About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part II

Research Article

Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-36405-2_9,
        author={Yi Shen and Lu Zhang},
        title={Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis},
        proceedings={Advanced Hybrid Information Processing. Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21--22, 2019, Proceedings, Part II},
        proceedings_a={ADHIP PART 2},
        year={2019},
        month={11},
        keywords={Big data Network sensitive information Tamper-proof monitoring Information security},
        doi={10.1007/978-3-030-36405-2_9}
    }
    
  • Yi Shen
    Lu Zhang
    Year: 2019
    Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis
    ADHIP PART 2
    Springer
    DOI: 10.1007/978-3-030-36405-2_9
Yi Shen1,*, Lu Zhang1
  • 1: Anyang Vocational and Technical College
*Contact email: zhanglu789111@163.com

Abstract

To improve the security of network sensitive information transmission and storage, it is necessary to design the anti-tampering monitoring of network sensitive information, and a tamper-proof monitoring technology of network sensitive information in big data environment based on big data dimension feature block is proposed. Big data feature space reconstruction method is used to calculate the grid density of network sensitive information distribution, and the network sensitive information to be tampered-proof monitoring is mapped to the divided high-dimensional phase space through the density threshold. The high dimensional phase space of information distribution is divided into dense unit and sparse unit. The coded key is matched to the corresponding network sensitive information block to realize information encryption and covert communication. The simulation results show that the information steganography performance of network sensitive information transmission and storage using this information tampering monitoring technology is better, and the information security transmission ability is improved.

Keywords
Big data Network sensitive information Tamper-proof monitoring Information security
Published
2019-11-29
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-36405-2_9
Copyright © 2019–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL