Study on the Information Security of the Age of Big Data

来源 :2014年国际计算机科学与软件工程学术会议 | 被引量 : 0次 | 上传用户:sunrise617
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  As one of the era core competitiveness,big data has become a hotspot in the field of information technology after cloud computing,Internet of things.Big data bring decision value for the enterprise and user,but also the challenge of information security can not be ignored.This paper introduces the concept and characteristics of large data,in-depth analysis of big data to information security challenges,and some suggestions on information security of the age of big data which include: enhance the awareness of information security,promptly introduce relevant policies,ensure network security,protect personal privacy,strengthen the large data storage and application safety,protect cloud security.
其他文献
会议
Environmental monitoring and control is very important for Modern agriculture.Focusing on the requirements of scalability,operability and reliability,the IOT is applied in agricultural monitoring syst
According to the characteristics of the rural distribution grid,the use of simple and effective method of distribution network nodes,numbering the branch line,branch line loss as state variable,the im
Virtools 5 has strong interactivity,portability is good,operation and low environmental requirements,combined with practical training,and this paper puts forward Virtools 5 development of onboard equi
For the intention that students can better grasp the related knowledge about NC technology,understand the use and operation of NC equipment,get familiar with the NC programming,the author researched a
Recent years have seen more and more embedded devices used in IA (information appliance),PDA and industrial automation.In this paper,we propose a novel version of the application of embedded devices i
With the rapid development of Internet technology,how to establish the field of intelligent irrigation system based on Internet of things technology,realize the rational management of agricultural wat
The system combined closely with actual crop growth in Guanzhong arid area,and was on the basis of construction of agricultural information database and remote sensing database.It used C# application
The network monitoring can be divided into two modes: active and passive.These two modes can prevent crime.But both of them are highly tort.So we must protect the citizens privacy rights by legislatio
This paper proposes a highly secure image watermarking and digital signature algorithm based on ECC and MIRACL,the former is on the basis of ECDLP very difficult to solve,and the latter implements all