Ecological Big Data Panorama Fusion Technology Based on Symmetric Encryption Adaptive Algorithm

Author(s):  
Yun Liu ◽  
Yong Zhang
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Lina Zheng

In our study, we first illustrated information fusion technology and Internet of Things (IoT), and then we built farmland IoT information collection platform on the basis of ZigBee technology and agricultural sensors to collect climate data including air pressure, temperature, soil water content, light intensity, and relative humidity. Finally, prediction model was used to evaluate crop growth condition. Results show that temperature increases with time and reaches the maximum at 13:00 PM. But relative humidity decreases with time and reaches the maximum at 3:30 AM. Light intensity presents a straight trend with time and reaches the maximum at 13:30 PM. CO2 concentration presents a fluctuation trend with time and reaches high point at 7:00 AM. Prediction model presented a high accuracy outcome with 99% accuracy in training data and 100% in testing set. Therefore, we can conclude that big data fusion technology on the basis of IoT has a good future in many fields excepting agriculture crop, which is also an irreversible trend.


2021 ◽  
pp. 08-20
Author(s):  
Manal .. ◽  
◽  
◽  
Ahmed N. Al Al-Masri

In recent years, with the rapid development of the domestic economy, the concept of sustainable development has been paid more and more attention. Ecological environment protection is more and more important, and the ecological environment is closely related to economic development. How to measure the relationship between the two is very important. Whether it is to build ecological environment protection or to ensure sustainable development of the economy, we should take the green development concept as a guiding concept, promote ecological economic development, and study the integration of ecological data is of great significance for solving these problems. The research of this thesis studies the multi-source heterogeneous (MSH) ecological big data (BD)adaptive fusion based (FM) based on symmetric encryption. This paper sets up a comparative experiment, multi-sensor (MS) data fusion based (DFM) based on Rough set theory, MSH data fusion based on data information conversion. The method is compared with the symmetric fusion MSH BD adaptive FM proposed in this paper. The results show that the MSH DFM based on Rough set theory has the highest confidence of 0.812; the MSH DFM based on data information conversion has the highest confidence of 0.68; based on symmetric encryption MSH BD The fusion confidence of the adaptive FM is up to 0.965, and the MSH ecological BD adaptive FM based on symmetric encryption is superior.


2019 ◽  
Vol 2019 ◽  
pp. 1-6
Author(s):  
Quanbo Qu ◽  
Baocang Wang ◽  
Yuan Ping ◽  
Zhili Zhang

Homomorphic encryption is widely used in the scenarios of big data and cloud computing for supporting calculations on ciphertexts without leaking plaintexts. Recently, Li et al. designed a symmetric homomorphic encryption scheme for outsourced databases. Wang et al. proposed a successful key-recovery attack on the homomorphic encryption scheme but required the adversary to know some plaintext/ciphertext pairs. In this paper, we propose a new ciphertext-only attack on the symmetric fully homomorphic encryption scheme. Our attack improves the previous Wang et al.’s attack by eliminating the assumption of known plaintext/ciphertext pairs. We show that the secret key of the user can be recovered by running lattice reduction algorithms twice. Experiments show that the attack successfully and efficiently recovers the secret key of the randomly generated instances with an overwhelming probability.


2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Xia ShuangKui ◽  
Jianbin Wu

In order to improve the security and robustness of the Information Steganography Algorithm under strictly controlled environment, a new algorithm of modification-free steganography based on image and big data is introduced in this paper. In the proposed algorithm, a mapping relationship between the hot image entropy and the secret information is constructed and the payload information is expressed by the mapping relation. At the same time, turbo code is introduced in order to improve robustness, the hot image comes from Internet image big data, and the library of hot image is established. The performance of the proposed algorithm is analyzed using simulation experiment. Because of its none-modifying on carrier image, the results of experiment show that the proposed algorithm can achieve good performance in robustness analysis, dimension scaling attack, and rotation attack. In particular, in the test of dimension scaling attack and the rotation attack, the rate of data recovering can be over 95%. The proposed algorithm can be very valuable in the covert communication which requires high security and low volume, for example, the key exchange of symmetric encryption system.


Sign in / Sign up

Export Citation Format

Share Document