[1]肖洁,袁嵩,谭天. 大数据时代数据隐私安全研究[J].计算机技术与发展,2016,26(05):91-94.
 XIAO Jie,YUAN Song,TAN Tian. Research on Data Privacy in Big Data Age[J].,2016,26(05):91-94.
点击复制

 大数据时代数据隐私安全研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年05期
页码:
91-94
栏目:
安全与防范
出版日期:
2016-05-10

文章信息/Info

Title:
 Research on Data Privacy in Big Data Age
文章编号:
1673-629X(2016)05-0091-04
作者:
 肖洁袁嵩谭天
 武汉科技大学 计算机科学与技术学院
Author(s):
 XIAO JieYUAN SongTAN Tian
关键词:
 大数据隐私保护数据处理数据存储数据加密
Keywords:
 big dataprivacy preservationdata processingdata storagedata encryption
分类号:
TP309
文献标志码:
A
摘要:
 近年来,利用数据分析的方法从大数据中挖掘出有价值信息的大数据应用发展极为迅速,为人们的日常生活带来了极大的便利.然而,随着隐私泄露事件的屡屡发生,隐私安全问题引起了社会的广泛关注.文中对当下已然产生的各种数据隐私问题进行分析,将一系列的数据隐私保护方式进行综合,从数据存储、数据处理以及数据共享的角度出发,结合现有的数据处理技术给出在数据加密、数据防护、匿名保护技术等不同方面的保护措施以应对数据在处理、传输、共享中存在的安全隐患.由于使用云计算平台来存储和分析大数据的方式被广泛应用,而云平台的流动性、跨界的融合性以及动态的变化特性增加了隐私泄露的风险,文中还研究了基于云存储及云处理的大数据保护,以期解决隐私泄露问题.
Abstract:
 In recent years,big data analysis and application used for digging out valuable information has developed rapidly and brought great convenience for people. However,the privacy leak incidents occur frequently in big data age,the privacy security has caused the ex-tensive concern. In this paper,through analyzing the current data privacy problems,based on a series of privacy preservation ways,from the perspective of data storage,data processing and data sharing,combined with the current technology of data processing,the correspond-ing protection measures in data encryption,data protection and anonymous protection technology are proposed to deal with the safe hidden trouble in the data processing,transmission and sharing. The cloud computing platform has been widely used,and its liquidity,cross-bor-der fusion and dynamic changes increase the risk of privacy. Therefore,the big data security based on cloud storage and cloud processing is studied in this paper,in order to solve the problem of privacy leak.

相似文献/References:

[1]严霄凤,张德馨.大数据研究[J].计算机技术与发展,2013,(04):168.
 YAN Xiao-feng,ZHANG De-xin.Big Data Research[J].,2013,(05):168.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(05):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(05):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(05):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(05):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(05):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(05):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(05):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(05):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(05):43.
[11]王雷,陈彦先,袁哲,等. 面向预拌混凝土行业的云计算[J].计算机技术与发展,2014,24(08):14.
 WANG Lei,CHEN Yan-xian,YUAN Zhe JI Xu. Research on Cloud Computing for Ready-mixed Concrete Industry[J].,2014,24(05):14.
[12]金宗泽,冯亚丽,文必龙,等. 大数据分析流程框架的研究[J].计算机技术与发展,2014,24(08):117.
 JIN Zong-ze,FENG Ya-l,WEN Bi-long,et al. Research on Framework of Big Data Analytic Process[J].,2014,24(05):117.
[13]张也弛,周文钦,石润华. 一种面向云的大数据完整性检测协议[J].计算机技术与发展,2014,24(09):68.
 ZHANG Ye-chi,ZHOU Wen-qin,SHI Run-hua. A Big Data Integrity Checking Protocol for Cloud[J].,2014,24(05):68.
[14]谢怡,王航,刘新瀚,等. 大数据环境下数据读取关键技术研究[J].计算机技术与发展,2015,25(02):113.
 XIE Yi,WANG Hang,LIU Xin-han,et al. Research on Data Reading Techniques Based on Big Data Environment[J].,2015,25(05):113.
[15]付燕平,罗明宇,刘其军. 大数据三维模型快速显示技术研究[J].计算机技术与发展,2015,25(05):87.
 FU Yan-ping,LUO Ming-yu,LIU Qi-jun. Research on Fast Display Technology for Big Data Three-dimensional Model[J].,2015,25(05):87.
[16]赵震,任永昌. 大数据时代基于云计算的电子政务平台研究[J].计算机技术与发展,2015,25(10):145.
 ZHAO Zhen,REN Yong-chang. Research on E-government Platform Based on Cloud Computing in Big Data Era[J].,2015,25(05):145.
[17]胡存刚,程莹. 基于粒子群算法的大数据智能搜索引擎的研究[J].计算机技术与发展,2015,25(12):14.
 HU Cun-gang,CHENG Ying. Research on Big Data Intelligent Search Engine Based on PSO[J].,2015,25(05):14.
[18]郭先超,林宗缪,姚文勇. 互联网+质量检测平台设计[J].计算机技术与发展,2016,26(05):120.
 GUO Xian-chao,LIN Zong-miao,YAO Wen-yong. Design of Platform for Internet+ Quality Inspection[J].,2016,26(05):120.
[19]程艳云,张守超,杨杨. 基于大数据的时间序列异常点检测研究[J].计算机技术与发展,2016,26(05):139.
 CHENG Yan-yun,ZHANG Shou-chao,YANG Yang. Research on Time Series Outlier Detection Based on Big Data[J].,2016,26(05):139.
[20]程艳云,张守超,杨杨. 基于大数据的时间序列预测研究与应用[J].计算机技术与发展,2016,26(06):175.
 CHENG Yan-yun,ZHANG Shou-chao,YANG Yang. Research and Application of Time Series Forecasting Based on Big Data[J].,2016,26(05):175.

更新日期/Last Update: 2016-09-19