New Challenges and Countermeasures of Network Security in the Context of Big Data
DOI:
https://doi.org/10.54097/Keywords:
Network security, Fine-grained access control technology, Role-based access control, Intelligent security detection, Blockchain access control technologyAbstract
With the wide application of big data technology, the problem of network security is becoming increasingly prominent. This study analyzes the new challenges of cybersecurity in the big data environment, including the diversity of data breaches, cyber-attacks, and the difficulty of privacy protection. At the same time, the limitations of traditional security measures in addressing these challenges are discussed, and a series of innovative coping strategies are proposed, including fine-grained access control technology, role-based access control, intelligent security detection, and the application of blockchain access control technology. By building a comprehensive security protection system, it aims to provide effective solutions for network security in the era of big data.
References
[1] Dong , Privacy Protection Dilemma and Relief in the Era of Big Data, Legal Review, No. 15, 2023, P46-47.
[2] Niu, Analysis and Discussion of Data Security under Big Data Environment, Electronic Communication and Computer Science, 2023, Vol. 5, No. 3,P149.
[3] Xu , Optimization Strategy of computer network security technology in the era of big Data, Electronic Components and Information Technology,2024.3.049, P194-195.
[4] Zou, Role-Based Access Control Model Analysis and Implementation, Microcomputer Information, Vol 22, No. 6-3, 2006, P108-110.
[5] Gao , Cao , et al, Research Progress of Blockchain-based Access Control Technology, Journal of Network and Information Security, December 2021, Volume 7, Issue 6 P69-72.
[6] Liu , Du et al., Blockchain-based Big Data Access Control Mechanism, Journal of Software, 2019,30 (9),P2639.
[7] Sun , Qiu , Review of Biometric identification technology, Journal of Electronic Sciences, No. 12A, December 2001, P1745.
[8] Lin , Feng , Access Control Technology in new network environment, Journal of Software, Vol.18, No.4, April 2007,P959-961.
[9] Feng , Li et al., 2022, Inner Mongolia Science and Technology and Economy, No. 10, May 2022, P92-93.
[10] Zhao , Analysis of Computer Network Information Security in the context of Big Data, No. 6, 2022, P108-109.
[11] Zhang, cui , etc., machine learning in the study of cyberspace security research, computer journal, 2017, p3-4.
[12] Zhou , Cui , et al. Anomaly Detection technology based on System Behavior Analysis, Telecommunications Science, 2009 (2), P60-62.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.