Font Size: a A A

The Study Of The Srcurity And Privacy Protection Of Big Data Based On Cloud Computing

Posted on:2016-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:J G QiFull Text:PDF
GTID:2298330467492504Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Human society has been experiencing an unprecedented revolution in the recent years’rapid development of information technology. People are enjoying all kinds of benefits such a revolution brings, and different industries are getting better understandings about the importance of information technology. Among all the new technologies, cloud computing and big data are typical representatives, with the combination of the two technologies becoming an inevitable tendency. Just like all the other network technology, cloud big data platform also face problems of security and privacy, as such problems are inevitable when it comes to network. This essay studies the security and privacy of big data based on cloud computing from two aspects, which respectively are privacy security mechanism and demonstration security mechanism (encryption mechanism), to discuss how to protect the security and privacy of data storage and computing on big data platform. The main content and result of the study are as following:1. The essay proposes a better storage scheme after fully studied former ones including the privacy protection of cloud data storage and computing. In the improved scheme, if those who want to obtain data, it is necessary to know the information for each element of the correlation matrix, which is meaningful in terms of data security and privacy protection. In addition, we have extended the data calculation scheme. The expanded scheme applied to the environment of the four cloud servers, and realized the operations of summation and multiplication. 2. This essay studies the secure computing and storage based on the homomorphic encryption scheme. By adding a certain number of dummy items to different DOi, the new scheme is able to protect the privacy of computing information including the entry’s number, content as well invocation. Besides, by applying bilinear mapping and RS coding technique, the protocol also tackles such problems as unlimited times cloud data integrity verification, error data restoration, and data owners’ computing data waste and so on. Through the new designed scheme, we successfully protect the secure and privacy of big data in the cloud computing environment.
Keywords/Search Tags:implicit mechanism, big data, data security and privacy, encryption mechanism, cloud computing
PDF Full Text Request
Related items