DATABASE ACCESS INFORMATION SECURITY MANAGEMENT SIMULATION UNDER BIG DATA PLATFORM

被引:0
|
作者
Li Z. [1 ]
Wang D. [1 ]
机构
[1] Department of Senior Technician, Shandong Labor Vocational and Technical College, Jinan
来源
Scalable Computing | 2024年 / 25卷 / 03期
关键词
Big Data; Database; Information Security; Simulation Research;
D O I
10.12694/SCPE.V25I3.2762
中图分类号
学科分类号
摘要
When people perform database access information security management, the traditional method cannot accurately verify the identity of the visitor, the credibility of the identity information, and the security management of the access information. With the widespread application of big data technology, the amount of data in databases is rapidly increasing, which brings new challenges to information security management. The main purpose of this study is to explore how to more effectively manage the security of database access information on big data platforms.Therefore, the trusted computing platform is established to implement database access information security management under the data platform. The method determines the user behavior is credible by establishing a behavior chain of behavior based on the user identity and measuring user operation behavior. For the user’s private data, the encryption/decryption module is used for security protection, preventing data from being leaked through illegal copying. A trusted metric model based on the USB Key user identity is established and a trusted platform is established. By improving the ELGamal algorithm, the IMC/IMV metrics architecture is utilized to measure platform security attributes. In the first round of anonymous authentication, the identity authentication of the platform is completely completed, and the database access information security management under the big data platform is completed. The simulation results show that in 10 experiments, the transmission time delay of TCP/IP protocol is less than 200ms, and the security of database access information is enhanced after the encryption system is established in the database. This has certain theoretical enlightenment for the improvement of database security and the optimization of information security management. © 2024 SCPE. All Rights Reserved.
引用
收藏
页码:1841 / 1851
页数:10
相关论文
共 50 条
  • [41] Simulation of a Multiversion Medical Data Management System for Medical Information Security
    Jeong, Hyuncheol
    HEALTHCARE INFORMATICS RESEARCH, 2009, 15 (04) : 403 - 410
  • [42] Information Management Discipline Connotation and Innovation under the Background of Big Data
    Miao, Ning
    2016 3RD INTERNATIONAL CONFERENCE ON MANAGEMENT INNOVATION AND BUSINESS INNOVATION (ICMIBI 2016), PT 2, 2016, 58 : 512 - 517
  • [43] Information Access and Control in an Age of Big Data
    Carter, Edward L.
    Lee, Laurie Thomas
    JOURNALISM & MASS COMMUNICATION QUARTERLY, 2016, 93 (02) : 269 - 272
  • [44] Curriculum Reform of Information Management System Under the Background of Big Data
    Du, Zhiguo
    Hu, Dahui
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND EDUCATION INNOVATIONS, ICIEI 2024, 2024, : 78 - 84
  • [45] Blockchain access control Ecosystem for Big Data security
    Uchibeke, Uchi Ugobame
    Kassani, Sara Hosseinzadeh
    Schneider, Kevin A.
    Deters, Ralph
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1373 - 1378
  • [46] The Research on Personnel Training of Information Management and Information System under the Background of Big Data
    Zhao, Chunyan
    PROCEEDINGS OF THE 2018 INTERNATIONAL SEMINAR ON EDUCATION RESEARCH AND SOCIAL SCIENCE (ISERSS 2018), 2018, 195 : 457 - 459
  • [47] Big Data Precision Marketing Approach under IoT Cloud Platform Information Mining
    Li, Wang
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [48] Big Data Analysis of Hypertension Complications Bases on Shenzhen Medical Information Management Platform
    Yang, Yu-Jie
    Li, Qi
    Cai, Yun-Peng
    INTERNATIONAL CONFERENCE ON BIOMEDICAL AND HEALTH INFORMATICS, 2019, 64 : 177 - 178
  • [49] Research on the Application of Computer Information Technology in Network Security under the Background of "Big Data"
    Ying, Liu
    2018 7TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2018), 2019, : 210 - 214
  • [50] Computer Network Information System Security Prevention Methods under the Background of Big Data
    Cai, Zhongmin
    Li, Chenglong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022