期刊文献+

民用机场航班信息系统数据脱敏 被引量:1

Data Desensitization Technology for the Information System of Civil Airport Flights
下载PDF
导出
摘要 民用机场每天产生的大量数据需要通过第三方对其进行托管、分析和处理,并将得到的信息反馈给民航公司从而改善服务。然而,托管在第三方数据中心的敏感数据存在泄漏风险,在托管前需要进行数据脱敏处理。文章首先对几种通用数据脱敏技术进行介绍,然后分析民航信息系统数据库中的关键数据,并以民用机场航班信息系统敏感数据作为研究对象,定义民航数据中的敏感字段,将几种通用脱敏算法相互组合,提出一种针对民航隐私数据的组合脱敏方法:对于非统计型标识符敏感数据使用数据混淆、加密、匿名化技术来进行脱敏;对于统计型标识数据使用差分隐私来进行脱敏。实验结果表明,所提出的组合脱敏方法可以应用于民航信息系统数据脱敏。 Civil aviation airports generate a large amount of data every day and it is necessary to deposit,analyze and process the civil aviation data by third parties and feedback the information to civil aviation companies to improve their services.However,sensitive data may leak,so data desensitization is required.We first introduced several general data desensitization techniques,then analyzed the data in the civil airport flight information system (CAFIS) database,and used the sensitive data of the CAFIS as the research object,and defined the sensitive data fields in the data of CAFIS.A combined desensitization method for CAFIS privacy data is proposed.For non-statistical identifier sensitive data,we used data obfuscation,encryption and anonymity method etc.to desensitize the data.For statistical identification data we used differential privacy technic to desensitize the data.Finally,the desensitization results were analyzed and the results show that the desensitization method used in this paper could be applied to data desensitization of CAFIS.
作者 寇蒋恒 何明星 陈爱良 何明泽 KOU Jiangheng;HE Mingxing;CHEN Ailiang;HE Mingze(School of Computer and Software Engineering,Xihua University,Chengdu 610039 China;Chengdu Civil Aviation Information Technology Co.Ltd.,Chengdu 610000 China)
出处 《西华大学学报(自然科学版)》 CAS 2019年第6期49-56,共8页 Journal of Xihua University:Natural Science Edition
基金 中国民用航空局安全能力建设项目(PSDSA201802) 成都市科技局项目(2016-XT00-000150GX)
关键词 云计算 数据脱敏 差分算法 敏感数据 cloud computing data masking differential privacy sensitive data
  • 相关文献

参考文献5

二级参考文献31

  • 1杨晓春,刘向宇,王斌,于戈.支持多约束的K-匿名化方法[J].软件学报,2006,17(5):1222-1231. 被引量:60
  • 2Rivest R L, Shamir A, Adleman L M. A Method for Obtaining Digital Signatures Public-Key Cryptosystems[J].Communications of the ACM, 1978,21 : 120-126.
  • 3Diffie W, Hellman M E. New Direction in Cryptography [J].IEEE Trans on Information Theory, 1976,22:644-654.
  • 4ElGamal T. A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms [J].IEEE Transactions on Information Theory, 1985,31:469- 472.
  • 5National Institute of Standards and Technology, NIST FIPS PUB 186. Digital Signature Standard [S].U. S. Department of Commerce,1994.
  • 6Miller V S. Use of Elliptic Curves in Cryptography [C]//Advances in Crytology-CRYPTO ' 85 (LNCS 218). Berlin:Springer-Verlag, 1986 : 417-426.
  • 7Koblitz N. Elliptic Curve Cryptosystems [J], Math Comp, 1987,48 : 203-209.
  • 8Koblitz N. Hyperelliptic Cryptography[C]//CRYPTO'89. Berlin:Springer-Verlag, 1990:139-150.
  • 9周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:221
  • 10刘哲理,贾春福,李经纬.保留格式加密模型研究[J].通信学报,2011,32(6):184-190. 被引量:11

共引文献212

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部