期刊文献+

大数据安全审计框架及关键技术研究 被引量:7

The Study of Security Audit Framework and Key Technologies in Big Data Era
下载PDF
导出
摘要 数据资源的汇聚共享导致安全风险集中,大数据环境下的安全审计面临众多挑战.首先在大数据参考框架、云安全审计框架基础上提出大数据安全审计参考框架,从用户维度和数据生命周期2个维度开展安全审计工作,对数据提供者、数据消费者、大数据平台提供者、大数据应用提供者等角色的用户行为进行安全监测,对数据采集、传输、存储、处理、交换、销毁整个生命周期处理过程进行追踪.最后,针对大数据安全审计过程中涉及的数据追溯和隐私保护问题进行探讨,以期对大数据安全审计工作的开展提供有益参考. The aggregation and sharing of data resources contributes to the concentration of security risks,and security audit technology in big data environment is facing many challenges. Firstly,the reference framework for big data security auditing is proposed based on big data reference framework and cloud security audit framework,which conducts security auditing from user dimension and data life-cycle dimension. Secondly,the security audit technology monitors the behaviors of data provider,system orchestrator,big data application provider,big data framework provider and data consumer. And which tracks the entire data life-cycle process which consists of data collection,transmission,storge,curation,exchange and destruction. Finally,this paper discusses the data provenance and privacy protection problems during security auditing,in order to serve as useful references for the development of big data security audit technology.
作者 江茜 Jiang Xi(Department of Security Monitoring,Beijing Government Computer Emergency Response Center,Beijing 100101)
出处 《信息安全研究》 2019年第5期400-405,共6页 Journal of Information Security Research
关键词 大数据 安全审计 数据生命周期 数据追溯 隐私保护 big data security audit data life-cycle data provenance privacy protection
  • 相关文献

参考文献11

二级参考文献159

  • 1吴绍兵.云计算环境下的电子证据取证关键技术研究[J].计算机科学,2012,39(S3):139-142. 被引量:18
  • 2袁文秀,余恒鑫.关于网络信息生态的若干思考[J].情报科学,2005,23(1):144-147. 被引量:47
  • 3姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 4李亚子.数据起源标注模式与描述模型[J].现代图书情报技术,2007(7):10-13. 被引量:16
  • 5柯武刚 史漫飞.制度经济学-社会秩序与公共政策[M].北京:商务印书馆,2000,11.119,122.
  • 6维克托·迈尔-舍恩伯格,肯尼思·库克耶.大数据时代[M].杭州:浙江人民出版社,2013:5-25.
  • 7K.M. Karlsen,B.Dreyer. Literature Review:Does aCommon Theoretical Framework to Implement Food Traceabili-ty Exist-[J].Food Control,2013,32:409-417.
  • 8Gordon Jenny,Wiseman Louise.Guidelines for the Useof Personal Data in System Testing[M].British Standards Institu-tion,2003:17-23.
  • 9C.Goble. Position Statement:Musings on Provenance,Workflow and(Semantic Web)Annotations for Bioinformatics[C]. Proc of Workshop on Data Derivation and Provenance,2002:1-5.
  • 10Freeman RE.. The Politics of Stakeholder Theory:Some Future Directions[J]. Business Ethics Quarterly,1994:409-421.

共引文献1000

同被引文献65

引证文献7

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部