z-logo
open-access-imgOpen Access
Security mechanism building for big data based on Trusted Computing
Author(s) -
Hongbo Lv,
Lei Zhou,
Zhao Yuan
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1453/1/012099
Subject(s) - trusted computing , direct anonymous attestation , trusted network connect , computer science , authentication (law) , computer security , trusted platform module , transmission (telecommunications) , process (computing) , data security , computer network , operating system , encryption , telecommunications
In view of the security risks faced by large data in the process of collection, storage, transmission and use, the security threats faced by large data in these processes are analyzed. The characteristics of trusted computing and its advantages in information security protection are analyzed. On this basis, a secure storage, transmission and authentication mechanism of large data based on trusted computing is proposed to achieve active network defense and ensure that large data can be controlled, trusted and manageable in the process of storage, transmission and authentication.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here