Data security protection schema of telecom operators under the environment of big data

With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the...

Full description

Saved in:
Bibliographic Details
Main Authors: Shengli ZHOU, Bin CHEN, Lifa WU
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2017-05-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000−0801.2017136/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530179553329152
author Shengli ZHOU
Bin CHEN
Lifa WU
author_facet Shengli ZHOU
Bin CHEN
Lifa WU
author_sort Shengli ZHOU
collection DOAJ
description With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.
format Article
id doaj-art-f2b2c58b3cce4239bf0575003e63583e
institution Kabale University
issn 1000-0801
language zho
publishDate 2017-05-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-f2b2c58b3cce4239bf0575003e63583e2025-01-15T03:12:56ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012017-05-013311912559602391Data security protection schema of telecom operators under the environment of big dataShengli ZHOUBin CHENLifa WUWith the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000−0801.2017136/telecom operatordata securityprivacy protectiondata encryption
spellingShingle Shengli ZHOU
Bin CHEN
Lifa WU
Data security protection schema of telecom operators under the environment of big data
Dianxin kexue
telecom operator
data security
privacy protection
data encryption
title Data security protection schema of telecom operators under the environment of big data
title_full Data security protection schema of telecom operators under the environment of big data
title_fullStr Data security protection schema of telecom operators under the environment of big data
title_full_unstemmed Data security protection schema of telecom operators under the environment of big data
title_short Data security protection schema of telecom operators under the environment of big data
title_sort data security protection schema of telecom operators under the environment of big data
topic telecom operator
data security
privacy protection
data encryption
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000−0801.2017136/
work_keys_str_mv AT shenglizhou datasecurityprotectionschemaoftelecomoperatorsundertheenvironmentofbigdata
AT binchen datasecurityprotectionschemaoftelecomoperatorsundertheenvironmentofbigdata
AT lifawu datasecurityprotectionschemaoftelecomoperatorsundertheenvironmentofbigdata