Affiliation:
1. China University of Mining and Technology
Abstract
Internet of things (IOT) has become an important trend in the development of information technology. How to deal with huge amounts of internet data is becoming more and more important. In this paper, we have a further research in the technology of applied-information about mass content of network data security processing model. This model is mainly composed of massive internet of data acquisition, data storage, based on the rules of mass data processing and data security management, etc. The model can be applied to all kinds of massive internet data monitoring system based on rules, such as: the lake water quality monitoring system based on Internet of things, PM2.5 monitoring system, and so on.
Publisher
Trans Tech Publications, Ltd.
Reference8 articles.
1. ISO/IEC 15444-8: JPSEC, Security aspects, part 8, (2003).
2. ISO/IEC 14443: Identification cards-Contactless integrated circuits cards Proximity cards[S], (2001).
3. Niculescu D, Nath B: Proceedings of IEEENFOCOM [C], IEEE, Piscataway, USA, (2003).
4. R. Lercier, F. Morain. Counting the Number of Points on Elliptic Cures over Finite. Fields: LNCS, 921: 79-94, (1995).
5. Http: /Iogistic. nstl. gov. cn/commChannel/content. asp?contentid=137434, 2006-09-13.