期刊文献+

基于大数据的信息传输过程中数据安全性的研究 被引量:12

Research on data security in information transmission based on big data
在线阅读 下载PDF
导出
摘要 随着云计算中应用程序急剧增长,大数据传输过程中的安全问题已经成为一个相当大的问题。数据加密的执行时间是数据处理和传输过程中的一个重要问题。针对许多当前的应用程序放弃数据加密,以达到与隐私相关的采用性能级别的问题,以隐私问题为研究重点,提出了一种新的数据加密方法,即动态数据加密策略。提出的方法旨在有选择地加密数据,并在时间限制下使用隐私分类方法。此方法通过在所需执行时间要求内使用选择性加密策略来最大化隐私保护范围。实验中对动态数据加密策略的性能进行评估,不同的实验设置在输入数据不同、约束条件不同的情况下,使用该加密策略具有很大的优势,可以实现高效的方法生成。 With the rapid growth of applications in cloud computing, the security problem in the process of big data transmission has become a considerable problem. The execution time of data encryption is an important problem in the process of data processing and transmission. For many current applications, data encryption is abandoned to achieve privacy related adoption performance levels. This paper focuses on the privacy problem, and proposes a new data encryption method, which is dynamic data encryption strategy. The method proposed in this paper aims to selectively encrypt data and use privacy classification method under time constraints. This method maximizes the scope of privacy protection by using selective encryption policy within the required execution time. In the experiment, the performance of dynamic data encryption strategy is evaluated. Different experimental settings are different in the input data and constraints. Using this encryption strategy has great advantages and can achieve efficient method generation.
作者 陈亚科 Chen Yake(China Coal Research Institute,Beijing 100020,China)
出处 《电子测量技术》 2020年第7期119-123,共5页 Electronic Measurement Technology
基金 国家科技重大专项(2016ZX05045007-002)
关键词 大数据 模型 安全 加密 big data model security encryption
  • 相关文献

参考文献13

二级参考文献111

  • 1赵庆林,张玉军.增强移动IP性能的快速切换技术综述[J].计算机工程,2005,31(7):3-4. 被引量:3
  • 2翟伟,陈治安.IP性能测试方法及使用寿命的研究[J].医疗设备信息,2005,20(12):9-10. 被引量:2
  • 3Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks//Proceedings of the 10th IEEE International Conference on Computer and Information Technology.Bradford,UK,2010.2463-2470.
  • 4Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks//Proceedings of the 9th ACM Conference on Computer and Communications Security.Washington,USA,2002:41-47.
  • 5Levis P,Lee N,Welsh M,Culler D.TOSSIM:Accurate and scalable simulation of entire TinyOS applications//Proeeedings of the 1st International Conference on Embedded Networked Sensor Systems.Los Angeles,USA,2003:126-137.
  • 6Szewcayk R,Ferencz A.Energy implications of network sensor designs.Berkeley:Berkeley Wireless Research Center Report,2000.
  • 7Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion:A scalable and robust communication paradigm for sensor networks//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston,USA,2000:56-67.
  • 8Madden S,Franklin M J,Hellerstein J M.TAG:A tiny aggregation service for ad-hoc sensor networks//Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York,USA,2002:131-146.
  • 9He W,Liu X,Nguyen H,Nahrstedt K,Abdelzaher T.PDA:Privacy-preserving data aggregation in wireless sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications.Anchorage,AK,2007:2045-2053.
  • 10He W,Nguyen H,Liu X,Nahrstedt K,Abdelzaher T.iPDA:An integrity-protecting private dgta aggregation scheme for wireless sensor networks//Proceedings of the Military Communications Conference.San Diego,CA,2008:1-7.

共引文献197

同被引文献110

引证文献12

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部