首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
阐述了物联网、大数据及云计算技术的研究现状,指出3种技术之间的关系,即物联网产生大数据,大数据助力物联网;大数据需要云计算,云计算增值大数据。结合煤矿综合自动化的建设发展历程,研究了3种技术在煤矿安全生产保障中的作用和地位,提出了3种技术在煤矿生产安全保障中的关系:物联网是煤矿各个子系统建设的技术框架和路线图,大数据是矿山物联网建设的产物,云计算则是对大数据处理利用的技术手段,并指出基于物联网、大数据及云计算技术的煤矿安全生产监测监控系统将是主动式、多参数融合、具备预警功能的监测监控系统,可有效提升煤矿安全生产水平。  相似文献   

2.
聂晓 《工矿自动化》2013,39(4):47-50
介绍了云计算与物联网的概念,分析了二者结合的必然性与结合模式,提出了基于云计算的物联网体系结构,研究了基于云计算的物联网所面临的安全威胁问题,并针对安全威胁给出了相应的解决方案,即构建可信的物联网环境和如何保证"云"中的物联网数据安全,指出了基于云计算的物联网安全研究的技术难点和研究现状。  相似文献   

3.
The Internet of Things (IoT), including wireless sensors, is one of the highly anticipated contributors to big data; therefore, avoiding misleading or forged data gathering in cases of sensitive and critical data through secure communication is vital. However, due to the relatively long distance between remote cloud and end nodes, cloud computing cannot provide effective and direct management for end nodes, which leads to security vulnerabilities. In this paper, we propose a novel trust evaluation model based on the trust transitivity on a chain assisted by mobile edge nodes, which is used to ensure the reliability of nodes in the Internet of Things and prevent malicious attacks. The mobile edge nodes offer a new solution to solve the above problems with relatively strong computing and storage abilities. Firstly, we design calculation approaches to different trust chains to measure their trust degrees. Secondly, we propose an improved Dijkstra’s algorithm for collecting trust information of sensor nodes by mobile edge nodes. Finally, the experimental results show that our trust model based on mobile edge nodes can evaluate sensor nodes more precisely and enhance the security on the Internet of Things.  相似文献   

4.
目前的聚类方法单纯从某个角度研究数据聚类问题,对基于云模式的混沌的物联网大数据聚类的考虑不足,聚类质量不高。为实现敏捷、智能、平稳的物联网大数据聚类,基于开展物联网事件的云模式通用描述模型、物联网事件混沌关联特征的云模式通用解析模型、基于云模式的物联网事件混沌关联特征提取算法、基于云模式混沌关联特征的物联网大数据关联挖掘研究,改进分解奇异值算法、网格耦合聚类算法、K-means算法、决策树学习法、分析主成分法、分层合并法等算法和分布概率函数,设计了一种基于事件混沌关联特征、敏捷、智能、平稳的物联网大数据聚类算法。最后,开展实验验证,并与传统算法进行性能对比分析。实验结果表明,相比传统算法,该算法聚类时间短、误差小,且敏捷性、智能性、动态演化性和平稳性高。因此,该算法实现了基于云模式的具有混沌关联特征的物联网事件大数据的有效聚类,具有较高的应用价值。  相似文献   

5.
在万物互联的物联网时代,云计算凭借超强的计算能力和存储能力提供了主流的大数据处理方案。随着5G的正式商用,面对5G+物联网呈爆炸式增长的终端设备以及低时延、低功耗的用户需求,基于云计算的大数据处理方案逐渐显露弊端。分布式的面向移动终端的大数据处理方案——移动边缘计算呼之欲出。本文通过对比云计算、边缘计算和移动边缘计算的概念和相关特征,引入移动边缘计算的定义及八大典型应用场景,进一步列举出移动边缘计算的发展历程。随后,归纳出移动边缘计算的几种国际标准模型以及框架设计的相关研究,结合移动边缘计算资源分配的关键问题进行梳理。最后,提出移动边缘计算的未来的研究方向和挑战。  相似文献   

6.
近年来,随着云计算、物联网、大数据、移动互联网等新技术的快速发展和日趋成熟,传统的电力营销系统也开展了大数据平台的建设。在对数据的挖掘和应用中,数据安全问题逐渐显露出来。电力营销系统中的数据涉及大量保密性较高的信息,信息泄露会给电力公司带来巨大损失,也会威胁到用户安全。因此,如何在不影响数据正常使用的情况下,保证数据的安全成为当下研究的热点。本文通过对可应用于电力营销系统中的数据安全防护措施进行研究,在数据层面进行变换,消除原始数据中的敏感信息,加强了数据保密性,保障了数据安全。  相似文献   

7.
The Internet of Everything (IoE) based cloud computing is one of the most prominent areas in the digital big data world. This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud. The IoE-based cloud computing services are located at remote locations without the control of the data owner. The data owners mostly depend on the untrusted Cloud Service Provider (CSP) and do not know the implemented security capabilities. The lack of knowledge about security capabilities and control over data raises several security issues. Deoxyribonucleic Acid (DNA) computing is a biological concept that can improve the security of IoE big data. The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol (StS KAP) and Feistel cipher algorithms. This paper proposed a DNA-based cryptographic scheme and access control model (DNACDS) to solve IoE big data security and access issues. The experimental results illustrated that DNACDS performs better than other DNA-based security schemes. The theoretical security analysis of the DNACDS shows better resistance capabilities.  相似文献   

8.
A disruptive technology that is influencing not only computing paradigm but every other business is the rise of big data. Internet of Things (IoT) applications are considered to be a major source of big data. Such IoT applications are in general supported through clouds where data is stored and processed by big data processing systems. In order to improve the efficiency of cloud infrastructure so that they can efficiently support IoT big data applications, it is important to understand how these applications and the corresponding big data processing systems will perform in cloud computing environments. However, given the scalability and complex requirements of big data processing systems, an empirical evaluation on actual cloud infrastructure can hinder the development of timely and cost effective IoT solutions. Therefore, a simulator supporting IoT applications in cloud environment is highly demanded, but such work is still in its infancy. To fill this gap, we have designed and implemented IOTSim which supports and enables simulation of IoT big data processing using MapReduce model in cloud computing environment. A real case study validates the efficacy of the simulator.  相似文献   

9.
With computing systems undergone a fundamental transformation from single-processor devices at the turn of the century to the ubiquitous and networked devices and the warehouse-scale computing via the cloud, the parallelism has become ubiquitous at many levels. At micro level, parallelisms are being explored from the underlying circuits, to pipelining and instruction level parallelism on multi-cores or many cores on a chip as well as in a machine. From macro level, parallelisms are being promoted from multiple machines on a rack, many racks in a data center, to the globally shared infrastructure of the Internet. With the push of big data, we are entering a new era of parallel computing driven by novel and ground breaking research innovation on elastic parallelism and scalability. In this paper, we will give an overview of computing infrastructure for big data processing, focusing on architectural, storage and networking challenges of supporting big data paper. We will briefly discuss emerging computing infrastructure and technologies that are promising for improving data parallelism, task parallelism and encouraging vertical and horizontal computation parallelism.  相似文献   

10.
云存储是由云计算提供的一个重要服务,允许数据拥有者将数据远程存储到云服务器上,同时又能够从云服务器上便捷、高效地获取这些数据,没有本地存储和维护数据的负担。然而,这种新的数据存储模式也引发了众多安全问题,一个重要的问题就是如何确保云服务器中数据拥有者数据的完整性。因此,数据拥有者以及云存储服务提供商亟需一个稳定、安全、可信的完整性审计方案,用于审核云服务器中数据的完整性和可用性。不仅如此,一个好的数据完整性审计方案还需满足如下功能需求:支持数据的动态操作,包括插入、删除、修改;支持多用户、多云服务器的批量审计;确保用户数据的隐私性;注重方案的执行效率,尽量减少数据拥有者和云服务器的计算开销与通信开销。为了促进云存储服务的广泛应用与推广,文章重点对云数据完整性审计方案的研究现状进行综述,描述云存储以及数据完整性审计的相关概念、特点,提出云计算环境下数据完整性审计模型和安全需求,阐述云存储数据完整性审计的研究现状,并重点分析部分经典方案,通过方案对比,指出当前方案存在的优点及缺陷。同时,文章还指出了本领域未来的研究方向。  相似文献   

11.
Cloud computing is distributed type of technology to offers distant services by the internet to manage, access, and store data on their server. The cloud server manages and distributes large amounts of data. During large amounts of complex structured and unstructured data transactions, in order to protect the data and cloud resources from harmful activities by using the main task of the security system. Therefore, a novel intrusion detection system is required in cloud networks to detect malicious activity and improve secure data transmission. In this paper, a novel technique called advanced set containment deep learned Rabin certificateless signcryption (ADRES) technique is employed to secure data transmission for achieving better confidentiality, and integrity, in cloud computing. The ADRES technique includes three major phases namely Registration and key generation, signcryption, and unsigncryption. At the first phase, the user registers details to the cloud server using secure transmission in big data analytics. The cloud server generates the private and public keys for each registered user. In the second phase, the signcryption process is determined by cloud user that encrypts and generates the signature by using the Rabin cryptosystem. Then encrypted data is stored in a cloud server with minimum space complexity. Finally, the unsigncryption is performed by using signature verification and decryption. First, the signature verification is performed by applying an Advanced set containment Deep belief neural network for identifying the authorized or unauthorized user (i.e., attacker). The authorized user decrypts data using the Rabin cryptosystem to achieve the original data. Thus, secure data transmission is obtained through improved data confidentiality and integrity. Simulation of the proposed ADRES technique is performed with respect to data confidentiality level, data integrity rate, and computation time, space complexity with several numbers of data. Experimental results reported ADRES obtains the improved data transmission security with better confidentiality rate by 7%, integrity by 7%, and lesser time 16% and space complexity by 18% than the conventional methods.  相似文献   

12.
信息安全等级保护制度是国家信息安全保障工作的基本制度和基本策略。而等级测评是用来检验和评价信息系统安全保护水平的重要方法。新技术的出现如云计算、物联网、三网融合等,给传统等级测评技术带来了新的挑战。本文以物联网和云计算为代表,探讨了新技术发展对等级测评产生的影响,旨在推动等级测评技术的发展,为其深入研究提供理论参考。  相似文献   

13.
嵌入式系统将互联网变革到物联网,推动了云计算与大数据的服务应用。大数据是物联网中人文数据与物理数据的完整数据群。物联网时代是嵌入式系统的后技术时代,大数据时代是嵌入式系统的技术服务时代。在嵌入式系统转型时期,应关注半导体厂家的服务转型,抓住智能电网用户端的嵌入式系统机遇。  相似文献   

14.
Cloud computing is a powerful technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive computing hardware, dedicated space, and software. Massive growth in the scale of data or big data generated through cloud computing has been observed. Addressing big data is a challenging and time-demanding task that requires a large computational infrastructure to ensure successful data processing and analysis. The rise of big data in cloud computing is reviewed in this study. The definition, characteristics, and classification of big data along with some discussions on cloud computing are introduced. The relationship between big data and cloud computing, big data storage systems, and Hadoop technology are also discussed. Furthermore, research challenges are investigated, with focus on scalability, availability, data integrity, data transformation, data quality, data heterogeneity, privacy, legal and regulatory issues, and governance. Lastly, open research issues that require substantial research efforts are summarized.  相似文献   

15.
Cloud computing is deemed the next-generation information technology (IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications with high quality guaranteed. However, cloud users no longer possess their data in a local data storage infrastructure, which would result in auditing for the integrity of outsourced data being a challenging problem, especially for users with constrained computing resources. Therefore, how to help the users complete the verification of the integrity of the outsourced data has become a key issue. Public verification is a critical technique to solve this problem, from which the users can resort to a third-party auditor (TPA) to check the integrity of outsourced data. Moreover, an identity-based (ID-based) public key cryptosystem would be an efficient key management scheme for certificatebased public key setting. In this paper, we combine ID-based aggregate signature and public verification to construct the protocol of provable data integrity. With the proposed mechanism, the TPA not only verifies the integrity of outsourced data on behalf of cloud users, but also alleviates the burden of checking tasks with the help of users' identity. Compared to previous research, the proposed scheme greatly reduces the time of auditing a single task on the TPA side. Security analysis and performance evaluation results show the high efficiency and security of the proposed scheme.  相似文献   

16.
针对现有农产品信息服务存在的数据质量低、整合难、流通差等问题和大数据时代的工作要求,依托物联网、大数据、云计算等技术,设计一种基于大数据的农产品信息服务云平台.数据获取层主要利用物联网感知采集数据,在大数据中心完成数据转换、处理、分析,通过应用层可视化展示实现"4A"应用.平台进行云化管理,为不同参与主体提供按需服务,...  相似文献   

17.
Big data has been continuously generated from the rapidly developing of cloud/fog/edge computing, Internet of Things (IoT) and 5G technology. This big data not only brings great benefits and opportunities to human beings but also brings many risks and challenges. One major challenge is how to represent and treat higher-order and heterogeneous data from multi-sources. Tensors are emerging as powerful tools for representation and modeling of this data. Tensor decomposition can be used to extract potentially useful information from this data. Thus, it has attracted much attention from the big data community. The main target of this paper is to propose a novel data fusion framework to solve several main challenges of CPSS data applications, including CPSS big data representation, fusion, efficient computing, storage, robustness, and security issues. In this paper, we use many graphics to visualize complex tensor decomposition and transformation processes. The visualization may help the readers better understand tensor and tensor decomposition. It also provides a general guideline and a good starting point for those who are interested in tensor and tensor decomposition. Specifically, we first introduce the most extensively used matrix and tensor decomposition methods. Second, the current popular data fusion methods are reviewed and summarized. Third, we propose a novel tensor-network-conversion-based data fusion approach which can simultaneously analyze multiple matrices and multiple tensors. To better understand this approach, we give a brief review of tensor network. Fourth, based on the proposed approach, a novel CPSS big data fusion framework is proposed in this paper. Meanwhile, we verify it by a concise case study. Finally, some challenges and open problems of the proposed framework are discussed. The discussion also includes some exciting future research directions in the big data fusion field.  相似文献   

18.
云计算的出现为计算机的发展提出了一个新的发展方向,但是其中的很多安全问题一直限制着云计算的发展,其中云存储的完整性检测问题最为突出。由于大数据的特性,现有的关于数据完整性检测的协议并不适合大数据的检测。通过对Juels协议的改进,文中提出一种新的更加适合大数据存储的数据完整性检测协议,改进了原有协议只能进行有限次数检测的缺陷,引入了纠删码技术,使得数据的可恢复性得到大幅提升。通过理论分析表明该协议在数据的计算量和用户数据存储量上都有明显优势。  相似文献   

19.
基于无感识别技术、物联网技术和云计算平台,构建了面向电力企业的物联网系统架构,结合云计算平台,设计了一款电力企业工器具智能分类系统。该系统基于无线射频识别技术(Radio Frequency Identification technology, RFID),将电子标签作为自动识别装置的工器具分类手段。工器具的数据在经过自动识别装置进行读取之后转入云计算平台进行大数据匹配,从而实现工器具的智能分类和管理。本文所设计的工器具智能分类系统在很大程度上解决了工器具在数据读取、状态诊断和智能分类管理上的问题,杜绝了电力企业中的各种安全管理问题,在完善工器具智能分类和电力企业智能管理方面有着重要意义和参考价值。  相似文献   

20.
近些年来,随着物联网的快速发展,其应用场景涵盖智慧家庭、智慧城市、智慧医疗、智慧工业以及智慧农业。相比于传统的以太网,物联网能够将各种传感设备与网络结合起来,实现人、电脑和物体的互联互通。形式多样的物联网协议是实现物联网设备互联互通的关键,物联网协议拥有不同的协议栈,这使得物联网协议往往能表现出不同的特性。目前应用较广的物联网协议有ZigBee、BLE、Wi-Fi、LoRa、RFID等,这些协议能根据自身特性的不同应用在不同领域,比如说LoRa被广泛应用于低功耗广域网、RFID被用于设备识别。然而,由于物联网端设备只拥有受限的计算和存储资源,无法在其上实施完备的安全算法,许多物联网协议会在功耗和安全性之间进行取舍,使得物联网协议的安全性得不到保障。物联网协议的安全性直接关系到物联网系统的安全性,所以有必要对物联网协议的安全性进行分析。本文阐述常见的几种物联网协议所具备的安全能力,包括物联网协议在保护机密性、完整性以及身份认证上所制定的规则。然后从常见的无线协议攻击出发,包括窃听攻击、重放攻击、电池耗尽以及射频干扰,分析了这几种协议在面对这些攻击时的表现。除此之外,我们比较了常见的几种物...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号