isolation, confidentiality, integrity, availability,
controllability and traceability of tenant data while
ensuring efficiency.
5.4 Big Data Applications in the Field
of Information Security
Big data not only brings challenges to information
security, but also injects new momentum into the
development of information security. For example,
through big data analysis of log files of intrusion
detection systems, potential security vulnerabilities
and advanced sustainability threats (APT) can be
identified. In addition, information such as virus
characteristics, vulnerability characteristics and
attack characteristics can be more easily grasped
through big data analysis. In summary, the security
issue of big data has gained much attention from
domestic and foreign researchers, however, the
current research on the representation, metrics and
semantic understanding methods of multi-source
heterogeneous big data, modeling theory and
computation.
6 CONCLUSION
In the era of big data, the collection, acquisition and
analysis of data are faster, and these massive data will
have a profound impact on human society. The
application of big data to public management process
is to explore the potential value from big data through
the method of data analysis, and according to the
different ways of data generation and structural
characteristics, it can act in different areas of public
management. It is worth noting that the structural
complexity and meaningful complexity of big data
brings the problem of complexity in social
computing. No matter how much data is used,
predictions inevitably encounter subjective value
judgments and cannot be truly accurate, making the
effect of big data analysis limited. At the same time,
the connotation, technology and methods of big data
application to public management are still immature,
and will face a variety of problems and technical
challenges in the process of its development. The
technologies of efficient data storage, effective data
acquisition, data analysis, data presentation and data
security in big data analysis are yet to be further
developed.
REFERENCES
Cheng Xueqi, Jin Xiaolong, Wang Yuanzhuo, Guo Jiafeng,
Zhang Tieyuan, Li Guojie. (2014). A review of big data
systems and analytic techniques[J]. Journal of
Software, 25 (09).
Fang Wei, Zheng Yu, Xu Jiang. Big Data: A Review of
Concepts, Technologies and Applications Research[J].
Journal of Nanjing University of Information
Engineering (Natural Science Edition), 2014, 6(05):
405-419.
Feng Dengguo, Zhang Min, Li Hao. Big data security and
privacy protection [J]. Journal of Computer Science,
2014, 37(01): 246-258.
Li Xuelong, Gong Hegang. (2015). A review of big data
systems[J]. China Science: Information Science,
45(01): 1-44.
Liang Na, Zeng Yan. (2013). Advancing data-intensive
scientific discovery to enhance science and technology
innovation: new paradigms, new methods, and new
challenges: the publication of the translation of The
Fourth Paradigm: Data-Intensive Scientific Discovery
[J]. Journal of the Chinese Academy of Sciences,
28(01): 115-121.
Ma Liang. (2017). The increasing quantification of
empirical public management research: response and
adaptation [J]. Xuehai, (05).
Rawat, Seema. (2014). Challenges and opportunities with
big data. Routledge.
Viktor Mayer-Schönberg, Zhou T. (2013). Big changes in
life, work and thinking in the era of big data[J]. Human
Resource Management, (03):174.
Wang Feiyue, Wang Xiao, Yuan Yong, Wang Tao, Lin
Yilun. (2015). Social computing and computational
society: the foundation and necessity of smart society[J].
Science Bulletin, 60(Z1): 460-469.
What Analytics, Data mining, Big Data software you used
in the past 12 months for a real project? 2012 [2013-07-
11]
Zhang Yin, Chen Min, Liao Xiaofei. (2013). Current status
and outlook of big data applications[J]. Computer
Research and Development, 50(S2): 216-233.