Abstract
Data has the characteristics of high speed, high value and high efficiency. In recent years, with the rapid development of cloud computing, Internet of things and social network technology, the amount of data carried by push network has increased dramatically. The traditional encryption storage technology and management methods have been difficult to meet the requirements of large data capacity, storage efficiency and security. In the big data environment, the data security and privacy protection of users are closely related to the academic circles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Xiaoqiang Z, Mengmeng W, Guiliang Z (2012) New progress of image encryption algorithm. Comput Eng Sci (recommended article of the second National Postdoctoral Forum on Computer Science) 34(5):1–6
Yizhe Z, Mengmeng W, Guiliang Z (2013) Research on an improved algorithm for reducing the misjudgment rate of fingerprint image. Comput Eng design. 34(3):993–997
Duan Y (2012) Lang Bo’s extended ciphertext policy attribute based encryption mechanism. J Huazhong Univ Sci Technol (NATURAL SCIENCE EDITION), 40(1):113–115
Su J, Cao D, Wang X, et al. (2011) J Softw J (6):1299–1315
Mao X (2019) Analysis of new data encryption algorithm in big data environment. Inf Commun (11)
Li Q, Chen L, Feng M, Li C, Fang J (2017) Analysis of several typical data encryption algorithms. Inf Syst Eng (11)
Zuo X, Tan H (2017) Analysis and comparison of common data encryption algorithms. J Luohe Polytech (02)
Li S (2007) Analysis of popular data encryption algorithm. J Liaoning Commun Coll (02)
Liu Z (2020) Application of big data encryption algorithm in data security protection. Electron Test (12)
Ren H (2016) Overview of data encryption algorithms. Electron world (18)
Li P (1990) A data encryption algorithm and its implementation. Microcomput Appl (06)
Zeng L (2017) Research on new data encryption algorithm in big data environment. Sci Technol Bull (06)
Wang M, Hao Y, Chu Y (2014) Data encryption algorithm with privacy protection function. Comput Eng Appl (23)
Feng K (2020) Research on risk monitoring system of big data platform based on Hadoop. Autom Technol Appl (09)
Yan P, Zhang L (2020) Analysis and research on intelligent characteristics of traffic big data based on Hadoop platform. J North China Univ Technol (NATURAL SCIENCE EDITION) (03)
Acknowledgements
Research and Practice on the training mode of industry-University-Research collaborative Innovation talents based on Ali Cloud big data Technology and Application in Higher Vocational Colleges,No 192097.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chen, G. (2022). Research on Big Data Encryption Algorithm Based on Data Redundancy Elimination Technology. In: Atiquzzaman, M., Yen, N., Xu, Z. (eds) 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City. BDCPS 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 102. Springer, Singapore. https://doi.org/10.1007/978-981-16-7466-2_66
Download citation
DOI: https://doi.org/10.1007/978-981-16-7466-2_66
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7465-5
Online ISBN: 978-981-16-7466-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)