2020
DOI: 10.1360/n112019-00077
|View full text |Cite
|
Sign up to set email alerts
|

Research progress on big data security technology

Abstract: Independence and controllability of big data security Chinese Science Bulletin 60, 427 (2015); Research progress in the complexity theory and algorithms of big-data computation SCIENTIA SINICA Informationis 46, 1255 (2016); Real-time intelligent big data processing: technology, platform, and applications SCIENCE CHINA Information Sciences 62, 082101 (2019); Research on theory and key technology of trusted computing platform security testing and evaluation SCIENCE CHINA Information Sciences 53, 434 (2010); Eart… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 187 publications
(219 reference statements)
0
5
0
Order By: Relevance
“…jleaves.H i /j 1 jleaves.DGH i /j 1 ; q i is categorical (7) where jU i L i j is the value domain of the numeric attribute q i , and u i and l i are the upper and lower bounds of g i , respectively.…”
Section: Information Lossmentioning
confidence: 99%
See 1 more Smart Citation
“…jleaves.H i /j 1 jleaves.DGH i /j 1 ; q i is categorical (7) where jU i L i j is the value domain of the numeric attribute q i , and u i and l i are the upper and lower bounds of g i , respectively.…”
Section: Information Lossmentioning
confidence: 99%
“…Any disregard for privacy protection leads to high economic losses and incalculable reputational damage. Therefore the privacy preservation of data streams has attracted increasing attention from industry and academia [4][5][6][7] . Anonymization is a commonly used privacy-preserving method that allows the sharing of sensitive data with a guarantee that the individuals, i.e., the subjects of the data, cannot be recognized [8] .…”
Section: Introductionmentioning
confidence: 99%
“…To deal with the characteristics of big data introduced above, many enterprises and research institutions put forward specific big data system technology framework to implement data processing [11]. Among them, NIST summarized existing frameworks and presented a technologyand infrastructure-agnostic big data reference architecture (NBDRA) [12], which has great influence internationally [17]. NBDRA is organized around five major roles: system orchestrator, data provider, big data application provider, big data framework provider and data consumer.…”
Section: Related Work a Big Data Characteristicsmentioning
confidence: 99%
“…Feng et al [8] discussed the related technical challenges on big data security and privacy protection, and explained that big data has become an important way to solve security problems while introducing security problems. Chen et al [9] sorted out the key technologies of big data security protection. By summarizing the current research results on big data security and privacy protection, it can know the research results in this field are mainly the application of the security technology and privacy protection technology of small-capacity data in big data environment, and because at present these technologies can not completely solve the security and privacy protection problems of small-capacity data, so, in application the security protect ability of these technologies to big data is limited.…”
Section: Introductionmentioning
confidence: 99%