Skip to main content

Multi-source Data Collection Data Security Analysis

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2022)

Abstract

In order to improve the data effect of multi-source data collection and shorten the time of data collection, this paper proposes a data security analysis method of multi-source data collection. The white noise on the blank data field and knowledge background is removed through data processing, the multi-source data acquisition and access control function is optimized, the encrypted symmetric key is obtained, the filtered data is forwarded to the corresponding trusted exchange agent, the data security exchange characteristics are extracted, and the data security analysis mode is set. Experimental results: the average time consumed by the security analysis method of multi-source data collection data in this paper and the other two security analysis methods of multi-source data collection data are 94.283 s, 129.940 s and 130.121 s respectively, which proves that the performance of the security analysis method of multi-source data collection data in this paper is more perfect.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wan, Q., Ma, Y., Wei, L.: Knowledge acquisition of multi-source data based on multigranularity. J, Shandong Univ, (Natural Science) 55(1), 41–50 (2020)

    Google Scholar 

  2. Yu, L., Li, S., Chen, C., et al.: Analysis of ocean data merge based on multi-source parameters. J. Data Acquisition Process. 35(5), 824–833 (2020)

    Google Scholar 

  3. Luo, J., Liu, X.: Strategies for scientific data security management from the perspective of intellectual property. Library Inf. Serv. 65(12), 38–46 (2021)

    Google Scholar 

  4. Zhou, X., Liu, W., Sui, H., et al.: Five safes framework and its enlightenment to security data access in China’s library field. Inf. Stud. Theory Appl. 43(3), 85–90 (2020)

    Google Scholar 

  5. Feng, T., Jiao, Y., Fang, J., et al.: Medical health data security model based on alliance blockchain. Comput. Sci. 47(4), 305–311 (2020)

    Google Scholar 

  6. Tang, X., Zhou, L., Shan, W., et al.: Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack. J. Commun. 41(6), 98–111 (2020)

    Google Scholar 

  7. Lv, G., Chen, L., Xiao, R., et al.: Simulation of quantitative assessment method for data security situation of wireless network communication. Comput. Simul. 37(7), 337–340,372 (2020)

    Google Scholar 

  8. Jiang, L., Tang, Z.: Multi source data acquisition system based on Flume, Kafka and HDFS. Inf. Technol. Informatization 06, 115–117 (2021)

    Google Scholar 

  9. Xu, H., Xu, Z., Chen, M.: Multi source and multi dimensional reading data collection and digital portrait based on xAPI. Educ. Commun. Technol. 16(04), 59–63 (2020)

    Google Scholar 

  10. Wang, J., Guo, Y., Wen, X., Wan, F.: Multi source data acquisition and comprehensive evaluation system for smart business district. Comput. Eng. 45(01), 284–291 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, L., Li, Y. (2023). Multi-source Data Collection Data Security Analysis. In: Fu, W., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 469. Springer, Cham. https://doi.org/10.1007/978-3-031-28867-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28867-8_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28866-1

  • Online ISBN: 978-3-031-28867-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics