期刊文献+

大数据系统安全风险评估指标体系与方法探析 被引量:4

Research on Risk Assessment Index System and Method for Big Data System Security
下载PDF
导出
摘要 论文以大数据安全架构为研究内容,分析大数据系统存在的主要安全风险,从多维度对大数据系统构建风险评估体系,并构建了相应的评估指标集,将系统建设与管理信念的概念引入到大数据评估指标体系中,进一步完善、拓展了评估体系,从而根据系统面临的安全威胁特征,选择相应的管理方式与防范措施以降低安全风险,为提高大数据系统的安全性与可靠性提供了相应的依据和方法。 Big data technology is one of the typical representatives in the era of post information technology,however,due to the increasing security risk caused by storage policy and data operation,it attracts people's attention to the problem of data security and personal privacy.Compared with traditional information system,big data system has the characteristics of huge volume,openness and diversification.Thus,current risk assessment method is not able to completely and reliably assess the security of big data system.In this paper the structure of big data security is research content and analyze main security risks,then construct risk assessment system for big data system from multi-dimension and set up the corresponding assessment index set.The conception of system construction and management belief is introduced into assessment system of big data system,further perfect and expand the assessment system.According to characteristics of security threats which is faced,it can choose the appropriate management method and preventive measure to reduce the security risk,and this paper provides corresponding basis and method to improve the security and reliability of big data system.
出处 《安顺学院学报》 2017年第5期120-124,共5页 Journal of Anshun University
基金 国家自然科学基金地区项目"理性隐私计算及隐私风险可控技术研究"(项目编号:61662009) 贵州省高等学校教学内容和课程体系改革(重点)项目"信息系统安全风险评估课程体系结构研究"(项目编号:SJJG201404)的阶段性成果
关键词 大数据 风险 评估指标 管理信念 big data, risk, assessment index, management belief
  • 相关文献

参考文献10

二级参考文献92

  • 1刘正伟,张华忠,文中领,王旭.海量数据持续数据保护技术研究及实现[J].计算机研究与发展,2012,49(S1):37-41. 被引量:16
  • 2曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 3姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 4邹德清,金海,羌卫中,等.云计算安全挑战与实践[J].中国计算机学会通讯,2011,7(12):55-61.
  • 5The big data security gap: protecting the Hadoop custer challenges and opportunities with big data. http://www.zettaset. com/info-center/datasheets/zettaset_wp_security_0413.pdf.
  • 6聂元铭.大数据及其安全研究.信息安全与通信.2013(5):15-16.
  • 7Mell P, Grance T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, 2011.
  • 8Shaftab Ahmed, Azween Abdullah. E-Healthcare and data management services in a cloud[C]// Proc. of High Capacity Optical Networks and Enabling Technologies(HONET). 2011:248-252.
  • 9Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[C]// Proc. of the OSDI.2004:137-150.
  • 10Chuck Lam. Hadoop in Action[M]. 韩冀中译. 北京: 人民邮电出版社, 2011.

共引文献984

同被引文献42

引证文献4

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部