Data security processing method based on big data

A processing method and data security technology, applied in the field of data security, can solve the problems of no cloud service security, no information security, etc., and achieve the effect of improving the flexibility of adjustment, improving security, and ensuring security

Active Publication Date: 2019-06-21
HEILONGJIANG UNIV OF CHINESE MEDICINE
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Without information security, ther

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security processing method based on big data
  • Data security processing method based on big data

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] Hereinafter, the present invention will be described in detail with reference to the drawings and specific embodiments. The illustrative embodiments and descriptions are only used to explain the present invention, but are not intended to limit the present invention.

[0025] A detailed description of a data security processing method based on big data applied by the present invention, as attached figure 1 As shown, the method includes:

[0026] Step S1: Obtain big data from the terminal; specifically: Obtain big data according to the processing target of acquiring the big data; for example, the processing target of the big data is the target of processing the collected big data; the processing target includes Processing steps, credibility, requirements, security requirements, processing result types, processing types, etc.; for example, if big data users and demanders have requirements for the credibility of big data, they do not believe in low-credibility data. At this time...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data security processing method based on big data. The method comprises the following steps: S1, obtaining big data from a terminal; S2, storing and positioning big data; and S3, performing transparent filtering on the big data, and storing the filtered big data in the positioned big data node. The dynamic and static combination selection process is adopted in the expansion of the set; Through unified management of third-party firmware, the security and adjustment flexibility of the filtering rule are improved, the filtering rule can be dynamically adjusted at any time according to management of big data nodes, and a transparent filtering layer is further arranged in a mode of independent pluggable hardware; And the safety of the terminal equipment is ensured through pluggable hardware.

Description

[0001] 【Technical field】 [0002] The invention belongs to the field of data security, and in particular relates to a data security processing method based on big data. [0003] 【Background technique】 [0004] Big data means that the amount of data involved is so large that it cannot be captured, managed, processed, and organized within a reasonable period of time through current mainstream software tools to help enterprises make more positive business decisions. Cloud computing is an Internet-based supercomputing method, which is an extension of parallel processing, distributed processing and grid computing. It can be considered that cloud computing is not only a new computing model, but also a new way of sharing infrastructure. Cloud computing is oriented to a large-scale distributed user environment, and its main function is to provide fast and secure cloud data storage and network services. Information privacy protection of big data is an important prerequisite for the ra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/215G06F16/22H04L29/08
Inventor 段兴林马俊
Owner HEILONGJIANG UNIV OF CHINESE MEDICINE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products