计算机与现代化 ›› 2025, Vol. 0 ›› Issue (06): 61-64.doi: 10.3969/j.issn.1006-2475.2025.06.010

• 算法设计与分析 • 上一篇    下一篇

移动边缘数据库隐私信息增量式加密仿真

  

  1. (上海杉达学院信息化办公室,上海 201209)
  • 出版日期:2025-06-30 发布日期:2025-07-01
  • 作者简介: 作者简介:马林(1981—),男,上海人,讲师,硕士,研究方向:计算机网络与通信,数据库技术,云计算,E-mail: tdesvkby@163.com。

Simulation of Incremental Encryption of Privacy Information in Mobile Edge Databases

  1. (Informatization Office, Sanda University, Shanghai 201209, China)
  • Online:2025-06-30 Published:2025-07-01

摘要: 摘要:移动边缘数据库信息量冗余,额外的密钥序列灵活性与自适应性较差,导致隐私信息隐藏度较低,增量式加密效果较差。为此,提出一种移动边缘数据库隐私信息增量式加密方法。依据移动边缘数据库,对隐私信息进行聚类与编码,结合信息耦合时空演化趋势,以混沌模式,对隐私数据进行语义转换处理,引入优先级密钥与移动边缘数据库代理服务,确定关键字的相似坐标值后,生成数据密钥。结合优先级加密策略对加密过程进行审计,完成隐私信息增量式加密。经仿真测试,信息隐藏度始终控制在96%以上,ASCⅡ码值变化较为稳定,基本稳定在9左右。表明本文方法能够提高信息隐藏度,加密效果更好。

关键词: 关键词:移动边缘数据库, 隐私信息, 语义转换, 信息安全

Abstract: Abstract: The mobile edge database has redundant amount of information, and the additional key sequence is less flexible and adaptive, which leads to lower privacy information hiding degree and poor incremental encryption effect. For this reason, the incremental encryption method for mobile edge database privacy information is proposed. Based on the mobile edge database, clustering and encoding of private information, combined with the information coupling spatio-temporal evolution trend, in a chaotic mode, semantic transformation processing of private data, the introduction of priority key and mobile edge database proxy service, to determine the similarity of the keyword coordinate value, the generation of data keys. Combined with the priority encryption strategy to audit the encryption process, the incremental encryption of privacy information is completed. After Simulation testing, the information hiding degree is always controlled above 96%, and the change of ASCII code value is more stable, basically stable at about 9. The results show that the method can improve the information hiding degree and the encryption effect is better.

Key words: Key words: mobile edge database, privacy information, semantic transformation, information security

中图分类号: