Visible to the public Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy

TitleConstruction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Publication TypeConference Paper
Year of Publication2019
AuthorsLong, Cao-Fang, Xiao, Heng
Conference Name2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)
Keywordsauthorisation, Big Data, big data hyperchaotic mixed encryption model, big data privacy, chaotic communication, Ciphers, cryptographic protocols, data privacy, encoding, Encryption, human factors, hybrid encryption, Hyperchaos, Metrics, mixed encrypted public key, mixed network information sharing, mobile network, mobile network big data, mobile network privacy big data hybrid encryption algorithm, mobile radio, piecewise linear combination method, piecewise linear techniques, Privacy big data, Protocols, pubcrawl, public key cryptography, Resiliency, Rossle chaotic mapping, Scalability, steganography, steganography performance
AbstractBig data of mobile network privacy is vulnerable to clear text attack in the process of storage and mixed network information sharing, which leads to information leakage. Through the mixed encryption of data of mobile network privacy big data to improve the confidentiality and security of mobile network privacy big data, a mobile network privacy big data hybrid encryption algorithm based on hyperchaos theory is proposed. The hybrid encryption key of mobile network privacy big data is constructed by using hyperchaotic nonlinear mapping hybrid encryption technology. Combined with the feature distribution of mobile network privacy big data, the mixed encrypted public key is designed by using Logistic hyperchaotic arrangement method, and a hyperchaotic analytic cipher and block cipher are constructed by using Rossle chaotic mapping. The random piecewise linear combination method is used to design the coding and key of mobile network privacy big data. According to the two-dimensional coding characteristics of mobile network privacy big data in the key authorization protocol, the hybrid encryption and decryption key of mobile network privacy big data is designed, and the mixed encryption and decryption key of mobile network privacy big data is constructed, Realize the privacy of mobile network big data mixed encryption output and key design. The simulation results show that this method has good confidentiality and strong steganography performance, which improves the anti-attack ability of big data, which is used to encrypt the privacy of mobile network.
DOI10.1109/ICVRIS.2019.00031
Citation Keylong_construction_2019