Research on key strategies and analytics of big data security

被引:0
|
作者
Zhao, Duanyang [1 ]
Xu, Qingxiang [1 ]
机构
[1] Zhejiang Univ Technol, Zhijiang Coll, Hangzhou 310024, Zhejiang, Peoples R China
来源
AGRO FOOD INDUSTRY HI-TECH | 2017年 / 28卷 / 03期
关键词
Big data; security strategy; privacy protection; symmetric cryptosystem; encryption algorithm; fully homomorphic encryption;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Everything around us at all times generates big data. Every digital process and social media exchange produces it. Systems, sensors and mobile devices transmit it. It is arriving from multiple sources at a volume, variety, velocity and veracity. It is changing the way people within organizations work together. The paper summarizes and analyzes the security challenges in big data searches, and introduces the key technologies of these relevant challenges. In security and privacy protection of big data, the paper is focus on specific research status, such as the anonymous technology, watermarking technology, provenance technology, which has solved several existing information security and privacy protection problems. In the calculation of big data, data and calculations need to be saved in ciphertext format. An effective way to handle calculation problems of big data is to use homomorphic encryption scheme, especially the fully homomorphic encryption scheme that can make arbitrary ciphertext complex calculations, and it is the perfect solution to calculate privacy protection problems of big data in theory.
引用
收藏
页码:1211 / 1217
页数:7
相关论文
共 50 条
  • [1] Big Data Analytics for Security
    Cardenas, Alvaro A.
    Manadhata, Pratyusa K.
    Rajan, Sreeranga P.
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (06) : 74 - 76
  • [2] Security Analytics: Big Data Analytics for Cybersecurity
    Mahmood, Tariq
    Afzal, Uzma
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 129 - 134
  • [3] Big Data Analytics for Cyber Security
    Angin, Pelin
    Bhargava, Bharat
    Ranchal, Rohit
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [4] Security Analytics in the Big Data Era
    Mondek, Dusan
    Blazek, Rudolf B.
    Zahradnicky, Tomas
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 605 - 606
  • [5] Big Data Analytics for Information Security
    Szczypiorski, Krzysztof
    Wang, Liqiang
    Luo, Xiangyang
    Ye, Dengpan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Big Data Analytics of Financial Strategies
    Egara, Kabaji
    Peng, Yonghong
    [J]. 2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, : 529 - 535
  • [7] Benefits and Security Challenges of Big Data Analytics
    Iliev, Alexander I.
    [J]. DIGITAL PRESENTATION AND PRESERVATION OF CULTURAL AND SCIENTIFIC HERITAGE, 2023, 13 : 169 - 180
  • [8] Big data analytics for security and criminal investigations
    Pramanik, M. I.
    Lau, Raymond Y. K.
    Yue, Wei T.
    Ye, Yunming
    Li, Chunping
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2017, 7 (04)
  • [9] Benefits and Security Challenges of Big Data Analytics
    Iliev, Alexander I.
    [J]. DIGITAL PRESENTATION AND PRESERVATION OF CULTURAL AND SCIENTIFIC HERITAGE, 2023, 13 : 169 - 180
  • [10] SECURITY SOLUTIONS FOR BIG DATA ANALYTICS IN HEALTHCARE
    Rao, Smitha
    Suma, S. N.
    Sunitha, M.
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015, 2015, : 510 - 514