About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part I

Research Article

Network Information Security Privacy Protection System in Big Data Era

Download(Requires a free EAI acccount)
5 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-36402-1_7,
        author={Lei Ma and Ying-jian Kang and Jian-ping Liu},
        title={Network Information Security Privacy Protection System in Big Data Era},
        proceedings={Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21--22, 2019, Proceedings, Part I},
        proceedings_a={ADHIP},
        year={2019},
        month={11},
        keywords={Privacy protection Information security Information encryption Key management},
        doi={10.1007/978-3-030-36402-1_7}
    }
    
  • Lei Ma
    Ying-jian Kang
    Jian-ping Liu
    Year: 2019
    Network Information Security Privacy Protection System in Big Data Era
    ADHIP
    Springer
    DOI: 10.1007/978-3-030-36402-1_7
Lei Ma1,*, Ying-jian Kang1, Jian-ping Liu1
  • 1: Telecommunication Engineering Institute
*Contact email: malei235@tom.com

Abstract

Traditional information security protection is based on an information data set, at least one information can not be distinguished from its own location information. Therefore, this paper studies the network information security privacy protection system in the era of big data. The hardware of network information security privacy protection system is composed of independent monitoring layer, host layer and mixed layer. It disturbs the original data by adding random numbers and exchanging, shields the original data to unauthorized users, and achieves the purpose of privacy protection and recommendation accurate and non-destructive. The system software encrypts information according to the degree of privacy protection set by users, adopts the key management mode, solves the problem of communication security and node key update, and realizes the network information security privacy protection system.

Keywords
Privacy protection Information security Information encryption Key management
Published
2019-11-29
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-36402-1_7
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL