Abstract
In order to improve the data effect of multi-source data collection and shorten the time of data collection, this paper proposes a data security analysis method of multi-source data collection. The white noise on the blank data field and knowledge background is removed through data processing, the multi-source data acquisition and access control function is optimized, the encrypted symmetric key is obtained, the filtered data is forwarded to the corresponding trusted exchange agent, the data security exchange characteristics are extracted, and the data security analysis mode is set. Experimental results: the average time consumed by the security analysis method of multi-source data collection data in this paper and the other two security analysis methods of multi-source data collection data are 94.283 s, 129.940 s and 130.121 s respectively, which proves that the performance of the security analysis method of multi-source data collection data in this paper is more perfect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wan, Q., Ma, Y., Wei, L.: Knowledge acquisition of multi-source data based on multigranularity. J, Shandong Univ, (Natural Science) 55(1), 41–50 (2020)
Yu, L., Li, S., Chen, C., et al.: Analysis of ocean data merge based on multi-source parameters. J. Data Acquisition Process. 35(5), 824–833 (2020)
Luo, J., Liu, X.: Strategies for scientific data security management from the perspective of intellectual property. Library Inf. Serv. 65(12), 38–46 (2021)
Zhou, X., Liu, W., Sui, H., et al.: Five safes framework and its enlightenment to security data access in China’s library field. Inf. Stud. Theory Appl. 43(3), 85–90 (2020)
Feng, T., Jiao, Y., Fang, J., et al.: Medical health data security model based on alliance blockchain. Comput. Sci. 47(4), 305–311 (2020)
Tang, X., Zhou, L., Shan, W., et al.: Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack. J. Commun. 41(6), 98–111 (2020)
Lv, G., Chen, L., Xiao, R., et al.: Simulation of quantitative assessment method for data security situation of wireless network communication. Comput. Simul. 37(7), 337–340,372 (2020)
Jiang, L., Tang, Z.: Multi source data acquisition system based on Flume, Kafka and HDFS. Inf. Technol. Informatization 06, 115–117 (2021)
Xu, H., Xu, Z., Chen, M.: Multi source and multi dimensional reading data collection and digital portrait based on xAPI. Educ. Commun. Technol. 16(04), 59–63 (2020)
Wang, J., Guo, Y., Wen, X., Wan, F.: Multi source data acquisition and comprehensive evaluation system for smart business district. Comput. Eng. 45(01), 284–291 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ma, L., Li, Y. (2023). Multi-source Data Collection Data Security Analysis. In: Fu, W., Yun, L. (eds) Advanced Hybrid Information Processing. ADHIP 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 469. Springer, Cham. https://doi.org/10.1007/978-3-031-28867-8_34
Download citation
DOI: https://doi.org/10.1007/978-3-031-28867-8_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28866-1
Online ISBN: 978-3-031-28867-8
eBook Packages: Computer ScienceComputer Science (R0)