期刊文献+

面向大数据的非结构化数据安全保障技术研究 被引量:4

Research on security technology for big-data-oriented unstructured data
下载PDF
导出
摘要 针对大数据的非结构化数据安全问题,基于数据类型和数据敏感度级别,提出了一种保障非结构化数据安全的方法.首先,通过数据分析获取所需数据类型和敏感度级别,并构建数据库的数据节点.其次,为数据节点提供安全算法,这些安全算法与数据节点交互形成安全套件.再次,通过接口的调度算法为非结构化数据提供足够的安全性,以及降低系统的开销和提高访问效率.最后,通过实验表明该方法在能够充分地保障大数据安全的前提下,系统的时间开销不超过传统方法的52.85%. Aiming at the problem of unstructured data security,a method to guarantee unstructured data security is proposed by considering types of data and their sensitivity levels.Firstly,types of data and their sensitivity levels are obtained through different analysis methods of data,and then the data nodes of the database are constructed.Secondly,security algorithms are designed for data nodes.These security algorithms interact with data nodes to form security suites.Thirdly,the security suite provides enough security for unstructured datathrough the scheduling algorithm of the interface,as well as reducing the overhead of the system and improving access efficiency.Finally,the experiment shows that this method can guarantee the security of large data fully,and the time cost of the system does not exceed 52.85%of the traditional processing time.
作者 陈志辉 吴敏敏 CHEN Zhihui;WU Minmin(College of Information Engineering,Putian University,Putian 351100,China)
出处 《延边大学学报(自然科学版)》 CAS 2019年第1期58-63,共6页 Journal of Yanbian University(Natural Science Edition)
基金 福建省教育厅中青年教师教育科研项目(JK180480) 莆田市科技项目(2015G2011)
关键词 非结构化数据 数据安全 数据分析 隐私保护 访问控制 安全套件 unstructured data data security data analysis privacy protection access control security suites
  • 相关文献

参考文献3

二级参考文献22

  • 1刘玮,王丽宏.云计算应用及其安全问题研究[J].计算机研究与发展,2012,49(S2):186-191. 被引量:26
  • 2云计算百科.什么是云计算平台?云计算平台有哪些?[EB/OL].http://www.cloudwhy.com/mingci/2011/0317/128.ht-ml,2012-06-12.
  • 3韩伟,张福生,胡志勇.基于Hadoop云计算平台下DDoS攻击防御研究[D].太原:太原科技大学,2011,07.
  • 4Hadoop.[EB/OL].http://hadoop.apache.org/,2012-06-12.
  • 5Nutch.[EB/OL].http://nutch.apache.org/,2012-06-12.
  • 6White T.Hadoop:The Definitive Guide(2ndedition)[M].2009-05.
  • 7it168.com.浅谈Hadoop系统架构与海量数据分析[EB/OL].http://wenku.it168.com/d_ 00076703.shtml,2012-06-12.
  • 8Becherer A.Attacking Kerberos and the New Hadoop Security Design[EB/OL].http://www.ipma-wa.com/prof_dev/2011/HadoopSecurityDesigr_201104_AndrewBecherer.pdf,2012-06-13.
  • 9Yahoo.Scaling Hadoop to 4000 nodes atYahoo![EB/OL].http://developer.yahoo.com/blogs/hadoop/scaling-hadoop-4000-nodes-yahoo-410.html,2008-09-30.
  • 10O'Malley O,Zhang Kan,Radia S.Hadoop Security Design[EB/OL].http:/www.valleytalk.org/wp-content/uploads/2013/03/hadoop-security-design.pdf,2009-10.

共引文献21

同被引文献28

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部