DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM

被引:0
|
作者
Li Z. [1 ]
Wang D. [1 ]
机构
[1] Department of Senior Technician, Shandong Labor Vocational and Technical College, Jinan
来源
Scalable Computing | 2024年 / 25卷 / 03期
关键词
Big Data; Database; Information Security; Simulation Research;
D O I
10.12694/SCPE.V25I3.2762
中图分类号
学科分类号
摘要
When people perform database access information security management, the traditional method cannot accurately verify the identity of the visitor, the credibility of the identity information, and the security management of the access information. With the widespread application of big data technology, the amount of data in databases is rapidly increasing, which brings new challenges to information security management. The main purpose of this study is to explore how to more effectively manage the security of database access information on big data platforms.Therefore, the trusted computing platform is established to implement database access information security management under the data platform. The method determines the user behavior is credible by establishing a behavior chain of behavior based on the user identity and measuring user operation behavior. For the user’s private data, the encryption/decryption module is used for security protection, preventing data from being leaked through illegal copying. A trusted metric model based on the USB Key user identity is established and a trusted platform is established. By improving the ELGamal algorithm, the IMC/IMV metrics architecture is utilized to measure platform security attributes. In the first round of anonymous authentication, the identity authentication of the platform is completely completed, and the database access information security management under the big data platform is completed. The simulation results show that in 10 experiments, the transmission time delay of TCP/IP protocol is less than 200ms, and the security of database access information is enhanced after the encryption system is established in the database. This has certain theoretical enlightenment for the improvement of database security and the optimization of information security management. © 2024 SCPE. All Rights Reserved.
引用
收藏
页码:1841 / 1851
页数:10
相关论文
共 50 条
  • [21] RESEARCH ON INFORMATION SHARING AND FUSION OF PUBLIC SECURITY INFORMATION UNDER BIG DATA ENVIRONMENT
    Fan, Jiaqi
    Hu, Kaixi
    Chen, Zeyan
    Li, Jiawen
    FRESENIUS ENVIRONMENTAL BULLETIN, 2022, 31 (6A): : 6115 - 6123
  • [22] Big Data Analytics for Information Security
    Szczypiorski, Krzysztof
    Wang, Liqiang
    Luo, Xiangyang
    Ye, Dengpan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [23] Information Security on the Background of Big Data
    Yang, Huijie
    PROCEEDINGS OF THE 2016 JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING, 2016, 59 : 337 - 341
  • [24] Information Security in Big Data Mining
    Revathi, T.
    Sudharsana, V
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 2045 - 2049
  • [25] Survey of Big Data Information Security
    Miloslavskaya, Natalia
    Makhmudova, Aida
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 133 - 138
  • [26] Database Access and Management with the Use of the MOODLE Platform
    Harezlak, K.
    Werner, A.
    HUMAN-COMPUTER SYSTEMS INTERACTION: BACKGROUNDS AND APPLICATIONS 2, PT 1, 2012, 98 : 49 - 65
  • [27] Big Data-Based Access Control System in Educational Information Security Assurance
    Peng, Zhong
    Liang, Feng
    Mu, Lili
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [28] Construction and Management Method of University Information Platform Based on Big Data Technology
    Si, Yamin
    Wu, Bin
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [29] Discussion on Security Management and Control Mechanism based on Power System Big Data Platform
    Tong Xinyu
    Song Xingwang
    Yang Qiaochuan
    2018 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2018, : 1168 - 1173
  • [30] Application of machine learning algorithms in MBR simulation under big data platform
    Li, Weiwei
    Li, Chunqing
    Wang, Tao
    WATER PRACTICE AND TECHNOLOGY, 2020, 15 (04) : 1238 - 1247