Order ID:89JHGSJE83839 | Style:APA/MLA/Harvard/Chicago | Pages:5-10 |
Instructions:
Advances in Computer Science Research
Advances in Computer Science Research, volume 77
8th International Conference on Management and Computer Science (ICMCS 2018)
Big Data Security and Privacy Protection
Keywords: Big data; Security; Privacy
Abstract. In the era of big data, people’s lifestyles, daily habits, and modes of thinking have undergone earth-shaking changes. Big data has become an important topic for research in industry and academia. But big data is a double-edged sword. It brings convenience to people and brings certain risks. In the process of data collection, storage, and use, it can easily lead to the leakage of personal information, and the fact that data is difficult to discern. How to ensure big data security and privacy protection has become one of the hot issues in the current stage of research. This article starts with big data, analyzes the security problems of big data, and proposes protection strategies for big data security and privacy.
Introduction
In the era of big data, people are the beneficiaries of Internet technology. Data has great commercial value for Internet service providers, but the analysis and application of data will be more complex and difficult to manage, and personal privacy will be threatened. With the rapid development of the Internet, people leave a lot of data traces on the Internet every day. This gives criminals an opportunity to collect information on the Internet and then conduct illegal activities such as reselling, fraud, etc., not only for people. Life has brought troubles and brought economic losses, which has seriously affected social stability and harmony. In the era of big data, how to deal with security and privacy issues in the context of big data is an urgent need for people to have a good solution.
Sources and Characteristics of Big Data
The origin of big data comes from the Internet. Researchers create diversified models based on the needs of the business, and then extract meaningful vectors based on the models to find ways to deal with people or things in different roles. This is the source and characteristics of big data. . According to the sources of big data, big data can be divided into three categories: First, all kinds of data that come from people, people in the process of using the Internet, including video, pictures, text, etc.; second, from the machine, each The data generated by various types of computers in the course of operations is in the form of multimedia, databases, GPS, smart homes, documents, etc. The third is from objects. The data collected during the operation of various types of digital devices, such as digital signals acquired by the camera.
Big Data Security Challenges
Privacy Risks. While people enjoy the convenience brought by big data, they also encounter a lot of inconveniences. If big data is not well protected for user data in the process of use, it will directly threaten the privacy of users and the security of data. According to different protection content, it can be divided into anonymous identifiers, anonymous protection and privacy protection. In the era of big data, people’s data security problems are not only the traditional issues of personal privacy, but more based on the analysis and research of people’s data, and the targeted prediction of people’s state and behavior. For example, retailers can compare Parents are more aware of their children’s spending habits, etc., and thus post relevant advertising information. Another example is the status
RUBRIC |
||||||
Excellent Quality 95-100%
|
Introduction
45-41 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Literature Support 91-84 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Methodology 58-53 points Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met. |
|||
Average Score 50-85% |
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided. |
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration. |
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met. |
|||
Poor Quality 0-45% |
37-1 points The background and/or significance are missing. No search history information is provided. |
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration. |
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met |
|||
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow |
Advances in Computer Science Research