Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Chinese Journal of Computers》 2014-01
Add to Favorite Get Latest Update

Big Data Security and Privacy Protection

FENG Deng-Guo;ZHANG Min;LI Hao;Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences;  
Nowadays big data has become a hot topic in both the academic and the industrial research.It is regarded as a revolution that will transform how we live,work and think.However, there are many security risks in the field of data security and privacy protection when collecting, storing and utilizing big data.Privacy issues related with big data analysis spell trouble for individuals.And deceptive or fake information within big data may lead to incorrect analysis results. This paper summarizes and analyzes the security challenges brought by big data,and then describes the key technologies which can be exploited to deal with these challenges.Finally,this paper argues that big data brings not only challenges,but also technical revolution in the field of information security.
【Fund】: 国家自然科学基金(91118006 61232005 61100237);; 国家“八六三”高技术研究发展计划项目基金(2011AA0123824001)资助~~
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 4 Hits
1 GAO Ming1)JIN Che-Qing2)WANG Xiao-Ling2)TIAN Xiu-Xia1),3)ZHOU Ao-Ying2)1)(Shanghai Key Laboratory of Intelligent Information Processing,School of Computer Science,Fudan University,Shanghai 200433)2)(Shanghai Key Laboratory of Trustworthy Computing,Software Engineering Institute,East China Normal University,Shanghai 200062)3)(School of Computer and Information Engineering,Shanghai University of Electric Power,Shanghai 200090);A Survey on Management of Data Provenance[J];Chinese Journal of Computers;2010-03
2 Meng Xiaofeng and Ci Xiang (School of Information, Renmin University of China, Beijing 100872);Big Data Management: Concepts,Techniques and Challenges[J];Journal of Computer Research and Development;2013-01
3 Li Guojie Cheng Xueqi (Institute of Computing Technology,CAS 100190 Beijing);Research Status and Scientific Thinking of Big Data[J];Bulletin of Chinese Academy of Sciences;2012-06
4 JIANG Chuan-xian1, SUN Xing-ming2, YI Ye-qing1, YANG Heng-fu3 (1.school of software, Hunan University, Changsha 410082, China; 2.school of Computer Science, Communication, Hunan University, Changsha 410082, China; 3.Hunan Institute of Engineering, Xiangtan 411101, China);Study of Database Public Watermarking Based On JADE Algorithm[J];Journal of System Simulation;2006-07
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHU Qin~1,2,LUO Yi-shu~2,LE Jia-jin~2 (1.College of Computer Science and Technology,Nantong University,Nantong Jiangsu,226019;2.College of Computer Science and Technology,Donghua University,Shanghai,201620);Research on Database Privacy Protection[J];Journal of Donghua University(Natural Science);2006-05
2 Chen Minggang Sun Xingming Xiao Xiangrong(School of Computer and Communication,Hunan University,Changsha 410082,China);Relational database watermarking algorithm based on wavelet transformation[J];Journal of Southeast University(Natural Science Edition);2007-S1
3 CUI Xin-chun1,HE Jie1,QIN Xiao-lin2(1.College of Information Technology and Communication,Qufu Normal University,Rizhao,Shandong 276826,China;2.College of Information Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing,Jiangsu 210016,China);A Multiple Audio Watermarking for Database Based on Blind Source Separation[J];Acta Electronica Sinica;2012-01
4 ZHENG Hua(Department of Computer and Information Managing,Guangxi University of Finance and Economics,Nanning,Guangxi,530003,China);The Framework of Data Quality Assessment Based on Data Provenance[J];Journal of Guangxi Academy of Sciences;2010-04
5 WANG Wen-chao,SHI Hai-ming,ZENG Hua-feng(School of Humanities and Social Sciences,National University of Defense Technology,Changsha,Hunan 410074,China);Discussion on the National Information Security in the Era of Big Data[J];National Defense Science & Technology;2013-02
6 Ma Jian-guang,JIANG Wei(1.School of Humanities and Social Sciences,National University of Defense Technology,Changsha,Hunan 410073,China);The Concept,Characteristics and Application of Big Data[J];National Defense Science & Technology;2013-02
7 CHANG Xiao-song,WANG Zhi-jie,HE Wei,TAN Ling,HE Jian-wei,YU Hua-li,GUO Yong,LIU Yang-yang,ZHANG Zu-chang *Sichuan Entry-exit Inspection and Quarantine Bureau,Chengdu,Sichuan 610041,China;Research of function and development on joint prevention and control system of airport[J];Chinese Journal of Frontier Health and Quarantine;2013-03
8 ZHANG Guang-sheng,XIONG Wei,DENG Jin-sheng,WANG Shao-hong(National University of Defense Technology,Changsha,Hunan 410073,China);Wisdom National Defense turns on the new age of National Defense informationizaion[J];National Defense Science & Technology;2013-03
9 Zhou Feng (Information and Archives of Shanghai University,Shanghai,200444);Archives in Big Data Era and its Countermeasures[J];Archives & Construction;2013-08
10 LIANG Feng-lan;Department of Computer,College of Suqian;;Study on Data Management Method in Age of Big Data[J];Computer Development & Applications;2013-11
China Proceedings of conference Full-text Database 5 Hits
1 Chen Minggang Sun Xingming Xiao Xiangrong(School of Computer and Communication, Hunan University, Changsha 410082, China);Relational database watermarking algorithm based on wavelet transformation[A];[C];2007
2 ZHENG Hua (Department of Computer and Information Managing,GuangXi University of Finance and Economics,GuangXi NanNing 530003);The Framework of Data Quality Assessment Based on Data Provenance[A];[C];2010
3 Xiaomei Dong~1,Xiaohua Li~1,Ge Yu~1,Lei Zheng~1 1.School of Information Science and Engineering,Northeastern University,Shenyang 110004;An Algorithm Resistive to Invertibility Attack in Watermarking Relational Databases[A];[C];2009
4 Dong Xiaomei,Li Xiaohua,Tian Yueping,Yu Ge,Shen Derong,and Zheng Lei (College of Information Science and Engineering.Northeastern University,Shenyang 110004);A Wavelet-Based Watermarking Algorithm for Relational Databases[A];[C];2008
5 Zhu Yunlei,Yue Kun,Wang Chaolu,and Liu Weiyi (Department of Computer Science and Engineering,School of Information Science and Engineering,Yunnan University, Kunming 650091);LBNS:A Bayesian-Network-Based System for Representation and Query Processing of Lineages over Uncertain Data[A];[C];2012
【Secondary Citations】
Chinese Journal Full-text Database 4 Hits
1 NIU Xia-mu,ZHAO Liang,HUANG Wen-jun,ZHANG Hui (Dept of Automatic Test and Control,Harbin Institute of Technology,Harbin,Heilongjiang 150001,China);Watermarking Relational Databases for Ownership Protection[J];Acta Electronica Sinica;2003-S1
2 LIU Ju, SUN Jian-de, ZHANG Xin-gang (College of Information Science and Engineering, Shandong University, Jinan, Shandong 250100, China);A New Scheme of Digital Watermarking Based on Independent Component Analysis[J];Acta Electronica Sinica;2004-04
3 ZHOU Ao-Ying1) JIN Che-Qing1) WANG Guo-Ren2) LI Jian-Zhong3)1)(Shanghai Key Laboratory of Trustworthy Computing,Software Engineering Institute,East China Normal University,Shanghai 200062)2)(School of Information Science and Engineering,Northeastern University,Shenyang 110004)3)(School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001);A Survey on the Management of Uncertain Data[J];Chinese Journal of Computers;2009-01
4 JIN Che-Qing, QIAN Wei-Ning, ZHOU Ao-Ying+ (Department of Computer Science and Engineering, Fudan University, Shanghai 200433, China);Analysis and Management of Streaming Data: A Survey[J];Journal of Software;2004-08
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved