Yen, N., Xu, Z. (eds) 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City. BDCPS 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 102. Springer, Singapore. https://doi.org/10.1007/978-981-16-7466-2_66

Download citation

Publish with us

Policies and ethics