期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
大数据技术在现代计算机信息安全领域的应用研究 被引量:4
1
作者 斯琴 《内蒙古科技与经济》 2023年第3期112-115,共4页
文章从3个方面提出大数据技术在现代计算机信息安全领域的应用构想,即:建立现代计算机信息安全数据服务中心;充分运用爬虫等技术进行计算机信息安全数据搜集;云计算技术助力数据信息的深度挖掘。通过上述3个方面构建起大数据技术在现代... 文章从3个方面提出大数据技术在现代计算机信息安全领域的应用构想,即:建立现代计算机信息安全数据服务中心;充分运用爬虫等技术进行计算机信息安全数据搜集;云计算技术助力数据信息的深度挖掘。通过上述3个方面构建起大数据技术在现代计算机信息安全领域的应用体系。以保障计算机信息安全为出发点与落脚点,对大数据技术在现代计算机信息安全领域中的应用进行了研究。 展开更多
关键词 数据技术 安全数据服务中心 数据搜集 数据存储 云计算
下载PDF
基于大数据的安防体系建设分析
2
作者 赵莹莹 《数字通信世界》 2024年第4期46-48,共3页
大数据应用范围的不断扩大,不仅为社会发展提供了有力支持,而且还为数据网络带来了更多安全风险。为提升现代数据网络安全性,应构建完善的数据网络安防体系。基于此,文章对基于大数据的安防体系总体设计思路做了简单介绍,进而对安防体... 大数据应用范围的不断扩大,不仅为社会发展提供了有力支持,而且还为数据网络带来了更多安全风险。为提升现代数据网络安全性,应构建完善的数据网络安防体系。基于此,文章对基于大数据的安防体系总体设计思路做了简单介绍,进而对安防体系框架及数据安全中台进行设计。 展开更多
关键词 数据 安防体系 数据 安全数据服务 共享平台
下载PDF
Secure Big Data Storage and Sharing Scheme for Cloud Tenants 被引量:10
3
作者 CHENG Hongbing RONG Chunming +2 位作者 HWANG Kai WANG Weihong LI Yanyan 《China Communications》 SCIE CSCD 2015年第6期106-115,共10页
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in... The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants. 展开更多
关键词 cloud computing big data stor-age and sharing security
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
4
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 PRIVACY-PRESERVING data perturbation RETRIEVAL access control cloudcomputing
下载PDF
Toward Energy-Efficient and Trustworthy eHealth Monitoring System 被引量:1
5
作者 Ajmal Sawand Soufiene Djahel +1 位作者 Zonghua Zhang Farid Na?t-Abdesselam 《China Communications》 SCIE CSCD 2015年第1期46-65,共20页
The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant p... The rapid technological convergence between Internet of Things (loT), Wireless Body Area Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising application domain, which has significant potential to improve the quality of medical care. In particular, patient-centric health monitoring plays a vital role in e-healthcare service, involving a set of important operations ranging from medical data collection and aggregation, data transmission and segregation, to data analytics. This survey paper firstly presents an architectural framework to describe the entire monitoring life cycle and highlight the essential service components. More detailed discussions are then devoted to {/em data collection} at patient side, which we argue that it serves as fundamental basis in achieving robust, efficient, and secure health monitoring. Subsequently, a profound discussion of the security threats targeting eHealth monitoring systems is presented, and the major limitations of the existing solutions are analyzed and extensively discussed. Finally, a set of design challenges is identified in order to achieve high quality and secure patient-centric monitoring schemes, along with some potential solutions. 展开更多
关键词 eHealthcare wireless body area networks cyber physical systems mobile crowd sensing security privacy by design trust.
下载PDF
Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks 被引量:2
6
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第3期104-117,共14页
Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we p... Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we propose a secure data sharing scheme in 0SNs based on ciphertext-policy attribute- based proxy re-encryption and secret sharing. In order to protect users' sensitive data, our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider. Our scheme presents a multiparty access control model, which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy. Further, we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider. We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext. Moreover, our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 展开更多
关键词 data sharing online socialnetworks multiparty access control attribute-based encryption attribute revocation
下载PDF
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
7
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部