Big data security features and operation practices
With the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the secu...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2021-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021102/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529049936035840 |
---|---|
author | Zhiyong LIU Zhongjiang HE Yilong RUAN Junfeng SHAN Chao ZHANG |
author_facet | Zhiyong LIU Zhongjiang HE Yilong RUAN Junfeng SHAN Chao ZHANG |
author_sort | Zhiyong LIU |
collection | DOAJ |
description | With the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the security characteristics and technology development trend of big data were analyzed, the construction and operation practice of China Telecom’s big data security defense system with “data and people” as the core was systematically summarized.Some thoughts and prospects for the introduction of new technologies were also raised such as blockchain, federated learning, artificial intelligence and zero trust in data security circulation, data security risk monitoring and data access control. |
format | Article |
id | doaj-art-cf2f26cc361f48968ee7fabc9952aba5 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2021-05-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-cf2f26cc361f48968ee7fabc9952aba52025-01-15T03:26:19ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012021-05-013716016959808263Big data security features and operation practicesZhiyong LIUZhongjiang HEYilong RUANJunfeng SHANChao ZHANGWith the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the security characteristics and technology development trend of big data were analyzed, the construction and operation practice of China Telecom’s big data security defense system with “data and people” as the core was systematically summarized.Some thoughts and prospects for the introduction of new technologies were also raised such as blockchain, federated learning, artificial intelligence and zero trust in data security circulation, data security risk monitoring and data access control.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021102/big datadata securityblockchainfederated learningartificial intelligencecloud computing |
spellingShingle | Zhiyong LIU Zhongjiang HE Yilong RUAN Junfeng SHAN Chao ZHANG Big data security features and operation practices Dianxin kexue big data data security blockchain federated learning artificial intelligence cloud computing |
title | Big data security features and operation practices |
title_full | Big data security features and operation practices |
title_fullStr | Big data security features and operation practices |
title_full_unstemmed | Big data security features and operation practices |
title_short | Big data security features and operation practices |
title_sort | big data security features and operation practices |
topic | big data data security blockchain federated learning artificial intelligence cloud computing |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021102/ |
work_keys_str_mv | AT zhiyongliu bigdatasecurityfeaturesandoperationpractices AT zhongjianghe bigdatasecurityfeaturesandoperationpractices AT yilongruan bigdatasecurityfeaturesandoperationpractices AT junfengshan bigdatasecurityfeaturesandoperationpractices AT chaozhang bigdatasecurityfeaturesandoperationpractices |