吉林大学学报(信息科学版) ›› 2023, Vol. 41 ›› Issue (3): 459-464.

• • 上一篇    下一篇

基于混沌映射的数据库信息隐私加密储存算法

熊爱明1, 李明倩1, 刘 芳2   

  1. 1. 武汉城市学院 实验实训中心, 武汉 430083; 2. 武汉大学 计算机学院, 武汉 430072
  • 收稿日期:2022-05-17 出版日期:2023-06-08 发布日期:2023-06-14
  • 作者简介:熊爱明(1982— ), 男, 湖北黄冈人, 武汉城市学院实验师, 主要从事实验室管理、 大数据应用分析研究, ( Tel) 86-13871195642(E-mail)332762746@ qq. com; 刘芳(1980— ), 女, 湖北钟祥人, 武汉大学副教授, 主要从事深度学习与大数据研究, (Tel)86-13784327002(E-mail)lm44695@ 163. com。
  • 基金资助:
    国家自然科学基金资助项目 (62072346)

Encryption Storage Algorithm for Database Information Privacy Based on Chaos Mapping

XIONG Aiming1, LI Mingqian1, LIU Fang2   

  1. 1. Research and Training Center, Wuhan Institute of City, Wuhan 430083, China; 2. School of Computer Science, Wuhan University, Wuhan 430072, China
  • Received:2022-05-17 Online:2023-06-08 Published:2023-06-14

摘要: 针对数据库信息隐私易受到非法攻击, 安全性较低且储存空间较少的问题, 提出基于混沌映射的数据库信息隐私加密储存算法。 通过扰动 Logistic 混沌映射控制参量生成混沌序列, 将该序列与其他系统生成的混沌序列混合产生新的混沌序列, 然后通过动态编码算法进行非线性变换。 将输出序列作为数据库明文密钥加密明文, 构建用于数据库加密信息查询索引字段并通过哈希函数压缩, 与加密信息共同储存于数据库中, 实现可查询的混沌映射数据库信息隐私加密储存。 实验结果表明, 采用所提方法能缩短加、 解密用时, 减少空间占用, 降低算法能耗。

关键词: 混沌映射; , 数据库; , 加密储存; , 混沌序列扰动; , 哈希函数

Abstract: Information privacy of database is vulnerable to illegal attacks. It has low security and less storage space. In order to solve the problems an encryption storage algorithm database information privacy for based on chaotic mapping is proposed. The chaotic sequence is generated by disturbing the control parameters of Logistic chaotic mapping, and the sequence is mixed with the chaotic sequence generated by other systems to generate a new chaotic sequence. Then, the non-linear transformation is carried out through the dynamic coding algorithm. The output sequence is used as the database plaintext key to encrypt the plaintext. The index field for database encryption information query is constructed, compressed by hash function, and stored in the database together with the encrypted information realizing the information privacy encrypted storage of searchable chaotic mapping database. The experimental results show that the proposed method can shorten the time of encryption and decryption, reduce the space occupation and reduce the energy consumption.

Key words: chaotic map; , database; , encrypted storage; , chaotic sequence disturbance; , hash function

中图分类号: 

  • TP309. 7