scholarly journals Big Data Security and International Settlement System of Electronic Economy Based on Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Ying Liu ◽  
Yan Jin ◽  
Qi Liu

In recent years, the rapid development of e-commerce and mobile communications has ushered in a new era in the era of big data and has also given birth to emerging industries such as big data. People are paying more and more attention to data, and all walks of life are trying to analyze data and make use of the potential value of data. Business organizations use big data analysis to reduce business costs, plan real-time traffic routes for thousands of express vehicles to avoid congestion, and use click stream analysis and data mining to avoid fraud. This article combines big data with e-commerce security, deeply studies the composition of e-commerce security system and key security strategies and technologies, and discusses some problems in the combined application of blockchain and electronic settlement. The birth of big data technology can solve the contradictions in today’s e-commerce security, introduce the popular and widely distributed Apache Hadoop platform, deeply study the structure of Hadoop, and focus on the data analysis and processing method products of the second generation of Hadoop YARN. It is recommended to start with data, manage, and monitor e-commerce behaviors and improve the e-commerce security system. Finally, many important aspects that need to be considered in the big data e-commerce security system will be discussed. The analysis results show that the credential management and control system based on blockchain technology proposed in this paper can resist most frauds and realize the safe storage of transaction data and cannot be tampered with. Experiments have proved that the types of vulnerabilities and defects show that improper input is the main reason; the system error rate is mainly concentrated at 0.50%, and all the data indicate that the application of big data blockchain in electronic settlement provides great value, and the security of the electronic economy has increased by at least 60%.

Author(s):  
Mei Zhang ◽  
Huan Liu ◽  
Jinghua Wen

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.


2018 ◽  
Vol 14 (1) ◽  
pp. 63-76 ◽  
Author(s):  
Mei Zhang ◽  
Huan Liu ◽  
Jinghua Wen

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.


Author(s):  
Mei Zhang ◽  
Huan Liu ◽  
Jinghua Wen

Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article analyses the certainty and security of e-commerce transactions data developed on the condition of big data. It puts forward a construction view that people should guide and monitor the behavior of e-commerce, and improve the security system of electronic commerce on the base of data.


2021 ◽  
Vol 105 ◽  
pp. 348-355
Author(s):  
Hou Xiang Liu ◽  
Sheng Han Zhou ◽  
Bang Chen ◽  
Chao Fan Wei ◽  
Wen Bing Chang ◽  
...  

The paper proposed a practice teaching mode by making analysis on Didi data set. There are more and more universities have provided the big data analysis courses with the rapid development and wide application of big data analysis technology. The theoretical knowledge of big data analysis is professional and hard to understand. That may reduce students' interest in learning and learning motivation. And the practice teaching plays an important role between theory learning and application. This paper first introduces the theoretical teaching part of the course, and the theoretical methods involved in the course. Then the practice teaching content of Didi data analysis case was briefly described. And the study selects the related evaluation index to evaluate the teaching effect through questionnaire survey and verify the effectiveness of teaching method. The results show that 78% of students think that practical teaching can greatly improve students' interest in learning, 89% of students think that practical teaching can help them learn theoretical knowledge, 89% of students have basically mastered the method of big data analysis technology introduced in the course, 90% of students think that the teaching method proposed in this paper can greatly improve students' practical ability. The teaching mode is effective, which can improve the learning effect and practical ability of students in data analysis, so as to improve the teaching effect.


2018 ◽  
Vol 10 (10) ◽  
pp. 3778 ◽  
Author(s):  
Dong-Hui Jin ◽  
Hyun-Jung Kim

Efficient decision making based on business intelligence (BI) is essential to ensure competitiveness for sustainable growth. The rapid development of information and communication technology has made collection and analysis of big data essential, resulting in a considerable increase in academic studies on big data and big data analysis (BDA). However, many of these studies are not linked to BI, as companies do not understand and utilize the concepts in an integrated way. Therefore, the purpose of this study is twofold. First, we review the literature on BI, big data, and BDA to show that they are not separate methods but an integrated decision support system. Second, we explore how businesses use big data and BDA practically in conjunction with BI through a case study of sorting and logistics processing of a typical courier enterprise. We focus on the company’s cost efficiency as regards to data collection, data analysis/simulation, and the results from actual application. Our findings may enable companies to achieve management efficiency by utilizing big data through efficient BI without investing in additional infrastructure. It could also give them indirect experience, thereby reducing trial and error in order to maintain or increase competitiveness.


2011 ◽  
Vol 204-210 ◽  
pp. 1266-1269 ◽  
Author(s):  
Zhi Feng Luo ◽  
Chao Sun ◽  
Shun Xiang Wu

With the rapid development of mobile technology, the mobile phones has gradually become an indispensable part in everybody’s life, and it is replacing the computer’s position step by step. The iPhone is a smart phone made of Apple Company, which opens a new era of software for mobile devices. At the same time, iOS(iPhone’s operating system) has become one of most competitive mobile communications operating systems. The Apple’s protection for security makes the iPhone owners hardly control their phone through the root (highest authority). It is so difficult to manage the information effetely with iPhone, such as contacts’ information or SMS. The paper introduced two approaches to get the contacts’ information in iPhone and restore them with vCard. At last, we managed the output file on MAC.


2014 ◽  
Vol 1044-1045 ◽  
pp. 1066-1070
Author(s):  
Chen Wei ◽  
Xiao Di Wang ◽  
Ran Ma ◽  
Bing Qi Wang

The advent of the age of big data brings not only the rapid development of the Internet, scientific research, social networking and other fields, but also help and challenges to the application of library. For example, the library service applications in data storage, data mining, data analysis, etc. can identify hidden values behind the data only through systematic organization and analysis of massive structured, unstructured, and semi-structured data, ​​in order to predict the future development of library and promote its better development.


Energies ◽  
2021 ◽  
Vol 14 (24) ◽  
pp. 8357
Author(s):  
Minxuan Li ◽  
Liang Cheng ◽  
Dehua Liu ◽  
Jiani Hu ◽  
Wei Zhang ◽  
...  

With the rapid development of computer science and technology, the Chinese petroleum industry has ushered in the era of big data. In this study, by collecting fracturing data from 303 horizontal wells in the Fuling Shale Gas Demonstration Area in China, a series of big data analysis studies was conducted using Pearson’s correlation coefficient, the unweighted pair group with arithmetic means method, and the graphical plate method to determine which is best. The fracturing parameters were determined through a series of big data analysis studies. The big data analysis process is divided into three main steps. The first is data preprocessing to screen out eligible, high-yielding wells. The second is a fracturing parameter correlation clustering analysis to determine the reasonableness of the parameters. The third is a big data panel method analysis of specific fracturing construction parameters to determine the optimal parameter range. The analyses revealed that the current amount of 100 mesh sand in the Fuling area is unreasonable; further, there are different preferred areas for different fracturing construction parameters. We have combined different fracturing parameter schemes by preferring areas. This analysis process is expected to provide new ideas regarding fracturing scheme design for engineers working on the frontline.


Sign in / Sign up

Export Citation Format

Share Document