Hybrid Encryption Algorithm for Sensitive Information of College Physical Fitness in Cloud Storage Environment
In order to improve the security of college sports fitness sensitive information, this paper proposes a hybrid encryption algorithm for college sports fitness sensitive information in cloud storage environment. Build an analysis model of influencing factors of cloud storage environment to identify t...
Saved in:
| Published in: | Journal of sensors Vol. 2022; pp. 1 - 10 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Hindawi
10.09.2022
John Wiley & Sons, Inc |
| Subjects: | |
| ISSN: | 1687-725X, 1687-7268 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | In order to improve the security of college sports fitness sensitive information, this paper proposes a hybrid encryption algorithm for college sports fitness sensitive information in cloud storage environment. Build an analysis model of influencing factors of cloud storage environment to identify the risk value of sensitive information; Using Bloom filter data structure to eliminate redundant data of sensitive information; The transmission channel model of sensitive information and the security coding model of sensitive information are constructed. Combined with the fuzzy differential information fusion method, the complete key of sensitive information under the symmetric encryption protocol is obtained to realize the key optimization design. Through AES encryption and decryption algorithm, the anti encryption control and structural reorganization of college sports fitness sensitive information, and the iterative convergence control of hybrid encryption, so as to realize the hybrid encryption of college sports fitness sensitive information. The encryption time of the design algorithm under different attribute numbers is always kept below 0.2S, the maximum encryption time under different number of software packages is only 0.5 s, and the encryption accuracy can reach 1, which proves that the design algorithm has certain application value. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1687-725X 1687-7268 |
| DOI: | 10.1155/2022/1552437 |