Education, Science, Technology, Innovation and Life
Open Access
Sign In

Application Analysis of Computer Information Security under Big Data

Download as PDF

DOI: 10.23977/acss.2024.080310 | Downloads: 21 | Views: 215

Author(s)

Keke Zhang 1

Affiliation(s)

1 Khoury College of Computer Science, Portland 04101, ME, United Stated

Corresponding Author

Keke Zhang

ABSTRACT

With the wide application of Internet technology, the application scope of big data technology in all walks of life is expanding. The widespread use of the Internet has led to the generation and accumulation of massive data, which is not only a valuable information resource, but also a challenge to information security. In the current big data environment, computer information security faces many key technologies and challenges, such as data privacy protection, network attack prevention, identity authentication, and so on. To address these challenges, this article will focus on exploring the application of big data technology in the field of computer information security. In the big data environment, data storage, transmission, and processing face more complex security issues. At the same time, the application of big data technology also provides new possibilities for information security, such as security event detection and response systems based on big data analysis and network intrusion detection systems based on behavior analysis. Through in-depth analysis and effective protection strategies in this article, the aim is to provide practical references for related research and promote the continuous development and innovation in the field of computer information security. In the research, we will further explore the integration of big data technology with emerging technologies such as artificial intelligence and blockchain to address the increasingly complex challenges in the field of information security and achieve a positive interaction between information security and technological innovation.

KEYWORDS

Internet Technology, Big Data Technology Application, Computer Information Security

CITE THIS PAPER

Keke Zhang, Application Analysis of Computer Information Security under Big Data. Advances in Computer, Signals and Systems (2024) Vol. 8: 71-75. DOI: http://dx.doi.org/10.23977/acss.2024.080310.

REFERENCES

[1] Lijiang X. Analysis of Computer Network Information Security and Protection Strategy in the Era of Big Data. Foreign Science and Technology Journal Database (Abstract Edition) Engineering Technology, 2021, 89-97.
[2] Jiang L. The Application Analysis of Computer Network Security Data Encryption Technology. 2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020). Springer International Publishing, 2021: 137-144.
[3] Wang P, Hu Y, Huo J. Analysis on the Application of Computer Information Processing Technology under the Background of Big Data. Journal of Physics: Conference Series, 2021, 1881(3): 32052-32059. DOI:10.1088/1742-6596/ 1881/3/032052.
[4] Yu X. Analysis of the Security Strategy of Computer Network Data under the Background of Big Data. 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD). 2021. DOI: 10.1109/ICAIBD51990. 2021. 9459026.
[5] Xing L L. Computer Network Security Maintenance and Management in the Era of Big Data. International Journal of Frontiers in Sociology, 2021. DOI:10.25236/IJFS.2021.030113.
[6] Wang Z, Wang J. Applications of Machine Learning in Public Security Information and Resource Management. Hindawi Limited, 2021. DOI:10.1155/2021/4734187.
[7] Li X. Research on Network Information Security Service Model Based on User Requirements under Artificial Intelligence Technology. 2023 IEEE 3rd International Conference on Power, Electronics and Computer Applications (ICPECA), 2023, 1568-1572. DOI:10.1109/ICPECA56706.2023.10075946.
[8] He X. Analysis of Network Intrusion Detection Technology Based on Computer Information Security Technology. Journal of Physics: Conference Series, 2021, 1744(4): 42038. DOI:10.1088/1742-6596/1744/4/042038.

Downloads: 19517
Visits: 297722

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.