Bulletin of Surveying and Mapping ›› 2022, Vol. 0 ›› Issue (7): 154-157,167.doi: 10.13474/j.cnki.11-2246.2022.0221

Previous Articles     Next Articles

Security protection technology and verification analysis of geographic information data based on TEA algorithm

TAO XiaoJing1,2   

  1. 1. College of Architectural Engineering, Shanghai Zhongqiao Vocational and Technical University, Shanghai 201514, China;
    2. College of Surveying and Geo-Informatics, Tongji University, Shanghai 200092, China
  • Received:2021-09-24 Online:2022-07-25 Published:2022-07-28

Abstract: Geographic information data is an important basic data for national defense construction and national economic development. With the development of technologies such as digitization, informatization and cloud computing, the security threat of geographic information data is becoming more and more serious. Aiming at the challenges of secure storage, efficient transmission and real-time information decryption and processing of geographic information data on mobile platform. A geographic information data security protection technology based on TEA algorithm is proposed. This technology uses cyclic iterative shift and XOR operation to encrypt and decrypt geographic information data, which can realize high-security encrypted storage and high-performance real-time decryption processing of geographic information data on mobile platform. This algorithm is used to process and analyze SRTM data. The experimental results show that the geographic information data encryption technology based on TEA algorithm can effectively realize the encryption and decryption of geographic information data, and meet the requirements of mobile system for high-security storage and high-performance processing of terrain data.

Key words: TEA algorithm, geographic information security, high security storage, real time data decryption

CLC Number: