The analysis of big Data application mode and security risk

被引:0
|
作者
Zeng Tai-sheng [1 ,2 ,3 ]
机构
[1] Quanzhou Normal Univ, Fac Math & Comp Sci, Quanzhou 362000, Fujian, Peoples R China
[2] Fujian Prov Key Lab Data Intens Comp, Quanzhou 362000, Fujian, Peoples R China
[3] Fujian Prov Univ, Key Lab Intelligent Comp & Informat Proc, Quanzhou 362000, Fujian, Peoples R China
关键词
big data; security analysis; Hadoop;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In the current social background, Existing facilities and tools already can not meet the needs of big data in expanding and analysis techniques. Today's data storage and analysis work is achieved under cloud conditions and Hadoop were set up. Under the conditions for cloud computing, cloud computing applications who have remote data files were not authorized to read its contents, which results in unauthorized manipulation, and it will produce a lot of security risks for large data. In this paper, according to the cloud of different modes, Hadoop different stages of the operation, subject to the threat of non-confidence and security to steal big data generated to analyze a variety of privacy, with threat model as an example, it explores ways to address security threats.
引用
收藏
页码:1835 / 1839
页数:5
相关论文
共 50 条
  • [31] A Study on the Big Data Log Analysis for Security y
    Jeon, Kyung-Sik
    Park, Se-Jeong
    Chun, Sam-Hyun
    Kim, Jong-Bae
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 13 - 20
  • [32] Application of Image Encryption Algorithm for Wireless Sensor Network in the Security Analysis of Public Big Data
    Geng, Qiang
    Yan, Huifeng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] Innovative Methodology for Elevating Big Data Analysis and Security
    Alouneh, Sahel
    Hababeh, Ismail
    Al-Hawari, Feras
    Alajrami, Tamer
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON OPEN SOURCE SOFTWARE COMPUTING (OSSCOM), 2016,
  • [34] A Framework for Big Data Security Analysis and the Semantic Technology
    Yao, Yuangang
    Zhang, Lei
    Yi, Jin
    Peng, Yong
    Hu, Weihua
    Shi, Lei
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 246 - 249
  • [35] Big Cyber Security Data Analysis with Apache Mahou
    Adekanbmi, Omotola
    Wimmer, Hayden
    Kim, Jongyeop
    [J]. 2022 IEEE/ACIS 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2022, : 83 - 90
  • [36] Application of innovative risk early warning mode under big data technology in Internet credit financial risk assessment
    Du, Guansan
    Liu, Zixian
    Lu, Haifeng
    [J]. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2021, 386
  • [37] An Analysis of Data Mining and Application in the Era of Big Data
    Zhang, Yue
    Du, Li
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 284 - 288
  • [38] A Meta-analysis of Big Data Security: How the Government Formulates a Model of Public Information and Security Assurance into Big Data
    Nurmandi, Achmad
    Kurniawan, Danang
    Misran
    Salahudin
    [J]. HCI INTERNATIONAL 2021 - LATE BREAKING POSTERS, HCII 2021, PT II, 2021, 1499 : 472 - 479
  • [39] The application of big data technology in the innovation and effect analysis of art teaching mode in colleges and universities
    Xinxiang University, Henan, Xinxiang
    453000, China
    [J]. Appl. Math. Nonlinear Sci., 2024, 1
  • [40] Research of Big data and data security
    Ren, Qiong
    Xu, Zhongyuan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 871 - 875