skip to main content
10.1145/3630138.3630484acmotherconferencesArticle/Chapter ViewAbstractPublication PagespccntConference Proceedingsconference-collections
research-article

Research on Data Security of New Energy Business Based on Hadoop

Published:17 January 2024Publication History

ABSTRACT

In recent years, with the development of new energy industry and digital transformation, a large amount of business data is stored and transmitted, which contains important business secrets and user privacy information, so data security has become an important task. New energy business data security is a comprehensive task that requires a comprehensive consideration of factors such as technology, management and personnel training. By adopting appropriate security measures, the confidentiality, integrity and availability of new energy business data can be protected. With the rapid development of the Internet of Things, cloud computing and sensor technology, a large number of data characterized by a large number of types and strong timeliness has emerged, and the concept of big data has emerged. Big data is usually unable to be stored and calculated with conventional software within a certain time frame, and the adoption of new technical architectures can make big data play a greater value. In order to realize the secure storage of static big data and ensure the high storage efficiency, a scheme of secure storage of static big data based on lightweight encryption and homomorphic encryption algorithm is proposed. For unstructured data, a parallel encryption scheme based on elliptic curve lightweight encryption algorithm is designed. With the proposed dual-channel storage model, the data to be stored can be encrypted and stored from two storage channels at the same time. The dual-channel storage mode can increase the data storage speed and make up for the time consumption caused by the data encryption process. The reliability of the algorithm is verified by experiments.

References

  1. J Li, S Li and L Cheng, 2022. BSAS: A Blockchain-Based Trustworthy and Privacy-Preserving Speed Advisory System [J]. IEEE Transactions on Vehicular Technology 71, 11, 11421-11430.Google ScholarGoogle ScholarCross RefCross Ref
  2. S Mumtaz, H Lundqvist and K M S Huq, 2014. Smart Direct-LTE communication: An energy saving perspective [J]. Ad. Hoc. Networks 13, 296-311.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S Mumtaz, K M S Huq and A Radwan, 2014. Energy efficient interference-aware resource allocation in LTE-D2D communication [C]. 2014 IEEE International Conference on Communications (ICC). IEEE, pp. 282-287.Google ScholarGoogle ScholarCross RefCross Ref
  4. Y Liang, C Liu, Z Lian and W Li. 2023. Aspect level sentiment analysis using fused multi attention neural networks [J]. Computer Engineering and Design 44, 03, 894-900. DOI: 10.16208/j.issn1000-7024.2023.03.035.Google ScholarGoogle ScholarCross RefCross Ref
  5. Y Wang, M Huang, X Zhu and L Zhao. 2016. Attention-based LSTM for aspect-level sentiment classification. Proc. Conf. Empirical Methods Natural Lang. Process., pp. 606–615.Google ScholarGoogle ScholarCross RefCross Ref
  6. C R Aydin and T Gungor. 2020. Combination of recursive and recurrent neural networks for aspect-based sentiment analysis using inter-aspect relations. IEEE Access 8, 77820–77832.Google ScholarGoogle ScholarCross RefCross Ref
  7. Y Li, C Yin and S -H Zhong. 2020. Sentence constituent-aware aspectcategory sentiment analysis with graph attention networks. Natural Language Processing and Chinese Computing 12430, 815–827.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K Sangeetha, D Prabha. 2021. Sentiment analysis of student feedback using multi-head attention fusion model of word and context embedding for LSTM [J]. Journal of Ambient Intelligence and Humanized Computing 12, 6, 4117-4126.Google ScholarGoogle ScholarCross RefCross Ref
  9. D Yin, T Meng, K W Chang. 2020. SentiBERT: A transferable transformer-based architecture for compositional sentiment semantics [C]. Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics. Stroudsburg, PA: Association for Computational Linguistics, pp. 3695-3706.Google ScholarGoogle ScholarCross RefCross Ref
  10. A Grover and J Leskovec. 2016. node2vec: Scalable feature learning for networks [C]. Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 855-864.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Research on Data Security of New Energy Business Based on Hadoop
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              PCCNT '23: Proceedings of the 2023 International Conference on Power, Communication, Computing and Networking Technologies
              September 2023
              552 pages
              ISBN:9781450399951
              DOI:10.1145/3630138

              Copyright © 2023 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 17 January 2024

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited
            • Article Metrics

              • Downloads (Last 12 months)4
              • Downloads (Last 6 weeks)2

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format