
Exploration of innovative cryptographic application solutions under multimodal big data fusion
- 1 China Telecom Corporation Limited Guangxi Branch
- 2 China Telecom Corporation Limited Guangxi Branch
- 3 Open Security Research
- 4 Open Security Research
* Author to whom correspondence should be addressed.
Abstract
With the rapid development of information technology, data has become the cornerstone of digitalization, networking, and intelligence, profoundly impacting various sectors including production, distribution, circulation, consumption, and social service management. As the core resource of the digital economy and information society, the economic and social value of big data is increasingly prominent, yet it has also become a prime target for cyberattacks. In the face of a complex and ever-changing data environment and advanced cyber threats, traditional big data security technologies such as Hadoop and other mainstream technologies are proving inadequate in ensuring data security and compliance. Consequently, cryptography-based technologies such as fully encrypted execution environments and efficient data encryption and decryption have emerged as new directions for security protection in the field of big data. This paper delves into the latest advancements and challenges in this area by exploring the current state of big data security, the principles of endogenous security technologies, practical applications, and future prospects.
Keywords
big data, endogenous security technologies, cryptography, fully encrypted execution environment, efficient data encryption and decryption
[1]. Wang, Y. (2023). Prospects for high-efficiency search privacy protection mechanisms in big data security. Software, 44(10), 140-142.
[2]. Wang, Y., & Wang, S. (2024). Design of network information security protection under the background of big data. Information and Computer (Theoretical Edition), 36(07), 212-214.
[3]. Wang, Y. (2024). An analysis of network security in the big data environment. Communication Management and Technology, (02), 50-52.
[4]. Wu, M. (2024). An exploration of data security issues under the background of big data. In Proceedings of the 38th China (Tianjin) 2024 IT, Network, Information Technology, Electronics, and Instrumentation Innovation Academic Conference (p. 3). Tianjin TEDA Information Systems Engineering Supervision Co., Ltd. https://doi.org/10.26914/c.cnkihy.2024.014484
[5]. Li, D., Zhu, Y., & Hai, J. (2023). Research on the application of cloud cryptographic services in information security. Shanghai Informatization, (08), 38-41.
[6]. Zhang, J., Guo, Z., Wang, G., et al. (2023). Research on the construction of cryptographic service platforms based on national cryptographic algorithms. China New Communications, 25(05), 107-109.
[7]. Cui, Y., Liu, L., Meng, W., et al. (2020). Implementation of high-speed cryptographic cards based on the SM2 signature algorithm. Software Guide, 19(07), 183-186.
[8]. Xu, S., Guo, C., & Li, X. (2020). Improved key management scheme based on multi-party co-management and IBC. Computer Applications and Software, 37(08), 314-317.
Cite this article
Lin,Y.;Zhang,J.;Wei,S.;Fan,H. (2024). Exploration of innovative cryptographic application solutions under multimodal big data fusion. Advances in Engineering Innovation,10,30-35.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Journal:Advances in Engineering Innovation
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).