Font Size: a A A

Based On The Safety Of The Big Data Transmission And Story Design And Implementation

Posted on:2015-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y DengFull Text:PDF
GTID:2308330473459560Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Internet information age, big data has become a very important resource, but the process of data collection, storage, use, however, there are many security problems. Both companies and countries have invested a lot of manpower and material resources and financial resources data related technology research, but in the protection of data security must rely on perfect infrastructure. In today’s infrastructure is still not enough perfect, let’s focus on how to solve the problem of big data in the field of special safety.The in-depended invention of XX system has provided functional communication for the global user, and provides secure communications system for a particular user is a major feature of XX. Development of user terminal communication equipment, communication management sites around the world is the main task of XX system construction.Of the XX system of large amounts of data during the transport, storage, security technology research as corpus of XX system of information security technology research, in view of the user terminal communications equipment outside the application requirements and global communication network architecture and technical system of comprehensive utilization of information transmission encryption and security protection technology, sensitive to sensitive information interaction, data processing, user terminal communications equipment and communications management site safety equipment to provide safe and controllable protection measures, ensure the safety of the operation environment of information security control, controlled and foreign equipment safety control.To achieve the above goal, this paper on the secure transmission and storage security technology based on large data is designed and realized. From the transmission channel of data security,anti sabotage,data tamper proof,physical security,severalaspects of equipment.According to the XX system to protect the data transmission security requirements,using authentication management module transmits the data to the communication management site in the user terminal communication equipment, the realization of thecertification management of all the data, ensure the illegal data can not enter the system impact system equipment;ensure receiving to storage devices in the systemare valid data, saving storage space;it also carries on the pretreatment to the datasimple,provide convenience for the subsequent data analysis.According to the XX system to protect the security of data storage requirements, proposed the communication management site storage equipment design using the server hardware platform, dual hot high configuration,ensure the work stability,storage equipment data integrity. At the same time in the storage device embedded installation safety protection module to protect equipment of physical security, ensure that even if the equipment out of control,there will not be a large number of datastolen.
Keywords/Search Tags:Big data, Certification transmission, Backup storage, Equipment safety
PDF Full Text Request
Related items