{"title":"大数据安全与隐私保护技术综述","authors":"Denglong Lv, Shibing Zhu, Huazheng Xu, Ran Liu","doi":"10.1109/ICCT.2018.8600051","DOIUrl":null,"url":null,"abstract":"To study and solve the issues of big data security and privacy protection is the key to promote the healthy development of big data. In this paper, a 3D big data security and privacy protection model based on life cycle, security goal and user role is presented, and the security challenges and security goals of big data are analyzed from different aspects. The feasible technology and its application in big data security and privacy protection are expounded and analyzed, and the in-depth research direction of big data security and privacy protection is discussed and summarized.","PeriodicalId":244952,"journal":{"name":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A Review of Big Data Security and Privacy Protection Technology\",\"authors\":\"Denglong Lv, Shibing Zhu, Huazheng Xu, Ran Liu\",\"doi\":\"10.1109/ICCT.2018.8600051\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To study and solve the issues of big data security and privacy protection is the key to promote the healthy development of big data. In this paper, a 3D big data security and privacy protection model based on life cycle, security goal and user role is presented, and the security challenges and security goals of big data are analyzed from different aspects. The feasible technology and its application in big data security and privacy protection are expounded and analyzed, and the in-depth research direction of big data security and privacy protection is discussed and summarized.\",\"PeriodicalId\":244952,\"journal\":{\"name\":\"2018 IEEE 18th International Conference on Communication Technology (ICCT)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 18th International Conference on Communication Technology (ICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT.2018.8600051\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 18th International Conference on Communication Technology (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT.2018.8600051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review of Big Data Security and Privacy Protection Technology
To study and solve the issues of big data security and privacy protection is the key to promote the healthy development of big data. In this paper, a 3D big data security and privacy protection model based on life cycle, security goal and user role is presented, and the security challenges and security goals of big data are analyzed from different aspects. The feasible technology and its application in big data security and privacy protection are expounded and analyzed, and the in-depth research direction of big data security and privacy protection is discussed and summarized.