Skip to main content
Erschienen in:

24.02.2017

Research on the two-way defense model of large data dynamic security SAT

verfasst von: Hou Rui, Jin Zhigang, Wang Baoliang

Erschienen in: Cluster Computing | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To guarantee the safety of big data calculation, the concept of security research and trusted cloud combined with large data security, a two-way defense system model of a large data calculation of SAT. The model of user data evidence through the dynamic safety factor; gradually determine the behavior of security permissions according to the reliability test implementation behavior. Provide the maximum-security defense for users. the experimental results show that the model can effectively improve the data big data security, reduce malicious hackers, to improve the efficiency of data analysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hong, Li, Hao, Li: Key technique and realization of credible cloud security. Posts and Telecom Press, Beijing (2010) Hong, Li, Hao, Li: Key technique and realization of credible cloud security. Posts and Telecom Press, Beijing (2010)
2.
Zurück zum Zitat Wang, S., Wang, H.J., Qin, X.P., Zhou, X.: Architecting big data: challenges, studies and forecasts. Chin. J. Comput. 34(10), 1741–1752 (2011)CrossRef Wang, S., Wang, H.J., Qin, X.P., Zhou, X.: Architecting big data: challenges, studies and forecasts. Chin. J. Comput. 34(10), 1741–1752 (2011)CrossRef
3.
Zurück zum Zitat Meng, X.F., Ci, X.: Big data management: concepts, techniques and challenges. J. Comput. Res. Dev. 50(1), 146–169 (2013) Meng, X.F., Ci, X.: Big data management: concepts, techniques and challenges. J. Comput. Res. Dev. 50(1), 146–169 (2013)
4.
Zurück zum Zitat Shen, D.R., Yu, G., Wang, X.T., Nie, T.Z., Kou, Y.: Survey on NoSQL for management of big data. Ruan Jian Xue Bao/J. Softw. 24(8), 1786–1803 (2013) Shen, D.R., Yu, G., Wang, X.T., Nie, T.Z., Kou, Y.: Survey on NoSQL for management of big data. Ruan Jian Xue Bao/J. Softw. 24(8), 1786–1803 (2013)
5.
Zurück zum Zitat Lin, C.H., Peng, X.H.: Credible network research. Chin. J. Comput. 28(5), 751–758 (2005) Lin, C.H., Peng, X.H.: Credible network research. Chin. J. Comput. 28(5), 751–758 (2005)
6.
Zurück zum Zitat Zhou, Q., Yu, J.: Trust-based defense system model under cloud calculation. 31(6), 136–139 (2011) Zhou, Q., Yu, J.: Trust-based defense system model under cloud calculation. 31(6), 136–139 (2011)
7.
Zurück zum Zitat Wu, H., Yu, J., Yu, F.R.: Trust model-based dynamic access and control under cloud calculation environment. Comput. Eng. Appl. 48(23), 322–327 (2012) Wu, H., Yu, J., Yu, F.R.: Trust model-based dynamic access and control under cloud calculation environment. Comput. Eng. Appl. 48(23), 322–327 (2012)
8.
Zurück zum Zitat Jameel, H.: A trust model for ubiquitous systems based on vectors of trust values. Proceedings of the 7th IEEE International Symposium on Multimedia. IEEE Computer Society, Washington DC (2005) Jameel, H.: A trust model for ubiquitous systems based on vectors of trust values. Proceedings of the 7th IEEE International Symposium on Multimedia. IEEE Computer Society, Washington DC (2005)
9.
Zurück zum Zitat Li, X.Y., Gui, X.L.: Multidimensional decision attribute-based trust quantitative model in credible network. Chin. J. Comput. 32(3), 405–415 (2009) Li, X.Y., Gui, X.L.: Multidimensional decision attribute-based trust quantitative model in credible network. Chin. J. Comput. 32(3), 405–415 (2009)
10.
Zurück zum Zitat Wang, S., Gao, Y., Cheng, T.Y., et al.: Research of behavior-based bi-layer trust model in grid environment. Comput. Eng. Appl. 25(9), 319–355 (2005) Wang, S., Gao, Y., Cheng, T.Y., et al.: Research of behavior-based bi-layer trust model in grid environment. Comput. Eng. Appl. 25(9), 319–355 (2005)
11.
Zurück zum Zitat Feng, X.J., Pan, Y.: DPS0 resource load balancing algorithm in cloud calculation environment. Comput. Eng. Appl. 6(6), 171–179 (2013) Feng, X.J., Pan, Y.: DPS0 resource load balancing algorithm in cloud calculation environment. Comput. Eng. Appl. 6(6), 171–179 (2013)
12.
Zurück zum Zitat Chen, X.Q., Zhang, J.H.: Improved particle swarm algorithm based cluster algorithm. Comput. Res. Dev. 49(31), 287–291 (2012) Chen, X.Q., Zhang, J.H.: Improved particle swarm algorithm based cluster algorithm. Comput. Res. Dev. 49(31), 287–291 (2012)
13.
Zurück zum Zitat Han, L.B., Wang, Q., Jiang, Z.F., et al.: An improved Kernel initial cluster center selection algorithm. Comput. Eng. Appl. 46(17), 150–157 (2010) Han, L.B., Wang, Q., Jiang, Z.F., et al.: An improved Kernel initial cluster center selection algorithm. Comput. Eng. Appl. 46(17), 150–157 (2010)
14.
Zurück zum Zitat Qin, X.P., Wang, H.J., Du, X.Y., et al.: Big-data analysis–competition and co-existence of RDBMS. Softw. J. 23(1), 3245 (2012)CrossRef Qin, X.P., Wang, H.J., Du, X.Y., et al.: Big-data analysis–competition and co-existence of RDBMS. Softw. J. 23(1), 3245 (2012)CrossRef
15.
Zurück zum Zitat Shen, Q.N., Du, H., Wen, H., et al.: Integrity measurement architecture based data packaging method. Comput. Res. Dev. 49(1), 210–216 (2012) Shen, Q.N., Du, H., Wen, H., et al.: Integrity measurement architecture based data packaging method. Comput. Res. Dev. 49(1), 210–216 (2012)
16.
Zurück zum Zitat Wang, S., Gao, Y., Cheng, T.Y., et al.: Fusion of genetic algorithm and ant algorithm. Comput. Res. Dev. 40(9), 135–143 (2003) Wang, S., Gao, Y., Cheng, T.Y., et al.: Fusion of genetic algorithm and ant algorithm. Comput. Res. Dev. 40(9), 135–143 (2003)
17.
Zurück zum Zitat Hua, X.Y., Zheng, J., Hu, W.X.: Cloud calculation environment based ant swarm optimized calculation resources distribution algorithm. J. East China Norm. Univ. 1, 127–134 (2010) Hua, X.Y., Zheng, J., Hu, W.X.: Cloud calculation environment based ant swarm optimized calculation resources distribution algorithm. J. East China Norm. Univ. 1, 127–134 (2010)
18.
Zurück zum Zitat Zhang, Z., Zhang, X.: A load balancing mechanism based on ant colony and complex network theory in open cloud computing federation. In: Proceedings of the 2nd International Conference on Industrial Mechatronics and Automation, pp. 240-543 (2010) Zhang, Z., Zhang, X.: A load balancing mechanism based on ant colony and complex network theory in open cloud computing federation. In: Proceedings of the 2nd International Conference on Industrial Mechatronics and Automation, pp. 240-543 (2010)
19.
Zurück zum Zitat Zhang, Y.S., Jiao, M., Wang, Z.W., Wang, S., Zhou, X.: One-Size-Fits-All OLAP technique for big data analysis. Chin. J. Comput. 34(10), 1936–1946 (2011)CrossRef Zhang, Y.S., Jiao, M., Wang, Z.W., Wang, S., Zhou, X.: One-Size-Fits-All OLAP technique for big data analysis. Chin. J. Comput. 34(10), 1936–1946 (2011)CrossRef
20.
Zurück zum Zitat Cao, Y., Chen, C., Guo, F., Jiang, D.W., Lin, Y.T., Ooi, B.C., Vo, H.T., Wu, S., Xu, Q.Q.: ES2: A cloud data storage system for supporting both OLTP and OLAP. In: Proceedings of the Info Conference on Data Engineering (ICDE), pp. 291–302 (2011) Cao, Y., Chen, C., Guo, F., Jiang, D.W., Lin, Y.T., Ooi, B.C., Vo, H.T., Wu, S., Xu, Q.Q.: ES2: A cloud data storage system for supporting both OLTP and OLAP. In: Proceedings of the Info Conference on Data Engineering (ICDE), pp. 291–302 (2011)
21.
Zurück zum Zitat Han, H., Lee, Y.C., Choi, S., Yeom, H.Y., Zomaya, A.Y.: Cloud-Aware processing of MapReduce-based OLAP applications. In: Javadi, B. (ed.) Proceedings of the 11th Australasian Syme. on Parallel and Distributed Computing, pp. 31-38. Australian Computer Society, Darlinghurst (2013) Han, H., Lee, Y.C., Choi, S., Yeom, H.Y., Zomaya, A.Y.: Cloud-Aware processing of MapReduce-based OLAP applications. In: Javadi, B. (ed.) Proceedings of the 11th Australasian Syme. on Parallel and Distributed Computing, pp. 31-38. Australian Computer Society, Darlinghurst (2013)
22.
Zurück zum Zitat Yang, L., Shi, Z.Z.: An efficient data mining framework on Hadoop using Java persistence API. In: Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010). IEEE Computer Society, 203–209 (2010) Yang, L., Shi, Z.Z.: An efficient data mining framework on Hadoop using Java persistence API. In: Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010). IEEE Computer Society, 203–209 (2010)
Metadaten
Titel
Research on the two-way defense model of large data dynamic security SAT
verfasst von
Hou Rui
Jin Zhigang
Wang Baoliang
Publikationsdatum
24.02.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 2/2017
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-0791-x