Research on Sensitive Information Protection of Carriers' Big-Data Platform

The scope of sensitive information of carriers' big-data platform was discussed. The methods to protect sensitive information were described. The key technologies and mainstream technical methods in the field of research were summarized. Based on the layered architecture of carries big-data pla...

Full description

Saved in:
Bibliographic Details
Main Authors: Wenyu Pan, Xin Cai, Yilong Ruan, Xiaohui Yao
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2014-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.11.021/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529426706169856
author Wenyu Pan
Xin Cai
Yilong Ruan
Xiaohui Yao
author_facet Wenyu Pan
Xin Cai
Yilong Ruan
Xiaohui Yao
author_sort Wenyu Pan
collection DOAJ
description The scope of sensitive information of carriers' big-data platform was discussed. The methods to protect sensitive information were described. The key technologies and mainstream technical methods in the field of research were summarized. Based on the layered architecture of carries big-data platform, technical solutions for different sensitive information protection technology were designed.
format Article
id doaj-art-5f551b18d6d94c649da917d2f7a6f779
institution Kabale University
issn 1000-0801
language zho
publishDate 2014-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-5f551b18d6d94c649da917d2f7a6f7792025-01-15T03:18:09ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-11-013012513059617686Research on Sensitive Information Protection of Carriers' Big-Data PlatformWenyu PanXin CaiYilong RuanXiaohui YaoThe scope of sensitive information of carriers' big-data platform was discussed. The methods to protect sensitive information were described. The key technologies and mainstream technical methods in the field of research were summarized. Based on the layered architecture of carries big-data platform, technical solutions for different sensitive information protection technology were designed.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.11.021/sensitive information protectioncarriers' big-data platformanonymizationprivacy
spellingShingle Wenyu Pan
Xin Cai
Yilong Ruan
Xiaohui Yao
Research on Sensitive Information Protection of Carriers' Big-Data Platform
Dianxin kexue
sensitive information protection
carriers' big-data platform
anonymization
privacy
title Research on Sensitive Information Protection of Carriers' Big-Data Platform
title_full Research on Sensitive Information Protection of Carriers' Big-Data Platform
title_fullStr Research on Sensitive Information Protection of Carriers' Big-Data Platform
title_full_unstemmed Research on Sensitive Information Protection of Carriers' Big-Data Platform
title_short Research on Sensitive Information Protection of Carriers' Big-Data Platform
title_sort research on sensitive information protection of carriers big data platform
topic sensitive information protection
carriers' big-data platform
anonymization
privacy
url http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.11.021/
work_keys_str_mv AT wenyupan researchonsensitiveinformationprotectionofcarriersbigdataplatform
AT xincai researchonsensitiveinformationprotectionofcarriersbigdataplatform
AT yilongruan researchonsensitiveinformationprotectionofcarriersbigdataplatform
AT xiaohuiyao researchonsensitiveinformationprotectionofcarriersbigdataplatform