Data security protection schema of telecom operators under the environment of big data
With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2017-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000−0801.2017136/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530179553329152 |
---|---|
author | Shengli ZHOU Bin CHEN Lifa WU |
author_facet | Shengli ZHOU Bin CHEN Lifa WU |
author_sort | Shengli ZHOU |
collection | DOAJ |
description | With the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project. |
format | Article |
id | doaj-art-f2b2c58b3cce4239bf0575003e63583e |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2017-05-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-f2b2c58b3cce4239bf0575003e63583e2025-01-15T03:12:56ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012017-05-013311912559602391Data security protection schema of telecom operators under the environment of big dataShengli ZHOUBin CHENLifa WUWith the popularity of big data and cloud computing technology,data of telecom operators collected is increa-singly larger,and much more various.The data faces the risk of broken security management,hacker attacks,and imper-fection of risk assessment,etc.The current situation of data security in the environment was analyzed,and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment,several strategies were proposed,including security classification,privacy protection,data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000−0801.2017136/telecom operatordata securityprivacy protectiondata encryption |
spellingShingle | Shengli ZHOU Bin CHEN Lifa WU Data security protection schema of telecom operators under the environment of big data Dianxin kexue telecom operator data security privacy protection data encryption |
title | Data security protection schema of telecom operators under the environment of big data |
title_full | Data security protection schema of telecom operators under the environment of big data |
title_fullStr | Data security protection schema of telecom operators under the environment of big data |
title_full_unstemmed | Data security protection schema of telecom operators under the environment of big data |
title_short | Data security protection schema of telecom operators under the environment of big data |
title_sort | data security protection schema of telecom operators under the environment of big data |
topic | telecom operator data security privacy protection data encryption |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000−0801.2017136/ |
work_keys_str_mv | AT shenglizhou datasecurityprotectionschemaoftelecomoperatorsundertheenvironmentofbigdata AT binchen datasecurityprotectionschemaoftelecomoperatorsundertheenvironmentofbigdata AT lifawu datasecurityprotectionschemaoftelecomoperatorsundertheenvironmentofbigdata |