期刊文献+

大数据视域下的虚拟学习社区安全研究——基于门限代理签名的协同学习系统探讨 被引量:15

Research on Security of Virtual Learning Community Based on Big Data: Collaboration Learning System Based on Threshold Proxy Signature
下载PDF
导出
摘要 在"大数据"时代,数据管理成为虚拟学习社区面临的重要挑战,而学习资源的数据安全是数据管理的核心。通过文献研究,得出目前大数据的规模和来源;从学习资源共享和保护两方面,分析了大数据对虚拟学习社区产生的新影响和大数据下虚拟学习社区呈现的新特点以及虚拟学习社区面临的安全威胁和挑战。随着大数据海量信息的爆炸式增长,传统的虚拟学习社区资源保护技术和方法力不从心,结合虚拟学习社区的特点和功能,提出了门限代理签名在虚拟学习社区的应用。协同学习作为虚拟学习社区的一种重要形式,成为人们学习、探索知识的有效方式之一;通过分析大数据时代虚拟社区协同学习的分布式特点、新的演变和组成要素,厘清了虚拟学习社区中协同学习的安全需求,提出了基于门限代理签名的协同学习安全保护方案,以期为大数据时代虚拟学习社区提供安全的网络学习环境做出理论的新探索。 In "Big data" era,data management has become the important challenges faced by the virtual learning community,and the data security of learning resources is the core of data management.Through literature review,the current scale and sources of big data are obtained;and from two aspects of learning resources sharing and protection,the new impact of big data on virtual learning community is analyzed.Besides,new characteristics of virtual learning community and security threats and challenges that virtual learning community is facing are dissected in the paper as well.With the explosive growth of big data,the traditional protection technology and methods cannot solve the problem.Therefore,with the features and functions of virtual learning community,the threshold proxy signature is proposed to be applied into virtual learning community.As a specific form of virtual learning community,collaborative learning becomes one of the effective ways to acquire and search for knowledge.By analyzing the distribution characteristics,the new evolution and elements of and by differentiating the security demands of collaborative learning in virtual learning community,one security protection scheme based on threshold proxy signature for collaborative learning is proposed,so as to explore new theories on secure network learning circumstances for virtual learning community under big data.
出处 《远程教育杂志》 CSSCI 2013年第4期76-82,共7页 Journal of Distance Education
基金 国家自然科学基金项目"基于位置的认证协议研究"(61170227) 上海市哲学社会科学规划课题"虚拟学习社区知识资源保护研究"(编号:2013BTQ001)的部分研究成果
关键词 大数据 虚拟学习社区 协同学习 门限代理签名 安全保护方案 Big data Virtual learning community Collaborative learning Threshold proxy signature Security protection scheme
  • 相关文献

参考文献9

  • 1CCF大数据专家委员会.大数据热点问题与2013年发展趋势分析[J].中国计算机学会通讯.2012,(12):40-44.
  • 2易珂.大数据算法[J].中国计算机学会通讯.2012,(12):60.
  • 3[美]维克托·迈尔·舍恩伯格,周涛译.大数据时代[M].浙江人民出版社,2012:12.
  • 4J. Gantz& D. Reinsel. The Digital Universe Decade-Are You Ready?, IDC White Paper, May 2010.
  • 5阳振坤,张清,王勇,等.大数据的魔力[J].中国计算机学会通讯.2012.8(6):17-21.
  • 6D. Zeng et al., Social Media Analytics and Intelligence, IEEE Intelli- gent Systems,vol.25,no.6,2010,13-16.
  • 7M. Mambo, K. Usuda&E. Okamoto. Proxy signatures for delegating signing operation.Proc.3rd ACM Conference on Computer and Communications Security.ACM Press. 1996,48-57.
  • 8李凤英,高志军,张际平.基于门限代理签名的在线答辩系统的设计与实现[J].现代远程教育研究,2010(5):76-80. 被引量:5
  • 9李明,吴忠.信息安全发展研究与综述[J].上海工程技术大学学报,2005,19(3):258-262. 被引量:11

二级参考文献17

  • 1李家春,李之棠.动态网络安全模型的研究[J].华中科技大学学报(自然科学版),2003,31(3):40-42. 被引量:16
  • 2吴敏,王汝传.代理盲签名方案在基于移动代理的电子商务中的应用研究[J].南京邮电学院学报(自然科学版),2005,25(5):84-88. 被引量:3
  • 3Cha,J.C.& Cheon,J.H.(2003).An identity-based signature from gap diffie-hellman groups[C].Lect.Notes Computer Sci., 2567:18-30.
  • 4Boneh,D.,Lynn,B.& Shacham,H.(2001).Short Signature from the Well Pairing[C].Advances in Cryptology-Asiacrypt' 01, Springer Verlag.
  • 5Hwang, S.J. and Chen,C.C.(2001).A new multi-proxy multi-signature scheme~C].National Computer Symposium: Information Security, Taipei, F019-F026.
  • 6Mambo, M., Usuda, K. & Okamoto, E.(1996). Proxy Signature for Delegating Signing Operation[C]. Proceedings of the 3.th ACM Conference on Computer and Communications Security, New Detdi, India, ACM Press, New York, 48-57.
  • 7侯世达 郭维德 译.哥德尔、艾舍尔、巴赫-集异壁之大成[M].北京:商务印书馆,1996..
  • 8Alberts C, Dorofee A. Managing Information Security Risks: The OCTAVE Approach[M]. Tsinghua University Press, 2003.
  • 9Stallings W. Cryptography and Network Security:Principles and Practice [M]. Tsinghua University Press, 2002.
  • 10Whitman M E, Herbert Jmattord. Principles of Information Security [M]. Tsinghua University Press,2003.

共引文献15

同被引文献134

引证文献15

二级引证文献522

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部