DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM

被引:0
|
作者
Li Z. [1 ]
Wang D. [1 ]
机构
[1] Department of Senior Technician, Shandong Labor Vocational and Technical College, Jinan
来源
Scalable Computing | 2024年 / 25卷 / 03期
关键词
Big Data; Database; Information Security; Simulation Research;
D O I
10.12694/SCPE.V25I3.2762
中图分类号
学科分类号
摘要
When people perform database access information security management, the traditional method cannot accurately verify the identity of the visitor, the credibility of the identity information, and the security management of the access information. With the widespread application of big data technology, the amount of data in databases is rapidly increasing, which brings new challenges to information security management. The main purpose of this study is to explore how to more effectively manage the security of database access information on big data platforms.Therefore, the trusted computing platform is established to implement database access information security management under the data platform. The method determines the user behavior is credible by establishing a behavior chain of behavior based on the user identity and measuring user operation behavior. For the user’s private data, the encryption/decryption module is used for security protection, preventing data from being leaked through illegal copying. A trusted metric model based on the USB Key user identity is established and a trusted platform is established. By improving the ELGamal algorithm, the IMC/IMV metrics architecture is utilized to measure platform security attributes. In the first round of anonymous authentication, the identity authentication of the platform is completely completed, and the database access information security management under the big data platform is completed. The simulation results show that in 10 experiments, the transmission time delay of TCP/IP protocol is less than 200ms, and the security of database access information is enhanced after the encryption system is established in the database. This has certain theoretical enlightenment for the improvement of database security and the optimization of information security management. © 2024 SCPE. All Rights Reserved.
引用
收藏
页码:1841 / 1851
页数:10
相关论文
共 50 条
  • [31] Application of Big Data Technology in Enterprise Information Security Management and Risk Assessment
    Wang, Yawen
    Xue, Weixian
    Zhang, Anqi
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (03)
  • [32] Research on abnormal access control of database management system under cloud computing platform
    Qian, Jianguo
    Que, Lingyan
    Lu, Min
    Fu, Quan
    Feng, Yuan
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [33] Information Security in Big Data: Privacy and Data Mining
    Xu, Lei
    Jiang, Chunxiao
    Wang, Jian
    Yuan, Jian
    Ren, Yong
    IEEE ACCESS, 2014, 2 : 1149 - 1176
  • [34] Big Data Management, Access, and Protection
    Brink, James A.
    JOURNAL OF THE AMERICAN COLLEGE OF RADIOLOGY, 2017, 14 (05) : 579 - 580
  • [35] Role and access based data segregator for security of Big Data
    Gupta, Aayush
    Pandhi, Ketan
    Bindu, P. V.
    Thilagam, P. Santhi
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 1550 - 1557
  • [36] Big Data, Little Security: Addressing Security Issues in Your Platform
    Macklin, Thomas
    Mathews, Joseph
    NEXT-GENERATION ANALYST V, 2017, 10207
  • [37] Traffic Information Computing Platform for Big Data
    Duan, Zongtao
    Li, Ying
    Zheng, Xibin
    Liu, Yan
    Dai, Jiting
    Kang, Jun
    INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 464 - 467
  • [38] Impact of external security measures on data access implementation with online database management system
    Garuba, M
    Girma, A
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 243 - 248
  • [39] Research on the security technology of big data information
    Zhu, Hong
    Xu, Zheng
    Huang, Yingzhen
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 1041 - 1044
  • [40] Research on Information Security in Big Data Era
    Zhou, Linqi
    Gu, Weihong
    Huang, Cheng
    Huang, Aijun
    Bai, Yongbin
    6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967