Font Size: a A A

Design And Implementation Of Users Information Security Solution To The Big Data System

Posted on:2017-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y X ChenFull Text:PDF
GTID:2428330590968317Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Big data is one of the Hi-tech innovation projects which are driven by government in ‘Internet Plus' Plan.Big data technology has very good implementation in building smart city,developing enterprise product,carrying out science research.While the value of data being recognized by the society,the safety of data becoming increasingly important.Data leak not only brings economics loss to companies and users,but also threatens life safety and society harmony.Therefore,the research of data safety protection has great significance,and is essential trial to promote the development of big data industry.My research is aimed at preventing data leak,will utilize information security model as research theoretical guidance and conduct research based on user behavioral analysis system.During the research,site test and theory verification is used to find and confirm the potential information security threaten of system and application.Taking key points of information security protection as breakthrough,the research conducts solution of user information security protection.The solution is verified in system and some improving measures are put forward subsequently.From the result of preventing leaking of user data,the big data information security protection solution is effective,but it is a staged achievement in longterm perspective.The system needs to be improved in communication authentication and data integrity.Its big data technology of audit and database is not mature enough,which need to be promoted in later projects.As other safety protection projects,the long-term evolution of safety protection solution should be supported by management system.to protect the safety of data information?...
Keywords/Search Tags:data leak, big data, information security protection, key points, solution
PDF Full Text Request
Related items