期刊文献+

大数据的安全与隐私保护 被引量:5

On the Big Data Security and Privacy Protections
下载PDF
导出
摘要 网络的迅速发展,带来了大数据时代。大数据对人们的日常生活、生产经济方式等都有着潜移默化的影响,是现今社会各界的关注热点。目前而言大数据的收集、综合应用技术还不够成熟,使用大数据的同时还面临着一系列的安全问题:信息真实性没有保障,用户隐私泄露。文章根据大数据的基本概述,结合当前发展大数据所面对的安全挑战,对大数据安全与隐私保护关键技术进行探讨。 The rapid development of the network, bringing the era of big data. Impact of big data on people's daily life, production economics and so has a subtle way, is now the concerns of the community hot spots. Currently the col ection of data in terms of large, integrated application of technology is not mature enough, the use of large data, while also facing a series of security problems:there is no guarantee the authenticity of information, disclosure of user privacy. According to the basic outlines of big data, combined with the current development of big data security chal enges faced by large data security and privacy protection of key technologies of micro probe.
作者 张志平
出处 《信息安全与技术》 2015年第1期11-13,共3页
关键词 大数据 数据安全 信息安全 隐私保护 big data data security information security privacy
  • 相关文献

参考文献3

二级参考文献14

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2Greg Linden,Brent Smith,Jeremy York.Amazon.com recommendations: item-to-item collaborative filtering[].IEEE Internet Computing.2003
  • 3.William Prosser Privacy[].California Law Review.1960
  • 4Halvorson,George C.Health care reform nowl;A prescription for change[]..2007
  • 5J.J.Abrams,Bryan Burk.Person of lnterest. http://www.cbs com/shows/ person_of_interest . 2011
  • 6Duhigg,Charles.How companies learn your secrets[].The New York Times.2012
  • 7X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
  • 8Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
  • 9Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
  • 10Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)

共引文献739

同被引文献14

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部