期刊文献+

云时代下的大数据安全技术 被引量:23

Security Technology of Big Data in the Cloud Era
下载PDF
导出
摘要 认为云计算结合大数据,是时代发展的必然趋势。提出了保障大数据安全的方法和技术,方法包括:构建云环境下的大数据信息安全体系,建立并研究基于Hadoop的大数据安全架构等;技术包括:基于大数据的威胁发现技术、大数据真实性分析技术、基于大数据的认证技术、基于大数据的安全规则挖掘技术,以及防范高级持续性威胁(APT)攻击的技术。认为大数据带来许多新的安全问题和挑战,但它本身也是解决问题的重要手段,需要进一步地研究。 The combination of cloud computing and big data is an inevitable trend. In this paper, methods and techniques for ensuring the security of large data are presented. These methods include: building a large data information security system in a cloud environment and establishing and studying the big data security architecture based on Hadoop. These techniques include: threat discovery based on big data, big data authenticity analysis, authentication based on big data, security rule mining based on big data, and preventing advanced persistent threat(APT) attack.Big data creates many new security problems and challenges, but it is also an important means to solving the problem, which needs for further research.
出处 《中兴通讯技术》 2016年第1期14-18,共5页 ZTE Technology Journal
基金 国家自然科学基金(60973142) 福建省教育厅A类科技项目(JA14358)
关键词 大数据 云计算 大数据安全 APT攻击 数据挖掘 big data cloud computing big data security APT attack data mining technology
  • 相关文献

参考文献21

  • 1MANADHATA P K.Big Data for Security:Challenges,Opportunities,and Examples[C]//Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security,Raleigh,North Carolina,USA,2012. 被引量:1
  • 2YU S C,WANG C,REN K,et al.Achieving Secure,Scalable,and Fine-grained Data Access Control in Cloud Computing[C]//Proceedings of the INFOCOM'10,the 29th conference on Information communication,Piscataway,USA,2010:534-542. 被引量:1
  • 3BELARE M and ROGAWAY P.Introduction to Modern Cryptography[J].Ucsd Cse,2005:207. 被引量:1
  • 4GENTRY C,HALEVI S,SMART N P.Homomorphic Evaluation of The AES Circuit[M].Germany:Springer Berlin Heidelberg,2012. 被引量:1
  • 5CATALANO D.Paillier's Cryptosystem Revisited[C]//in Proceedings of the 8th ACM conference on Computer and Communications Security,PA,USA,2001:206-214. 被引量:1
  • 6BENDLIN R,DAMGARD I,ORLANDI C,et al.Semi-Homomorphic Encryption and Multiparty Computation[M].Germany:Springer Berlin Heidelberg,2011. 被引量:1
  • 7GENTRY C.A Fully Homomorphic Encryption Scheme[D].Standford University,2009. 被引量:1
  • 8ITANI W,KAYSSI A,CHEHAB A.Privacy As a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures[C]//Eighth IEEE International Conference on Dependable,Autonomic and Secure Computing,Washington DC,USA,2009:711-716.doi:10.1109/DASC.2009.139. 被引量:1
  • 9CREESE S,HOPKINS P,PEARSON S,et al.Data Protection-Aware Design for Cloud Services[M].Germany:Springer Berlin Heidelberg,2009. 被引量:1
  • 10PARAKH A,KAK S.Space Efficient Secret Sharing for Implicit Data Security[J].Information Science,2011,181(2):335-341. 被引量:1

同被引文献128

引证文献23

二级引证文献144

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部