Abstract
To guarantee the safety of big data calculation, the concept of security research and trusted cloud combined with large data security, a two-way defense system model of a large data calculation of SAT. The model of user data evidence through the dynamic safety factor; gradually determine the behavior of security permissions according to the reliability test implementation behavior. Provide the maximum-security defense for users. the experimental results show that the model can effectively improve the data big data security, reduce malicious hackers, to improve the efficiency of data analysis.
Similar content being viewed by others
References
Hong, Li, Hao, Li: Key technique and realization of credible cloud security. Posts and Telecom Press, Beijing (2010)
Wang, S., Wang, H.J., Qin, X.P., Zhou, X.: Architecting big data: challenges, studies and forecasts. Chin. J. Comput. 34(10), 1741–1752 (2011)
Meng, X.F., Ci, X.: Big data management: concepts, techniques and challenges. J. Comput. Res. Dev. 50(1), 146–169 (2013)
Shen, D.R., Yu, G., Wang, X.T., Nie, T.Z., Kou, Y.: Survey on NoSQL for management of big data. Ruan Jian Xue Bao/J. Softw. 24(8), 1786–1803 (2013)
Lin, C.H., Peng, X.H.: Credible network research. Chin. J. Comput. 28(5), 751–758 (2005)
Zhou, Q., Yu, J.: Trust-based defense system model under cloud calculation. 31(6), 136–139 (2011)
Wu, H., Yu, J., Yu, F.R.: Trust model-based dynamic access and control under cloud calculation environment. Comput. Eng. Appl. 48(23), 322–327 (2012)
Jameel, H.: A trust model for ubiquitous systems based on vectors of trust values. Proceedings of the 7th IEEE International Symposium on Multimedia. IEEE Computer Society, Washington DC (2005)
Li, X.Y., Gui, X.L.: Multidimensional decision attribute-based trust quantitative model in credible network. Chin. J. Comput. 32(3), 405–415 (2009)
Wang, S., Gao, Y., Cheng, T.Y., et al.: Research of behavior-based bi-layer trust model in grid environment. Comput. Eng. Appl. 25(9), 319–355 (2005)
Feng, X.J., Pan, Y.: DPS0 resource load balancing algorithm in cloud calculation environment. Comput. Eng. Appl. 6(6), 171–179 (2013)
Chen, X.Q., Zhang, J.H.: Improved particle swarm algorithm based cluster algorithm. Comput. Res. Dev. 49(31), 287–291 (2012)
Han, L.B., Wang, Q., Jiang, Z.F., et al.: An improved Kernel initial cluster center selection algorithm. Comput. Eng. Appl. 46(17), 150–157 (2010)
Qin, X.P., Wang, H.J., Du, X.Y., et al.: Big-data analysis–competition and co-existence of RDBMS. Softw. J. 23(1), 3245 (2012)
Shen, Q.N., Du, H., Wen, H., et al.: Integrity measurement architecture based data packaging method. Comput. Res. Dev. 49(1), 210–216 (2012)
Wang, S., Gao, Y., Cheng, T.Y., et al.: Fusion of genetic algorithm and ant algorithm. Comput. Res. Dev. 40(9), 135–143 (2003)
Hua, X.Y., Zheng, J., Hu, W.X.: Cloud calculation environment based ant swarm optimized calculation resources distribution algorithm. J. East China Norm. Univ. 1, 127–134 (2010)
Zhang, Z., Zhang, X.: A load balancing mechanism based on ant colony and complex network theory in open cloud computing federation. In: Proceedings of the 2nd International Conference on Industrial Mechatronics and Automation, pp. 240-543 (2010)
Zhang, Y.S., Jiao, M., Wang, Z.W., Wang, S., Zhou, X.: One-Size-Fits-All OLAP technique for big data analysis. Chin. J. Comput. 34(10), 1936–1946 (2011)
Cao, Y., Chen, C., Guo, F., Jiang, D.W., Lin, Y.T., Ooi, B.C., Vo, H.T., Wu, S., Xu, Q.Q.: ES2: A cloud data storage system for supporting both OLTP and OLAP. In: Proceedings of the Info Conference on Data Engineering (ICDE), pp. 291–302 (2011)
Han, H., Lee, Y.C., Choi, S., Yeom, H.Y., Zomaya, A.Y.: Cloud-Aware processing of MapReduce-based OLAP applications. In: Javadi, B. (ed.) Proceedings of the 11th Australasian Syme. on Parallel and Distributed Computing, pp. 31-38. Australian Computer Society, Darlinghurst (2013)
Yang, L., Shi, Z.Z.: An efficient data mining framework on Hadoop using Java persistence API. In: Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010). IEEE Computer Society, 203–209 (2010)
Acknowledgements
At first, I would like to special thank my doctoral tutor (Professor Jin Zhi Gang). He gives me a lot of valuable suggestion & productive discussion. I would like to take this opportunity to thank Tianjin University Broad Band & Wireless Communication Labs, Tom Li and Zhang Yuan for their support and feedback during the design and prototype implementation of this paper. I thank Jim Hu and Bell Wang for their feedback during the writing of this paper. I also thank Kevin Ding, Peter Ma, Mac Li, and the Tianjin University Mobile Internet design team as whole for their helpful comments. This paper is based upon work supported by a lot of reference paper and their study. This paper is partially supported by my wife and make sure all translation & grammar, so I also thank my wife‘s hard work, too. Finally, I would heartfelt thank my family, it‘s based on their fully support so that I can finish this paper. Thanks, all again.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rui, H., Zhigang, J. & Baoliang, W. Research on the two-way defense model of large data dynamic security SAT. Cluster Comput 20, 1237–1246 (2017). https://doi.org/10.1007/s10586-017-0791-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0791-x