Big data security features and operation practices

With the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the secu...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2021-05-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021102/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529049936035840
author Zhiyong LIU
Zhongjiang HE
Yilong RUAN
Junfeng SHAN
Chao ZHANG
author_facet Zhiyong LIU
Zhongjiang HE
Yilong RUAN
Junfeng SHAN
Chao ZHANG
author_sort Zhiyong LIU
collection DOAJ
description With the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the security characteristics and technology development trend of big data were analyzed, the construction and operation practice of China Telecom’s big data security defense system with “data and people” as the core was systematically summarized.Some thoughts and prospects for the introduction of new technologies were also raised such as blockchain, federated learning, artificial intelligence and zero trust in data security circulation, data security risk monitoring and data access control.
format Article
id doaj-art-cf2f26cc361f48968ee7fabc9952aba5
institution Kabale University
issn 1000-0801
language zho
publishDate 2021-05-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-cf2f26cc361f48968ee7fabc9952aba52025-01-15T03:26:19ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012021-05-013716016959808263Big data security features and operation practicesZhiyong LIUZhongjiang HEYilong RUANJunfeng SHANChao ZHANGWith the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the security characteristics and technology development trend of big data were analyzed, the construction and operation practice of China Telecom’s big data security defense system with “data and people” as the core was systematically summarized.Some thoughts and prospects for the introduction of new technologies were also raised such as blockchain, federated learning, artificial intelligence and zero trust in data security circulation, data security risk monitoring and data access control.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021102/big datadata securityblockchainfederated learningartificial intelligencecloud computing
spellingShingle Zhiyong LIU
Zhongjiang HE
Yilong RUAN
Junfeng SHAN
Chao ZHANG
Big data security features and operation practices
Dianxin kexue
big data
data security
blockchain
federated learning
artificial intelligence
cloud computing
title Big data security features and operation practices
title_full Big data security features and operation practices
title_fullStr Big data security features and operation practices
title_full_unstemmed Big data security features and operation practices
title_short Big data security features and operation practices
title_sort big data security features and operation practices
topic big data
data security
blockchain
federated learning
artificial intelligence
cloud computing
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021102/
work_keys_str_mv AT zhiyongliu bigdatasecurityfeaturesandoperationpractices
AT zhongjianghe bigdatasecurityfeaturesandoperationpractices
AT yilongruan bigdatasecurityfeaturesandoperationpractices
AT junfengshan bigdatasecurityfeaturesandoperationpractices
AT chaozhang bigdatasecurityfeaturesandoperationpractices