期刊文献+

大数据云计算环境下的数据安全探讨 预览 被引量:5

Discussion on Data Security in Big Data Cloud Computing Environment
在线阅读 下载PDF
分享 导出
摘要 大数据云计算技术是一种新的数据处理方式,与传统的计算机数据计算不同,大数据云计算具有计算机容量大、效率高等特点,能够将硬件资料进行虚化处理,便于储存和使用。大数据云计算环境下,数据的处理、使用和储存都使用计算机技术进行,虽然相比传统的数据处理更加快捷高效,但是安全性难以保障,如果无法解决大数据云计算环境下的数据安全问题,相关的技术将得不到长足的发展和使用,也将会对社会工作产生影响。 Large data cloud computing technology is a new data processing method.Unlike traditional computer data calculation,large data cloud computing has the characteristics of large computer capacity and high efficiency.It can conceal the hardware data for easy storage and use.The Large data cloud computing environment,the data processing,use and storage are using computer technology,although compared to the traditional data processing more efficient and efficient,but the security is difficult to protect,if you can not solve the large data cloud computing environment,data security issues,The relevant technology will not be rapid development and use,will also have an impact on social wor k.
作者 李鸿雁
出处 《信息与电脑》 2017年第3期201-202,205共3页 China Computer & Communication
关键词 大数据 云计算 数据安全 big data cloud computing data security
作者简介 李鸿雁(1984-),女,河南商丘人,本科,讲师。
  • 相关文献

参考文献5

二级参考文献22

  • 1BIMAL K M,GHOLAM M A.Differential Epidemic Model of Virus and Worms in Computer Network[J].International Journal of Network Security,2012,14(3):149-155. 被引量:1
  • 2ZHU Q Y,YANG X F,YANG L X,et al.Optimal Control of Computer Virus under a Delayed Model[J].Applied Mathematics and Computation,2012,218(23):11 613-11 619. 被引量:1
  • 3K. POPOVIC, Z. HOCENSKI. Cloud Computing Security Is- sues and Challenges[ C ]//Proceedings of lhe 33rd Internation- al Convention. LA:Prentice Hall, 2010: 344-349. 被引量:1
  • 4B. GARTNER. Seven Cloud- computing Security Risks. NY: Networkworld, 2013 [ 20141105 ]. http://www, networkworld. conWartMe/2281535/data- center/gartner - - seven - cloud - computing-security-risks.html. 被引量:1
  • 5E. SANGER, T. SHANKER. N.S.A. Devises Radio Pathway Into Computers. NY : Nvtimes, 2014 [ 20141105 ]. http ://www. nytimes.conW2014/01 / 15/un/nsa-efforl- pries-open- conlput- ers-not-connected-to-internet.html. 被引量:1
  • 6AmazonSecurity White Paper. LA : Amazon, 2012 [ 20141105 ]. http://awsmedia, s3. amazonaws, com/pdf/AWS security Whitepaper. pdf. 被引量:1
  • 7S. NKRISHNA, P. GUMMADI, R. RODRIUES. Towards Trusted Cloud Computing. GM: MP1,2010 [ 20141105 ] . http://www.mpi- sws. org? - gummadi? papers? trusted _cloud. pdf. 被引量:1
  • 8CSA 3.0.Security Guidanee for Critical Areas of Focus in Cloud Computing. NY: CSA, 2013 [ 20141105 ]. https://cloudsecu- rityallianee.org/guidanee/esaguide.v3.0.pdf. 被引量:1
  • 9陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009(5):1337-1348. 被引量:1173
  • 10冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:873

共引文献20

同被引文献25

引证文献5

投稿分析

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈