期刊文献+

大数据安全保护策略研究 被引量:1

Research on big data security protection strategy
下载PDF
导出
摘要 随着数据价值的体现,大数据技术得到了飞速发展,在海量数据资源为各行业提供可用信息、决策依据和高品质服务的同时,也给网络安全、个人隐私安全带来了新的挑战。论文通过剖析大数据技术特点和其引发的安全风险事件,结合我国网络信息安全管理现状,从管理策略和技术保障等方面完善并规范数据的分类分级管理,并针对大数据全生命周期涉及的各环节建立健全的流程规范提出建议,促进我国大数据技术良性循环发展。 With the embodiment of the value of data, big data technology has developed rapidly. Massive data resources provide information, decision basis and high quality service for various industries. It also brings new challenges to network security and personal privacy security. By analyzing the characteristics of large data technology and the security risk events caused by it, and combining with the current situation of network information security management in China, this paper improves and standardizing the classification and classification of data from management strategy and technical support, and puts forward suggestions on the establishment of a sound process specification for all links involved in the whole life cycle of big data. Promote the development of China's big data technology.
作者 李璐 焦程鹏 Li Lu;Jiao Chengpeng(Military Security Qualification Examination and Certification Center,Beijing 100089;Institute of Information Engineering,CAS,Beijing 100093)
出处 《网络空间安全》 2018年第5期8-12,22,共6页 Cyberspace Security
关键词 大数据技术 信息安全 数据泄露 保护策略 big data technology information security data leakage protection strategy
  • 相关文献

参考文献10

二级参考文献95

  • 1曹建国,王丹,王威.基于RSA公钥密码安全性的研究[J].计算机技术与发展,2007,17(1):172-173. 被引量:22
  • 2刘鹏.云计算的定义和特点[EB/OL].http://www.chinacloud.cn/show.aspx?id=741&cid=17.2009-05-19.
  • 3武永卫 黄小猛.云存储.中国计算机学会通讯,2009,5(6):44-52.
  • 4[OL].<http://hadoop.apache.org.>.
  • 5Rangan K, Cooke A, Post J , et al. The Cloud Wars: 100+ billion at stake [J].Analyst The, No. 2008:1 -90.
  • 6Armbrust M, Fox A, Griffith R, etal. Above the clouds: A Berkeley view of cloud computing [J].University of California at Berke ley: Technical Report No. UCB/ EECS 2009 -28, 2009.
  • 7Bellard F. QEMU, a Fast and Portable Dynamic Translator [A]. Proceedings of the USENIX Annual Technical Conference [C]. FREENIX Track, 2005.
  • 8WinterCorp: 2005 TopTen Program Summary. http:// www. wintercorp, com/WhitePapers/WC TopTenWP. pdf.
  • 9TDWI Checklist Report: Big Data Analytics. http://tdwi. org/research/2010/08/Big-Data-Analytics, aspx.
  • 10Chaudhuri S, Dayal U. An overview of data warehousing and OLAP technology. SIGMOD Rec, 1997,26(1): 65-74.

共引文献2799

同被引文献22

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部