Paper
1 June 2023 Research on prevention methods of database network security under the background of big data
Jiancheng Wang
Author Affiliations +
Proceedings Volume 12625, International Conference on Mathematics, Modeling, and Computer Science (MMCS2022); 126252F (2023) https://doi.org/10.1117/12.2670490
Event: International Conference on Mathematics, Modeling and Computer Science (MMCS2022),, 2022, Wuhan, China
Abstract
In the rapid development of information technology, our country society has entered the big data era, in order to effectively manage and mine the large batch data information, all walks of life begin to widely use database technology. The rapid development of the Internet provides an effective platform for data sharing for the majority of users, so that big data can truly realize data sharing according to an open attitude. However, because of the complexity of computer network environment and the imperfection of database security technology, the problem of database network security has become the main topic of discussion. Therefore, on the basis of understanding the research status and problems of database technology in the era of big data, this paper clarified the protection requirements of database network security in the era of big data, and proposed the corresponding key technologies of security protection, so as to provide basic guarantee for data sharing in various fields.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jiancheng Wang "Research on prevention methods of database network security under the background of big data", Proc. SPIE 12625, International Conference on Mathematics, Modeling, and Computer Science (MMCS2022), 126252F (1 June 2023); https://doi.org/10.1117/12.2670490
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Network security

Computer security

Clouds

Data storage

Information security

Security technologies

Back to Top