The analysis of big Data application mode and security risk

被引:0
作者
Zeng Tai-sheng [1 ,2 ,3 ]
机构
[1] Quanzhou Normal Univ, Fac Math & Comp Sci, Quanzhou 362000, Fujian, Peoples R China
[2] Fujian Prov Key Lab Data Intens Comp, Quanzhou 362000, Fujian, Peoples R China
[3] Fujian Prov Univ, Key Lab Intelligent Comp & Informat Proc, Quanzhou 362000, Fujian, Peoples R China
来源
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCES, MACHINERY, MATERIALS AND ENERGY (ICISMME 2015) | 2015年 / 126卷
关键词
big data; security analysis; Hadoop;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In the current social background, Existing facilities and tools already can not meet the needs of big data in expanding and analysis techniques. Today's data storage and analysis work is achieved under cloud conditions and Hadoop were set up. Under the conditions for cloud computing, cloud computing applications who have remote data files were not authorized to read its contents, which results in unauthorized manipulation, and it will produce a lot of security risks for large data. In this paper, according to the cloud of different modes, Hadoop different stages of the operation, subject to the threat of non-confidence and security to steal big data generated to analyze a variety of privacy, with threat model as an example, it explores ways to address security threats.
引用
收藏
页码:1835 / 1839
页数:5
相关论文
共 7 条
[1]  
[Anonymous], 2014, J FUJIAN FINANCIAL, P56
[2]  
Guo Yajun, 2014, J EC STUDY TRIBUNE, P90
[3]  
Ma Yongguang, 2012, INFORM SECURITY COMM, P78
[4]  
Wang Yao, 2014, J DIGITAL TECHNOLOGY, P123
[5]  
Xie Tian, 2013, J INTELLIGENCE, P47
[6]  
Zhang Xinyuan, 2013, J INNOVATION SCI TEC, P127
[7]  
Zhou Tianyang, 2011, COMPUTER SCI, P256