Font Size: a A A

Privacy Protection Technology Of Big Data Based On Flink Platform

Posted on:2022-04-06Degree:MasterType:Thesis
Country:ChinaCandidate:G H ZengFull Text:PDF
GTID:2518306539461844Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
In the environment of today's big data era,the loss of personal privacy data is especially serious,which has a very serious impact on individuals and society.How to protect data security in a big data environment has become one of the most important issues.Only by solving the bottleneck of information security can information technology develop rapidly and widely.This article aims to study how to quickly distinguish sensitive data from thousands of data,and it is particularly important to encrypt sensitive private data for the purpose of protection.At present,big data encryption algorithms have shortcomings such as short key length and slow encryption speed.On the basis of studying the existing data encryption algorithm and big data technology,an innovative hybrid encryption algorithm based on hyperchaos and conic section is proposed.With the help of the parallel computing capability on the Flink platform of the new generation big data computing engine,Improve the encryption speed to ensure data security.The specific work of this paper is as follows:(1)This paper designs a parallel association rule mining algorithm based on the Flink platform.Due to the huge amount of existing data,the mining speed of the traditional singlemachine serial processing Apriori algorithm will decrease,and the existing parallel Apriori algorithm based on the Hadoop platform has a large number of I/O read and write restrictions,which leads to a decrease in the algorithm mining speed.It is proposed to use the Flink platform to solve this problem.With a structure based entirely on stream processing,a new iteration can begin to calculate with only partial results,avoiding iteration delays.In addition,the intermediate results of the iteration are also stored in the memory,which improves the mining speed of the algorithm.Experiments show that the parallel Apriori algorithm based on the Flink platform has good adaptability to big data processing,and the mining speed is improved.(2)Based on the research of hyperchaotic system and hyperchaotic encryption algorithm,a hybrid encryption algorithm based on hyperchaos and conic section is designed.First,the hyperchaotic system is used to generate two hyperchaotic sequences,and the two sequences have no correlation.Then,the two unrelated hyperchaotic sequences are XORed with the plaintext to complete the first encryption.Then the first encrypted ciphertext is encrypted for the second time,and the sequence generated by the conic section and the first encrypted ciphertext are encrypted again.Finally,an experiment was established and analyzed.The results show that the encryption algorithm has large space on the key,high sensitivity,and good ciphertext statistical characteristics.These indicators are very important indicators in cryptographic security.In terms of cracking,the plaintext encrypted twice cannot be analyzed by ciphertext,so special plaintext or ciphertext cannot be used to crack.In addition,the algorithm uses nonlinear operations,which can effectively resist plaintext attacks.Therefore,the algorithm is highly secure and can well protect the security of private data.(3)Design a privacy data encryption system based on Flink platform.Flink has the advantages of fast speed,simplicity,strong versatility,and multiple operating modes in parallel computing;the theoretical analysis of the parallel algorithm of the Flink platform is carried out on the hybrid encryption algorithm based on hyperchaos and conic section.The experimental results show that for the same size data set,with the increase of the number of computing nodes,the encryption time is gradually shortened.In the aspect of speedup,with the increase of the number of computing nodes,the speedup gradually increases,so as to improve the encryption speed.
Keywords/Search Tags:Flink, Data association rule mining, Chaotic encryption, Conic section, Privacy protection
PDF Full Text Request
Related items