Research on protecting information security based on the method of hierarchical classification in the era of big data

被引:0
|
作者
Yang G. [1 ,4 ]
Yang M. [2 ]
Salam S. [3 ]
Zeng J. [1 ,4 ]
机构
[1] School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing
[2] School of Automation, Beijing University of Posts and Telecommunications, Beijing
[3] Beaconhouse School System, Peshawar
[4] School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing
来源
Computers, Materials and Continua | 2020年 / 61卷 / 03期
关键词
Big data; Hierarchical classification; Information index system; Rough sets;
D O I
10.32604/JCS.2019.05947
中图分类号
学科分类号
摘要
Big data is becoming increasingly important because of the enormous information generation and storage in recent years. It has become a challenge to the data mining technique and management. Based on the characteristics of geometric explosion of information in the era of big data, this paper studies the possible approaches to balance the maximum value and privacy of information, and disposes the Nine-Cells information matrix, hierarchical classification. Furthermore, the paper uses the rough sets theory to proceed from the two dimensions of value and privacy, establishes information classification method, puts forward the countermeasures for information security. Taking spam messages for example, the massive spam messages can be classified, and then targeted hierarchical management strategy was put forward. This paper proposes personal Information index system, Information management platform and possible solutions to protect information security and utilize information value in the age of big data. Copyright © 2019 Tech Science Press
引用
收藏
页码:19 / 28
页数:9
相关论文
共 50 条
  • [41] Research on Clothing and Accouterment Security Based on Big Data
    Fei, Xian-hong
    Zhai, Cheng-gong
    Qiao, Han
    PROCEEDINGS OF THE 2018 2ND HIGH PERFORMANCE COMPUTING AND CLUSTER TECHNOLOGIES CONFERENCE (HPCCT 2018), 2018, : 19 - 23
  • [42] The Research on Big Data Security Architecture Based on Hadoop
    Zhuang, Miao
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 241 - 244
  • [43] Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing
    Thu Yein Win
    Tianfield, Huaglory
    Mair, Quentin
    IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (01) : 11 - 25
  • [44] Research about New Media Security Technology base on Big Data Era
    Lu, Zheng-wu
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 933 - 936
  • [45] Research on regional spatial logistics information integration method based on big data
    Chen X.-D.
    Kalra G.
    International Journal of Information Technology and Management, 2021, 20 (03) : 234 - 249
  • [46] A Hierarchical Security Model for Multimedia Big Data
    Chen, Min
    INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT, 2014, 5 (01): : 1 - 13
  • [47] Discussion on Computer Network Security Prevention Based on Big Data Era
    Sun, Lixian
    Journal of Physics: Conference Series, 2021, 1848 (01)
  • [48] Quantum Cryptology in the Big Data Security Era
    Majdoubi, Chaymae
    El Mendili, Saida
    Gahi, Youssef
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (07) : 618 - 627
  • [49] Guest Editorial Big Security Challenges in Big Data Era
    Li, Hongwei
    Lu, Rongxing
    Misic, Jelena
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 521 - 523
  • [50] Research on information security and privacy protection model based on consumer behavior in big data environment
    Li, Yuxue
    Song, Lijun
    Zeng, Yucheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (10):