About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part I

Research Article

Layered Encryption Method for Monitoring Network User Data for Big Data Analysis

Download(Requires a free EAI acccount)
5 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-36402-1_9,
        author={Yanhua Qiao and Lin Zhao and Jianna Li},
        title={Layered Encryption Method for Monitoring Network User Data for Big Data Analysis},
        proceedings={Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21--22, 2019, Proceedings, Part I},
        proceedings_a={ADHIP},
        year={2019},
        month={11},
        keywords={Big data analysis Network users Data layering Network data},
        doi={10.1007/978-3-030-36402-1_9}
    }
    
  • Yanhua Qiao
    Lin Zhao
    Jianna Li
    Year: 2019
    Layered Encryption Method for Monitoring Network User Data for Big Data Analysis
    ADHIP
    Springer
    DOI: 10.1007/978-3-030-36402-1_9
Yanhua Qiao1,*, Lin Zhao1, Jianna Li1
  • 1: Department of Information and Automation
*Contact email: qiaoyanhua12985@163.com

Abstract

The conventional monitoring network user data layered encryption method had a low security when layered encryption of modern network data. Therefore, a layered encryption method for monitoring network user data for big data analysis was proposed. Big data technology was introduced, and a layered framework of network user data was built to monitor and encrypt network user data. Relying on the determination and layering of different levels of user data, the data layered encryption model was embedded to realize the layering and encryption of monitoring network user data. The test data showed that the proposed layered encryption method for monitoring network user data for big data analysis would improve the security of the data by 46.82%, which was suitable for users of different levels to encrypt their own network data.

Keywords
Big data analysis Network users Data layering Network data
Published
2019-11-29
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-36402-1_9
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL