Skip to main content
Log in

Research on the two-way defense model of large data dynamic security SAT

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

To guarantee the safety of big data calculation, the concept of security research and trusted cloud combined with large data security, a two-way defense system model of a large data calculation of SAT. The model of user data evidence through the dynamic safety factor; gradually determine the behavior of security permissions according to the reliability test implementation behavior. Provide the maximum-security defense for users. the experimental results show that the model can effectively improve the data big data security, reduce malicious hackers, to improve the efficiency of data analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Hong, Li, Hao, Li: Key technique and realization of credible cloud security. Posts and Telecom Press, Beijing (2010)

    Google Scholar 

  2. Wang, S., Wang, H.J., Qin, X.P., Zhou, X.: Architecting big data: challenges, studies and forecasts. Chin. J. Comput. 34(10), 1741–1752 (2011)

    Article  Google Scholar 

  3. Meng, X.F., Ci, X.: Big data management: concepts, techniques and challenges. J. Comput. Res. Dev. 50(1), 146–169 (2013)

    Google Scholar 

  4. Shen, D.R., Yu, G., Wang, X.T., Nie, T.Z., Kou, Y.: Survey on NoSQL for management of big data. Ruan Jian Xue Bao/J. Softw. 24(8), 1786–1803 (2013)

    Google Scholar 

  5. Lin, C.H., Peng, X.H.: Credible network research. Chin. J. Comput. 28(5), 751–758 (2005)

    Google Scholar 

  6. Zhou, Q., Yu, J.: Trust-based defense system model under cloud calculation. 31(6), 136–139 (2011)

  7. Wu, H., Yu, J., Yu, F.R.: Trust model-based dynamic access and control under cloud calculation environment. Comput. Eng. Appl. 48(23), 322–327 (2012)

    Google Scholar 

  8. Jameel, H.: A trust model for ubiquitous systems based on vectors of trust values. Proceedings of the 7th IEEE International Symposium on Multimedia. IEEE Computer Society, Washington DC (2005)

    Google Scholar 

  9. Li, X.Y., Gui, X.L.: Multidimensional decision attribute-based trust quantitative model in credible network. Chin. J. Comput. 32(3), 405–415 (2009)

    Google Scholar 

  10. Wang, S., Gao, Y., Cheng, T.Y., et al.: Research of behavior-based bi-layer trust model in grid environment. Comput. Eng. Appl. 25(9), 319–355 (2005)

    Google Scholar 

  11. Feng, X.J., Pan, Y.: DPS0 resource load balancing algorithm in cloud calculation environment. Comput. Eng. Appl. 6(6), 171–179 (2013)

    Google Scholar 

  12. Chen, X.Q., Zhang, J.H.: Improved particle swarm algorithm based cluster algorithm. Comput. Res. Dev. 49(31), 287–291 (2012)

    Google Scholar 

  13. Han, L.B., Wang, Q., Jiang, Z.F., et al.: An improved Kernel initial cluster center selection algorithm. Comput. Eng. Appl. 46(17), 150–157 (2010)

    Google Scholar 

  14. Qin, X.P., Wang, H.J., Du, X.Y., et al.: Big-data analysis–competition and co-existence of RDBMS. Softw. J. 23(1), 3245 (2012)

    Article  Google Scholar 

  15. Shen, Q.N., Du, H., Wen, H., et al.: Integrity measurement architecture based data packaging method. Comput. Res. Dev. 49(1), 210–216 (2012)

    Google Scholar 

  16. Wang, S., Gao, Y., Cheng, T.Y., et al.: Fusion of genetic algorithm and ant algorithm. Comput. Res. Dev. 40(9), 135–143 (2003)

    Google Scholar 

  17. Hua, X.Y., Zheng, J., Hu, W.X.: Cloud calculation environment based ant swarm optimized calculation resources distribution algorithm. J. East China Norm. Univ. 1, 127–134 (2010)

    Google Scholar 

  18. Zhang, Z., Zhang, X.: A load balancing mechanism based on ant colony and complex network theory in open cloud computing federation. In: Proceedings of the 2nd International Conference on Industrial Mechatronics and Automation, pp. 240-543 (2010)

  19. Zhang, Y.S., Jiao, M., Wang, Z.W., Wang, S., Zhou, X.: One-Size-Fits-All OLAP technique for big data analysis. Chin. J. Comput. 34(10), 1936–1946 (2011)

    Article  Google Scholar 

  20. Cao, Y., Chen, C., Guo, F., Jiang, D.W., Lin, Y.T., Ooi, B.C., Vo, H.T., Wu, S., Xu, Q.Q.: ES2: A cloud data storage system for supporting both OLTP and OLAP. In: Proceedings of the Info Conference on Data Engineering (ICDE), pp. 291–302 (2011)

  21. Han, H., Lee, Y.C., Choi, S., Yeom, H.Y., Zomaya, A.Y.: Cloud-Aware processing of MapReduce-based OLAP applications. In: Javadi, B. (ed.) Proceedings of the 11th Australasian Syme. on Parallel and Distributed Computing, pp. 31-38. Australian Computer Society, Darlinghurst (2013)

  22. Yang, L., Shi, Z.Z.: An efficient data mining framework on Hadoop using Java persistence API. In: Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010). IEEE Computer Society, 203–209 (2010)

Download references

Acknowledgements

At first, I would like to special thank my doctoral tutor (Professor Jin Zhi Gang). He gives me a lot of valuable suggestion & productive discussion. I would like to take this opportunity to thank Tianjin University Broad Band & Wireless Communication Labs, Tom Li and Zhang Yuan for their support and feedback during the design and prototype implementation of this paper. I thank Jim Hu and Bell Wang for their feedback during the writing of this paper. I also thank Kevin Ding, Peter Ma, Mac Li, and the Tianjin University Mobile Internet design team as whole for their helpful comments. This paper is based upon work supported by a lot of reference paper and their study. This paper is partially supported by my wife and make sure all translation & grammar, so I also thank my wife‘s hard work, too. Finally, I would heartfelt thank my family, it‘s based on their fully support so that I can finish this paper. Thanks, all again.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hou Rui.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rui, H., Zhigang, J. & Baoliang, W. Research on the two-way defense model of large data dynamic security SAT. Cluster Comput 20, 1237–1246 (2017). https://doi.org/10.1007/s10586-017-0791-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0791-x

Keywords

Navigation