Secure Big Data Computing Based on Trusted Computing and Key Management.
Mei YangFancheng FuPublished in: ATCI (2020)
Keyphrases
- big data
- key management
- trusted computing
- cloud computing
- key management scheme
- wireless sensor networks
- ad hoc networks
- key distribution
- resource constrained
- data management
- computing platform
- social media
- security protocols
- data analysis
- data processing
- trusted platform module
- secret key
- distributed computing
- computing environments
- data center
- data warehousing
- key establishment
- virtual organization
- computer security
- business intelligence
- knowledge discovery
- databases