Big Data Security Framework Based on Encryption

被引:1
作者
Wu, Shaobing [1 ,2 ]
Wang, Changmei [2 ]
机构
[1] Yunnan Police Coll, Inst Informat Secur, Kunming 650223, Yunnan, Peoples R China
[2] Yunnan Normal Univ, Solar Energy Inst, Kunming 650092, Yunnan, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
关键词
Big data security; Security framework; Encryption;
D O I
10.1007/978-3-030-00012-7_48
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The biggest challenge for big data era from a security point of view is the protection of user's privacy and data security. Big data analysis is a more complex process, especially if the data is unstructured. We must transfer the unstructured to the structured data if we query the information. Organizations will have to track down what pieces of information in their big data are ddata security and the related technologies for big data security, which includes Key Management for Access Control, Attribute-Based Access Control, Secure Search for Parties Involved, Searchable Encryption and Secure Data Processing.
引用
收藏
页码:528 / 540
页数:13
相关论文
共 11 条
[1]   Privacy-aware Big Data Analytics as a service for public health policies in smart cities [J].
Anisetti, Marco ;
Ardagna, Claudio ;
Bellandi, Valerio ;
Cremonini, Marco ;
Frati, Fulvio ;
Damiani, Ernesto .
SUSTAINABLE CITIES AND SOCIETY, 2018, 39 :68-77
[2]  
[Anonymous], 2011, BIG DATA NEXT FRONTI, DOI DOI 10.1080/01443610903114527
[3]  
[Anonymous], 2016, SOFTS BIG DAT AN REP
[4]  
[Anonymous], 2016, GLOB ENCR TRENDS STU
[5]   A comparison of data protection legislation and policies across the EU [J].
Custers, Bart ;
Dechesne, Francien ;
Sears, Alan M. ;
Tani, Tommaso ;
van der Hof, Simone .
COMPUTER LAW & SECURITY REVIEW, 2018, 34 (02) :234-243
[6]  
Kajeepeta S., 2012, INFORMATIONWEEK
[7]   The big data security challenge [J].
Lafuente, Guillermo .
Network Security, 2015, 2015 (01) :12-14
[8]   A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments [J].
Sohal, Amandeep Singh ;
Sandhu, Rajinder ;
Sood, Sandeep K. ;
Chang, Victor .
COMPUTERS & SECURITY, 2018, 74 :340-354
[9]  
Song DXD, 2000, P IEEE S SECUR PRIV, P44, DOI 10.1109/SECPRI.2000.848445
[10]  
Tankard C., 2017, NETW SECUR