Research Article

[Retracted] Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing

Algorithm 3

The following diagram depicts the ASCII encryption and decryption method.
Algorithm Encryption
{
SD = Secret Date, K = Key, Pid = Public ID Encrypt ()
Begin
string[] = SD [] = to convert ASCII String2 (SD)
Split(String2,10) until the duration is reached (String2)[]=DeciConv String2 (String2)
Until String[SD]10 split(String2)String2[SD]Pid Cipher=Cipher[] should be returned.
Return 1[] String
End
}
Algorithm DecryptionE
{
public static String decrypt(String algorithm, String cipherText, SecretKey key)
    Cipher cipher = Cipher.getInstance(key);
   cipher.init(Cipher.DECRYPT_MODE, key);
   byte[] plainText = cipher.doFinal(Base64.getDecoder()
    .decode(cipherText));
   return new String(plainText);
}