期刊文献+

大数据安全及其评估 被引量:23

BIG DATA SECURITY AND ITS EVALUATION
在线阅读 下载PDF
导出
摘要 大数据的安全问题是影响大数据应用的关键因素之一,而评估大数据应用的安全性成为业界关注的课题。针对大数据应用安全性的评估问题,在梳理大数据安全研究现状的基础上,从数据和计算两个层面上分析大数据所面临的安全问题,综述目前主要的解决大数据安全问题的研究成果,包括分布式计算的安全技术、数据溯源技术、隐私保护的数据挖掘技术等。最后从数据的可信性、隐私保护程度等方面提出一些大数据安全性的评估指标。 Big data security is one of the key factors affecting big data applications,and the evaluation of the security of big data applications becomes the industry concern. In light of this issue,in this paper we analyse the security challenges encountered by big data from the aspects of data and computing based on sorting the status quo of big data security studies. Then we give a survey on the main research outcomes of solving these challenges,including the security technology of distributed computing,the data traceability technology,and the data mining technology for privacy protection. Finally,from the aspects of data creditability,privacy protection degree,etc.,we also propose some evaluation indices for the big data security.
出处 《计算机应用与软件》 CSCD 2016年第4期34-38,71,共6页 Computer Applications and Software
基金 上海市科委科技攻关项目(13511505303) 上海市技术带头人项目(13XD1421800)
关键词 大数据 安全 隐私保护 隐私保护的数据挖掘 安全评估 Big data Security Privacy protection Data mining for privacy protection Security evaluation
  • 相关文献

参考文献44

  • 1Temple K.What Happens in an Internet Minute?[EB/OL].http://scoop.intel.com/what-happens-in-an-internet-minute/.
  • 2冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258. 被引量:756
  • 3Miller H E.Big-data in cloud computing:a taxonomy of risks[J].Information Research,2013,18(1).
  • 4Dean J,Ghemawat S.MapReduce:simplified data processing on large clusters[J].Communications of the ACM,2008,51(1):107-113.
  • 5Duhigg C.How companies learn your secrets[EB/OL].http://128.59.177.251/twiki/pub/Comp PrivC onst/How CompaniesL earn OurC onsumingS ecrets/How_Companies_Learn_Your_Secrets_-_NYTimes.com.pdf.
  • 6Barbaro M,Zeller T,Hansell S.A face is exposed for AOL searcher no.4417749[EB/OL].http://w2.eff.org/Privacy/AOL/exhibit_d.pdf.
  • 7Bhat S,Damle S,Chaudhari P,et al.KERBEROS:An Authentication Protocol[J].International Journal,2014,2(2):200-204.
  • 8Roy I,Setty S T V,Kilzer A,et al.Airavat:Security and Privacy for MapReduce[C]//USENIX Conference on Networked Systems Design and Implementation,2010,10:297-312.
  • 9Dwork C,Roth A.The algorithmic foundations of differential privacy[J].Theoretical Computer Science,2013,9(3-4):211-407.
  • 10Xu G,Wang Z,Yang L,et al.Research of Data Provenance Semantic Annotation for Dependency Analysis[C]//Advanced Cloud and Big Data,2013 International Conference on.IEEE,2013:197-204.

二级参考文献80

  • 1金澈清,钱卫宁,周傲英.流数据分析与管理综述[J].软件学报,2004,15(8):1172-1181. 被引量:163
  • 2Wang Y Richard, Madnick Stuart E. A polygen model for heterogeneous database systems: The source tagging perspective//Proceedings of the 16th International Conference on Very Large Data Bases. Brisbane, Queensland, Australia, 1990:519-538.
  • 3Lanter D P. Design of a lineage-based meta-data base for GIS. Cartography and Geographic Information Systems, 1991, 18:255-261.
  • 4Woodruff A, Stonebraker M. Supporting fine-grained data lineage in a database visualization environment//Proceedings of the 13rd IEEE International Conference on Data Engineering. Birmingham, England, 1997:91-102.
  • 5Cui Y, Widom J, Wiener J L. Tracing the lineage of view data in a warehousing environment. The ACM Transactions on Database Systems, 2000, 25(2): 179-227.
  • 6Buneman P, Khanna S, Tan WC. Why and where, A characterization of data provenanee//Proceedings of the 17th International Conference on Data Engineering. London, UK 2001:316-330.
  • 7Simmhan Yogesh L, Plale Beth, Gannon Dennis. A survey of data provenance techniques. Computer Science Department: Indiana University, Bloomington IN: Technical Report IUB-CS-TR618, 2001.
  • 8Glavic Boris, Dittrich Klaus. Data provenance: A categorization of existing approaehes//Proceedings of the 6th MMC Workshop of BTW 2007. Aachen, Germany, 2007:227-241.
  • 9Glavic Boris, Alonso Gustavo. Perm: Processing provenance and data on the same data model through query rewriting// Proceedings of the 25th IEEE International Conference on Data Engineering. Shanghai, China, 2009: 174-185.
  • 10Kolaitis P G. Schema mappings, data exchange, and metadata management//Proceedings of the 24th ACM SIGMOD- SIGACT-SIGART Symposium on Principles of Database Systems. Baltimore, Maryland, USA, 2005:61- 75.

共引文献818

同被引文献242

引证文献23

二级引证文献222

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部