Reference: [1] Wu Yanshun. Research on Large Data Security and Privacy Protection Based on Cloud Computing [J]. Electronic Technology and Software Engineering, 2016, 45 (4): 199-201. [2] Chen Dongmei. Discussions on Big Data Security and Privacy Protection Based on Cloud Computing [J]. Computer Knowledge and Technology, 2018,15(15): 101-103. [3] Cui Jiren, Zhang Yanli, Wang Yue-man. Large Data Security and Privacy Protection Analysis Based on Cloud Computing [J]. Network Security Technology and Applications, 2016, 25 (6): 72-73. [4] Pan Mingbo.Research on Privacy Protection Algorithms for Network Data in Large Data Environment[J].Microelectronics and Computer, 2017,34(7): 101-104. [5] Zhao Wenzheng, Wang Zaiyun, Li Afang. Relevant analysis of big data security and privacy protection based on cloud computing [J]. Network security technology and application, 2018, 15 (4): 59-63. [6] Hodi. Analysis of Big Data Security and Privacy Protection in Cloud Computing [J]. Electronic World, 2017, 25 (16): 98-101. [7] Hu Yang. Privacy Protection of Large Data Security Based on Cloud Computing [J]. Network Security Technology and Applications, 2017, 25 (11): 86-87. [8] Zhengwei, Mao Yunlong, Chen Qingjun, et al. Privacy Protection of Anti-Dalian Data Analysis: Research Status and Progress [J]. Journal of Network and Information Security, 2016, 2 (4): 44-55. [9] Wang Yating. Exploration of Big Data Security Privacy and Protection Based on Cloud Computing [J]. Journal of Heihe University, 2018, 15 (6): 85-87. [10] Peng Zhan, Li Mi, Huijunhua, et al. Benchmark performance test method for heterogeneous network in large data center cluster [J]. Telecom Express, 2017, 69 (3): 15-19. [11] Liu Xin. Research and Implementation of Energy Consumption Optimization Method for Large Data Transmission in Heterogeneous Environment [J].Information and Computer (Theoretical Edition), 2016, 25 (11): 80-81. [12] Zhang Yao, Li Shuyu, Tang You. Research on Multi-source Heterogeneous Knowledge Fusion Algorithms under Big Data [J]. Computer Technology and Development, 2017, 27 (9): 12-16.
|