Research on Network Security in the Context of Big Data
Introduction
"The Research on Network Security in the Context of Big Data" is a book that explores the integration of network security and big data. The book is divided into nine chapters, systematically introducing the fundamentals, establishment, secure transmission and storage, secure exchange, secure destruction and recovery, network database security, network user privacy security, secure authentication and access control, as well as big data-based network attacks and defense in the context of big data. The book integrates both theoretical and practical aspects of network security and big data, providing a comprehensive guide to safeguarding network security in the era of big data. It holds significant reference value for researchers in network security, network administrators, and data experts. Readers can gain insights into the background and importance of the integration of network security and big data, as well as a deep understanding of the security challenges and solutions within the big data environment.
978-981-5155-52-5
Chapter I Background of Network Security and Big Data
Section 1 The concept, characteristics and content of network security
Section 2 Development status and trend of network security construction
Section 3 The Era background of Big Data
Chapter Ⅱ Secure creation of big data
Section 1 Concepts and characteristics of big data
Section 2 Collection of big data
Section 3 Import and export of big data
Section 4 Query of big data
Chapter Ⅲ Transmission and Storage Security of Big Data
Section 1 Encryption of big Data transmission
Section 2 Network availability
Section 3 Storage security of big data
Chapter Ⅳ Secure Exchange of Big Data
Section 1 Overview of big data exchange
Section 2 Big data sharing
Section 3 Big data security exchange technology
Chapter V Secure Destruction and Recovery of Big data
Section 1 Big data backup
Section 2 Big data destruction and disposal
Section 3 Big data recovery
Chapter Ⅵ Big Data and Network Database Security
Section 1 Overview of network database security
Section 2 Network database user management
Section 3 Relational database security techniques
Section 4 Non-relational database security techniques
Chapter Ⅶ Privacy and Security Of Network Users in the Big Data Environment
Section 1 Terminal access security
Section 2 Network anonymous communications
Section 3 Application-layer privacy protection
Section 4 DNT Standards Of Browsers
Chapter Ⅷ Security Authentication and Access Control in the Big Data Scenario
Section 1 Identity authentication technology
Section 2 Access Control Technology in the Big Data Scenario
Section 3 Zero-trust network security architecture
Chapter Ⅸ Background of Network Security and Big Data
Section 1 Network security detection based on big data
Section 2 Network content security analysis based on big data
Section 3 Network security management based on situational awareness
Conclusion
References
Author(s) Information
Chief Editor:
Jian Hou (1981.5—), male, Han ethnicity, Yucheng City, Shandong Province, graduated from Shandong University with a master's degree in Signal and Information Processing. Currently, he is employed as a senior experimentalist and registered information security engineer at Shandong Normal University. His research focus is on cybersecurity in the cyberspace. He has participated in over ten national and provincial-level natural and social science projects, obtained three national invention patents, and published over ten research papers.
Deputy Editor-in-Chief:
Changdi XU (1981.2—), male, Han ethnicity, Heze City, Shandong Province. He graduated from Shandong Normal University with a master's degree in Computer Application Technology. Currently employed as a big data engineer at Shandong Education TV Station, his research focus is on the application of big data analysis. He has obtained multiple software copyrights and published several research papers.
Xiaoning YUAN (1982.7—), female, Han ethnicity, Zibo City, Shandong Province. She graduated from Shandong University with a master's degree in Computer Science and Technology. Currently a primary lecturer at Shandong Normal University, her research focuses on computer science. She has led or participated in over ten provincial-level natural and social science projects and school-level teaching reform projects. She has co-authored several textbooks and published multiple research papers.
Qiaoqiao TAN(1996.1—), female, Han ethnicity, Heze City, Shandong Province. She graduated from Shandong Normal University with a master's degree in Computer Application Technology. Currently employed as an engineer at Shandong Normal University, her research focus is on big data processing and intelligent recommendations. She has participated in one provincial-level natural science project, obtained one software copyright, and published four research papers.
Jiande SUN (1978.7—), male, Han ethnicity, Yantai City, Shandong Province. He graduated from Shandong University with a doctoral degree in Communication and Information Systems. Currently a professor and doctoral supervisor at Shandong Normal University, his research focuses on multimedia information processing, analysis, understanding, and applications. He has led 2 national natural science fund projects, 13 provincial and ministerial-level projects, and participated in 1 national 973 sub-project. He has published 167 academic papers, holds 1 U.S. invention patent as the first inventor, and has been granted 20 Chinese invention patents. He has also co-authored 3 bilingual monographs.
Zhen ZHAN (1981.7—), male, Han ethnicity, Zibo City, Shandong Province. He graduated from the School of Information Science and Engineering at Shandong University with a master's degree in Signal and Information Processing. He also holds an EMBA from the National University of Singapore Business School. Currently working as a project manager at Ericsson Singapore Branch, he has been responsible for major projects including the New Telecom HD Voice Core Network, New Telecom Virtual Operator Core Network Construction, New Telecom 5G Core Network Initial Construction, and New Telecom 5G
Enterprise Network Project Collection.