Research on Encryption Transmission and Storage Technology of Personnel Avaluation Data for Cloud Computing Environment
Xu Zhang
Gansu Tongxing Intelligent Technology Development Co., LTD., Lanzhou 730050, Gansu Province, China
Peidong Du
State Grid Gansu Electric Power Company, Lanzhou 730030, Gansu Province, China
Qingzhao Hu
State Grid Gansu Electric Power Company, Lanzhou 730030, Gansu Province, China
Zuohu Chen
Gansu Tongxing Intelligent Technology Development Co., LTD., Lanzhou 730050, Gansu Province, China
Miao Wang
State Grid Gansu Electric Power Company, Lanzhou 730030, Gansu Province, China
Long Wang
Pingliang Power Supply Company, Gansu Electric Power Company, State Grid, Pingliang 730030, Gansu Provinc, China
Abstract:
Data transmission in the cloud computing environment is usually carried out through the Internet, and the openness of the network makes the data vulnerable to attacks, affecting the availability and security of data transmission. Therefore, the encryption transmission and storage technology of personnel evaluation data for cloud computing environment is proposed. By using bilinear groups and hash functions, the binary character description of user attributes is mapped to random group elements, and the security access control mechanism of personnel evaluation data is constructed. Using addition aggregation method and elliptic curve encryption technology, the cloud computing data aggregation model is constructed. The chaotic sequence is generated by logistic mapping, and the key is generated by quantifying the chaotic sequence to encrypt sensitive plaintext information. A homomorphic floating-point encryption algorithm is introduced to encrypt the storage media, and the trusted computing module TPM is used to generate random numbers as symmetric keys to enhance the security of key management. The experimental results show that the storage space of the proposed methods is less than 15MB, and the encryption speed is 1780ns when the key length is 2000bit, which has the ability to resist malicious attacks.