Big Data Security and Privacy Protection in Colleges and Universities

  • Conference paper
  • First Online:
Application of Intelligent Systems in Multi-modal Information Analytics (MMIA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 929))

  • 1551 Accesses

Abstract

An increasing number of universities choose to deploy big data and cloud computing to integrate information from various departments, and adopt data mining technology to improve teaching management levels and decision-making abilities. Based on the acquisition, storage, application and publishing of data, this paper proposes the whole technology framework of big data security system from three levels of network, equipment and application, and puts forward to strategies which can protect individual privacy in each link.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chen XN, Xu HY, Lv JM, Guo J, **an T (2018) Intelligent campus under the background of big data. J Electron Technol Softw Eng 02:170

    Google Scholar 

  2. Li B (2018) Application of data mining technology in intelligent campus. J China Comput Commun 17:109–110

    Google Scholar 

  3. Guo R, Zhao B (2017) Analysis of PGP encryption: a kind of encryption technique. J Sci Technol Inf 15:8–9

    Google Scholar 

  4. Liu QT (2007) Application research of big data in intelligent campus. Northeast Norm Univ 54–57

    Google Scholar 

  5. Chen PY, Chen WM (2006) Application of campus intelligent technology. Comput Sci 150–154

    Google Scholar 

  6. Kang WJ (2011) Research on social network protection methods. Sci Tech Inf 4:21–23

    Google Scholar 

  7. Tan BC (2013) Modern science and technology information. J Anshun Univ 2:33–35

    Google Scholar 

  8. Huang WW (2006) Research on data perturbation methods to protect privacy in statistical databases, in: database professional committee of China computer federation. In: Collected papers of the 23rd China database academic conference (research report)

    Google Scholar 

  9. Fan GT, Yang Y, Sun G, Zhao J (2017) Research on perturbation-based social network protection methods. J Fuyang Norm Univ (Nat Sci Ed) 34:55–60

    Google Scholar 

  10. Yang GM, Yang J, Zhang JP (2011) Research on privacy protection in data release. J Comput Sci 38:11–17

    Google Scholar 

  11. Chen JM, Han JM (2010) K-anonymous data quality assessment model for micro-aggregation technology. J Appl Res Comput 27:2344–2347

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to **lan Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, J. (2019). Big Data Security and Privacy Protection in Colleges and Universities. In: Sugumaran, V., Xu, Z., P., S., Zhou, H. (eds) Application of Intelligent Systems in Multi-modal Information Analytics. MMIA 2019. Advances in Intelligent Systems and Computing, vol 929. Springer, Cham. https://doi.org/10.1007/978-3-030-15740-1_96

Download citation

Publish with us

Policies and ethics

Navigation