KEYWORDS: Data storage, Computer security, Data centers, Data processing, Data transmission, Data storage servers, Network security, System integration, Databases, Data communications
With the approach of the big data era, the risks and problems of information data security influence people’s life and even public security seriously. To relieve these issues, integrative security protection system for full life cycle of big data is proposed, of which SM Crypto Algorithm is introduced for data security protection of all phases in data life cycle, including data collection, data transmission, data storage, data exchange and sharing, and data destruction. Relying on the safety performance of SM2 (the public key cryptographic algorithm based on elliptic curves) and SM4 (the block cipher algorithm), the protection mechanism ensures the security of the identity access control and encryption of data transmission, storage, exchange and application.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.