In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in...In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.展开更多
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ...Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.展开更多
A comprehensive analysis of the impact privacy incidents on its market value is given.A broad set of instances of the exposure of personal information from a summary of some security mechanisms and the corresponding r...A comprehensive analysis of the impact privacy incidents on its market value is given.A broad set of instances of the exposure of personal information from a summary of some security mechanisms and the corresponding results are presented. The cumulative effect increases in magnitude over day following the breach announcement, but then decreases. Besides, a new privacy protection property, that is, p-sensitive k-anonymity is presented in this paper to protect against identity disclosure. We illustrated the inclusion of the two necessary conditions in the algorithm for computing a p-k-minimal generalization. Algorithms such as k-anonymity and l-diversity remain all sensitive attributes intact and apply generalization and suppression to the quasi-identifiers. This will keep the data "truthful" and provide good utility for data-mining applications, while achieving less perfect privacy. We aim to get the problem based on the prior analysis, and study the issue of privacy protection from the perspective of the model-benefit.展开更多
The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Compan...The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> during the previous two decades;the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty</span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems.展开更多
Wearable technologies have the potential to become a valuable influence on human daily life where they may enable observing the world in new ways,including,for example,using augmented reality(AR)applications.Wearable ...Wearable technologies have the potential to become a valuable influence on human daily life where they may enable observing the world in new ways,including,for example,using augmented reality(AR)applications.Wearable technology uses electronic devices that may be carried as accessories,clothes,or even embedded in the user's body.Although the potential benefits of smart wearables are numerous,their extensive and continual usage creates several privacy concerns and tricky information security challenges.In this paper,we present a comprehensive survey of recent privacy-preserving big data analytics applications based on wearable sensors.We highlight the fundamental features of security and privacy for wearable device applications.Then,we examine the utilization of deep learning algorithms with cryptography and determine their usability for wearable sensors.We also present a case study on privacy-preserving machine learning techniques.Herein,we theoretically and empirically evaluate the privacy-preserving deep learning framework's performance.We explain the implementation details of a case study of a secure prediction service using the convolutional neural network(CNN)model and the Cheon-Kim-Kim-Song(CHKS)homomorphic encryption algorithm.Finally,we explore the obstacles and gaps in the deployment of practical real-world applications.Following a comprehensive overview,we identify the most important obstacles that must be overcome and discuss some interesting future research directions.展开更多
Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This...Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This is an important issue for big data holders such as public sector organizations(e.g.,Public Health Organizations)and social media companies.This paper looks at how individuals can be identified from big data using a mathematical approach and how to apply this mathematical solution to prevent accidental disclosure of a person’s details.The mathematical concept is known as the“Identity Correlation Approach”(ICA)and demonstrates how an individual can be identified without a name or address using a unique set of characteristics(variables).Secondly,having identified the individual person,it shows how a solution can be put in place to prevent accidental disclosure of the personal details.Thirdly,how to store data such that accidental leaks of the datasets do not lead to the disclosure of the personal details to unauthorized users.展开更多
随着大数据时代的来临,以大数据为基础的云计算技术在社会各个领域得到了越来越多的应用,对社会各领域的发展起到了巨大的推进作用。信息安全技术极大地提高了医院的工作效率,也是医院信息安全工作的重要方法。近几年,随着医疗制度的不...随着大数据时代的来临,以大数据为基础的云计算技术在社会各个领域得到了越来越多的应用,对社会各领域的发展起到了巨大的推进作用。信息安全技术极大地提高了医院的工作效率,也是医院信息安全工作的重要方法。近几年,随着医疗制度的不断深入,医院的发展也面临着越来越多的挑战和机会。在医院日常信息安全技术中,统计信息的信息安全技术工作是非常重要的一环。它牵扯到了大量的用户数据,将会对医院未来的发展产生重大影响。但是,随着信息技术的发展,人类生活的方方面面都面临着信息安全的各种问题。在大数据环境下,如何提升网络环境中的信息安全水平,保证信息的安全传输和存储,这已成为当前研究的热点问题。通过对医院信息系统(Hospital Information System,HIS)存在的安全隐患和目前HIS的信息安全技术状况进行分析,提出了HIS的安全保障措施,以确保HIS系统稳定、高效、安全地运行。展开更多
传统教育大数据管理面临隐私数据泄露、数据可信度存疑和越权访问等安全风险,为了避免上述风险,提出了一种新型基于智能合约的教育大数据安全管理与隐私保护算法:ASPES(algorithm for security management and privacy protection of ed...传统教育大数据管理面临隐私数据泄露、数据可信度存疑和越权访问等安全风险,为了避免上述风险,提出了一种新型基于智能合约的教育大数据安全管理与隐私保护算法:ASPES(algorithm for security management and privacy protection of education big data based on smart contracts),算法融合了基于Shamir秘密共享的密钥切割改进分享算法、基于SM2-SHA256-AES算法的混合加密算法和基于分层数据访问控制的智能合约管理算法.在真实数据集MOOCCube上的实验结果表明,相较于较先进的方法,ASPES的执行效率和安全性有显著提高,可以有效存储和管理教育大数据,实现教育资源的合理分配.ASPES通过向区块链中嵌入智能合约,将数据读写等操作上链,能够优化管理路径、提高管理效率,保证教育公平,极大地提升教育质量.展开更多
基金supported by the Hainan Provincial Key Laboratory of Philosophy and Social Sciences for Hainan Free Trade Port International Shipping Development and Property Rights Digitization,Hainan Vocational University of Science and Technology(Qiong Social Science[2022]No.26).
文摘In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
基金supported by National Key Technology Support Program(No.2013BAD17B06)Major Program of National Social Science Fund(No.15ZDB154)
文摘Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations.
基金Introduction of Talents Lavnching Fund Project of Anhui Polytechnic University,China(No.2015YQ008)
文摘A comprehensive analysis of the impact privacy incidents on its market value is given.A broad set of instances of the exposure of personal information from a summary of some security mechanisms and the corresponding results are presented. The cumulative effect increases in magnitude over day following the breach announcement, but then decreases. Besides, a new privacy protection property, that is, p-sensitive k-anonymity is presented in this paper to protect against identity disclosure. We illustrated the inclusion of the two necessary conditions in the algorithm for computing a p-k-minimal generalization. Algorithms such as k-anonymity and l-diversity remain all sensitive attributes intact and apply generalization and suppression to the quasi-identifiers. This will keep the data "truthful" and provide good utility for data-mining applications, while achieving less perfect privacy. We aim to get the problem based on the prior analysis, and study the issue of privacy protection from the perspective of the model-benefit.
文摘The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> during the previous two decades;the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty</span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems.
文摘Wearable technologies have the potential to become a valuable influence on human daily life where they may enable observing the world in new ways,including,for example,using augmented reality(AR)applications.Wearable technology uses electronic devices that may be carried as accessories,clothes,or even embedded in the user's body.Although the potential benefits of smart wearables are numerous,their extensive and continual usage creates several privacy concerns and tricky information security challenges.In this paper,we present a comprehensive survey of recent privacy-preserving big data analytics applications based on wearable sensors.We highlight the fundamental features of security and privacy for wearable device applications.Then,we examine the utilization of deep learning algorithms with cryptography and determine their usability for wearable sensors.We also present a case study on privacy-preserving machine learning techniques.Herein,we theoretically and empirically evaluate the privacy-preserving deep learning framework's performance.We explain the implementation details of a case study of a secure prediction service using the convolutional neural network(CNN)model and the Cheon-Kim-Kim-Song(CHKS)homomorphic encryption algorithm.Finally,we explore the obstacles and gaps in the deployment of practical real-world applications.Following a comprehensive overview,we identify the most important obstacles that must be overcome and discuss some interesting future research directions.
文摘Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This is an important issue for big data holders such as public sector organizations(e.g.,Public Health Organizations)and social media companies.This paper looks at how individuals can be identified from big data using a mathematical approach and how to apply this mathematical solution to prevent accidental disclosure of a person’s details.The mathematical concept is known as the“Identity Correlation Approach”(ICA)and demonstrates how an individual can be identified without a name or address using a unique set of characteristics(variables).Secondly,having identified the individual person,it shows how a solution can be put in place to prevent accidental disclosure of the personal details.Thirdly,how to store data such that accidental leaks of the datasets do not lead to the disclosure of the personal details to unauthorized users.
文摘随着大数据时代的来临,以大数据为基础的云计算技术在社会各个领域得到了越来越多的应用,对社会各领域的发展起到了巨大的推进作用。信息安全技术极大地提高了医院的工作效率,也是医院信息安全工作的重要方法。近几年,随着医疗制度的不断深入,医院的发展也面临着越来越多的挑战和机会。在医院日常信息安全技术中,统计信息的信息安全技术工作是非常重要的一环。它牵扯到了大量的用户数据,将会对医院未来的发展产生重大影响。但是,随着信息技术的发展,人类生活的方方面面都面临着信息安全的各种问题。在大数据环境下,如何提升网络环境中的信息安全水平,保证信息的安全传输和存储,这已成为当前研究的热点问题。通过对医院信息系统(Hospital Information System,HIS)存在的安全隐患和目前HIS的信息安全技术状况进行分析,提出了HIS的安全保障措施,以确保HIS系统稳定、高效、安全地运行。
文摘传统教育大数据管理面临隐私数据泄露、数据可信度存疑和越权访问等安全风险,为了避免上述风险,提出了一种新型基于智能合约的教育大数据安全管理与隐私保护算法:ASPES(algorithm for security management and privacy protection of education big data based on smart contracts),算法融合了基于Shamir秘密共享的密钥切割改进分享算法、基于SM2-SHA256-AES算法的混合加密算法和基于分层数据访问控制的智能合约管理算法.在真实数据集MOOCCube上的实验结果表明,相较于较先进的方法,ASPES的执行效率和安全性有显著提高,可以有效存储和管理教育大数据,实现教育资源的合理分配.ASPES通过向区块链中嵌入智能合约,将数据读写等操作上链,能够优化管理路径、提高管理效率,保证教育公平,极大地提升教育质量.