Advertisement

Network Information Security Privacy Protection System in Big Data Era

  • Lei MaEmail author
  • Ying-jian Kang
  • Jian-ping Liu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 301)

Abstract

Traditional information security protection is based on an information data set, at least one information can not be distinguished from its own location information. Therefore, this paper studies the network information security privacy protection system in the era of big data. The hardware of network information security privacy protection system is composed of independent monitoring layer, host layer and mixed layer. It disturbs the original data by adding random numbers and exchanging, shields the original data to unauthorized users, and achieves the purpose of privacy protection and recommendation accurate and non-destructive. The system software encrypts information according to the degree of privacy protection set by users, adopts the key management mode, solves the problem of communication security and node key update, and realizes the network information security privacy protection system.

Keywords

Privacy protection Information security Information encryption Key management 

References

  1. 1.
    Deng, W.: Research on information security and privacy protection in the big data era. China New Commun. 19(3), 1226–1227 (2017)Google Scholar
  2. 2.
    Wang, S., Du, W.: Progress of New Zealand’s privacy protection in the big data era and its enlightenment to China. E-government 23(11), 2165–2171 (2017)Google Scholar
  3. 3.
    Maliwei, Meng, W., Zhang, Y.: Research on personal information security in big data era. Netw. Secur. Technol. Appl. 22(4), 1364–1365 (2018)Google Scholar
  4. 4.
    Gao, Y., Dai, G., Yan, S.: Research on information security in network environment in big data era. Inf. Syst. Eng. 22(2), 2189 (2017)Google Scholar
  5. 5.
    Liu, Y.: Banking information security protection strategy in the age of big data network. Electron. Technol. Softw. Eng. 32(7), 1211 (2017)Google Scholar
  6. 6.
    Liu, W.: Opportunities and challenges of network information security in the era of big data. Netw. Secur. Technol. Appl. 32(11), 2176–2177 (2017)Google Scholar
  7. 7.
    Chen, H.: Computer information security and privacy protection strategy in the background of big data. Netw. Secur. Technol. Appl. 32(11), 1168 (2017)Google Scholar
  8. 8.
    Zhang, Y., Wang, X.: Research on information security and privacy protection in big data environment. Digit. Technol. Appl. 32(7), 3190–3191 (2017)Google Scholar
  9. 9.
    Zhu, X., Zhang, H., Ma, J.: Android platform privacy protection system based on hook technology. J. Netw. Inf. Secur. 32(4), 1621–1693 (2018)Google Scholar
  10. 10.
    Yan, W., Yao, Y., Zhang, W., et al.: Logistics system privacy protection scheme based on two-dimensional code and information hiding. J. Netw. Inf. Secur. 3(11), 2222–2228 (2017)Google Scholar
  11. 11.
    Li, C., Shi, Z., Gao, H., et al.: Development and design of personal privacy protection system for mobile intelligent terminal. Comput. Appl. Softw. 34(6), 217–220 (2017)Google Scholar
  12. 12.
    Li, C., Zhang, Z., Zhang, C., et al.: Data fusion algorithm for privacy protection in wireless sensor networks. Inf. Secur. Res. 3(6), 523–527 (2017)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Telecommunication Engineering InstituteBeijing PolytechnicBeijingChina

Personalised recommendations