Data processing method for DNA calculation

文档序号:8731 发布日期:2021-09-17 浏览:29次 中文

1. A data processing method for DNA calculation is characterized by comprising the following steps:

step 1: exporting the data of the DNA computer to an electronic computer, and decoding the data into data readable by the electronic computer;

step 2: dividing the data obtained in the step 1 into N sections of data segments; the encryptor generates N-1 random data segments to be inserted into two adjacent data segments, and the encryptor outputs the random data segments to the decryptor;

and step 3: according to the sensitivity and the importance preset by the user, the data segments are encrypted in a segmented manner, and a decryptor generates a secret key which is stored in the electronic computer;

and 4, step 4: and integrating a plurality of data segments into one data segment.

2. The method for processing data of DNA calculation according to claim 1, wherein in the step 3, the user selects the data segment which does not need to be encrypted and the invalid data segment according to the sensitivity and importance degree preset by the user, abandons the encryption of the data segment which does not need to be encrypted, and deletes the invalid data segment.

3. The data processing method for DNA computation of claim 1, wherein in the step 3, a corresponding key is generated by a key generator, corresponding key information is computed according to the degree of importance level of the information, the data type and the number, and the data is encrypted to obtain a data ciphertext; and the user side extracts the asymmetric public key corresponding to the database server of the received user data from the key database, and encrypts and transmits the key index information and the data ciphertext by an asymmetric encryption algorithm.

4. The data processing method for DNA calculation according to claim 1, wherein, before performing the step 3, random scrambling is performed in sequence to generate an encryption mapping table, and the encryption mapping table records an original arrangement position, a data type and a data size of each data block.

5. The data processing method for DNA computing according to claim 2, wherein the data segments not requiring encryption are randomly combined in a disorderly order and are transmitted and stored to the data storage cloud platform.

6. A computer storage medium storing instructions that, when executed, are capable of implementing a data processing method as claimed in any one of claims 1 to 5.

Background

A new information processing computer model, DNA computer model, with DNA molecules as "data", bio-enzymes or biochemical operations as "tools", is receiving great attention from many scientists in fields such as molecular biology, genetic engineering, chemistry, and computer science, mathematics, physics, and the like, and DNA computers have formed a research "hot spot" in the current scientific field. In commercial applications, data obtained by a computer has a requirement of encryption protection in some scenes, however, a data processing method aiming at DNA calculation is not disclosed in the prior art.

Disclosure of Invention

Aiming at the defects of the prior art, the invention provides a data processing method for DNA calculation.

The purpose of the invention can be realized by the following technical scheme:

a data processing method for DNA calculation, comprising the steps of:

step 1: exporting the data of the DNA computer to an electronic computer, and decoding the data into data readable by the electronic computer;

step 2: dividing the data obtained in the step 1 into N sections of data segments; the encryptor generates N-1 random data segments to be inserted into two adjacent data segments, and the encryptor outputs the random data segments to the decryptor;

and step 3: according to the sensitivity and the importance preset by the user, the data segments are encrypted in a segmented manner, and a decryptor generates a secret key which is stored in the electronic computer;

and 4, step 4: and integrating a plurality of data segments into one data segment.

Further, in the step 3, the user selects the data segment which does not need to be encrypted and the invalid data segment according to the sensitivity and the importance degree preset by the user, abandons the encryption of the data segment which does not need to be encrypted, and deletes the invalid data segment.

Further, in the step 3, a corresponding key is generated by the key generator, corresponding key information is calculated according to the importance level degree, the data type and the number of the information, and the data is encrypted to obtain a data ciphertext; and the user side extracts the asymmetric public key corresponding to the database server of the received user data from the key database, and encrypts and transmits the key index information and the data ciphertext by an asymmetric encryption algorithm.

Further, before the step 3 is executed, random scrambling is performed in sequence to generate an encryption mapping table, and the encryption mapping table records the original arrangement position, the data type and the data size of each data block.

Further, the data segments which do not need to be encrypted are randomly disorderly and sequentially combined and transmitted to the data storage cloud platform for storage.

A computer storage medium storing instructions that, when executed, enable any of the data processing methods described above.

Detailed Description

The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

In the description of the present invention, it is to be understood that the terms "opening," "upper," "lower," "thickness," "top," "middle," "length," "inner," "peripheral," and the like are used in an orientation or positional relationship that is merely for convenience in describing and simplifying the description, and do not indicate or imply that the referenced component or element must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be considered as limiting the present invention.

A data processing method for DNA calculation, comprising the steps of:

step 1: exporting the data of the DNA computer to an electronic computer, and decoding the data into data readable by the electronic computer;

step 2: dividing the data obtained in the step 1 into N sections of data segments; the encryptor generates N-1 random data segments to be inserted into two adjacent data segments, and the encryptor outputs the random data segments to the decryptor;

and step 3: according to the sensitivity and the importance preset by the user, the data segments are encrypted in a segmented manner, and a decryptor generates a secret key which is stored in the electronic computer;

and 4, step 4: and integrating a plurality of data segments into one data segment.

Further, in the step 3, the user selects the data segment which does not need to be encrypted and the invalid data segment according to the sensitivity and the importance degree preset by the user, abandons the encryption of the data segment which does not need to be encrypted, and deletes the invalid data segment.

Further, in the step 3, a corresponding key is generated by the key generator, corresponding key information is calculated according to the importance level degree, the data type and the number of the information, and the data is encrypted to obtain a data ciphertext; and the user side extracts the asymmetric public key corresponding to the database server of the received user data from the key database, and encrypts and transmits the key index information and the data ciphertext by an asymmetric encryption algorithm.

More specifically, a corresponding key is generated by a key generator, corresponding key information is calculated according to the importance level degree, the data type and the number of the information, and the data is encrypted to obtain a data ciphertext. And the user side extracts the asymmetric public key corresponding to the database server of the received user data from the key database, and encrypts and transmits the key index information and the data ciphertext by an asymmetric encryption algorithm. The main station receives the transmitted encrypted data, transmits the encrypted data to the terminal through the main station, screens the information of the transmission terminal again, and discards the screened invalid information or the information which is not encrypted reasonably. When the data is decrypted, the asymmetric decryption key is used for decrypting the symmetric key index, then the key is restored by using the key derivation algorithm, and then the symmetric key is used for decrypting the data packet to obtain the data original text. In the process of data encryption, decryption and transmission, user data with relatively large data volume is encrypted and decrypted by using a symmetric algorithm, and simultaneously, asymmetric encryption and decryption operation is performed on key index information with relatively small data volume, so that the problems of security, difficult key management and the like caused by only adopting the symmetric encryption algorithm can be effectively solved, and the problems of low operation efficiency and the like caused by data encryption by the asymmetric encryption algorithm are solved.

After acquiring an encryption request of a user for data, determining an encryption range of the data based on the encryption request. The encryption range of the data is determined by the user instead of encrypting all the data, so that the load of computer hardware is reduced, and the data encryption speed is increased. The user sends feedback information through the user side to determine that the encryption range of the data is correct, and then the hash value of the feedback information is generated by using a hash algorithm, wherein the hash algorithm has an irreversible characteristic, namely the feedback information cannot be obtained although the hash value of the feedback information is known. The security of data encryption is ensured; then, matching an encryption algorithm from a preset encryption algorithm library for the data block in the encryption range according to the hash value; and the encryption range data block is encrypted according to the matched encryption algorithm, so that the security of data encryption is further ensured, and the risk of data leakage on the data storage cloud platform is reduced.

In some examples of the present invention, before performing step 3, the sequence is randomly scrambled to generate an encryption mapping table, where the encryption mapping table records an original arrangement position, a data type, and a data size of each data block.

Further, the data segments which do not need to be encrypted are randomly disorderly and sequentially combined and transmitted to the data storage cloud platform for storage.

Some examples of the invention also relate to a computer-readable storage medium having instructions stored thereon. When the instructions are executed, the network anomaly detection method in any one of the above examples can be realized. More specifically, the instructions may be in a computer readable language. The computer may be a general purpose computing device or a special purpose computing device. In a specific implementation, the computer may be a desktop computer, a laptop computer, a network server, a Personal Digital Assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, a communication device, or an embedded device. The storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more integrated servers, data centers, and the like. For example, the storage medium may be, but is not limited to, a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a Digital Versatile Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)).

In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed.

完整详细技术资料下载
上一篇:石墨接头机器人自动装卡簧、装栓机
下一篇:因果关系生成方法、装置及电子设备

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!