Secure Big Data Computing Based on Trusted Computing and Key Management.
Yang MeiFancheng FuPublished in: SPIoT (1) (2020)
Keyphrases
- big data
- key management
- trusted computing
- cloud computing
- key management scheme
- key distribution
- ad hoc networks
- wireless sensor networks
- resource constrained
- data management
- computing platform
- data processing
- key establishment
- security protocols
- social media
- business intelligence
- data center
- data warehousing
- computing environments
- knowledge discovery
- trusted platform module
- data analysis
- virtual organization
- computer security
- distributed computing
- end to end
- secret key
- sensor networks
- data mining
- real time