期刊文献+

一种栅格数据的敏感信息保护模型

A Privacy-Preserved Authorization Model for Raster Data
下载PDF
导出
摘要 卫星测绘技术的进步使得地理信息系统能够提供精确的地图查询服务,同时也给国土安全带来潜在威胁.本文针对已有空间数据访问控制模型中存在的根据访问结果进行敏感信息推理的问题,提出PPR-RBAC(a Privacy-Preserved RBAC for Raster data).该模型在RBAC模型的基础上,提出伪装客体的概念,采用数据伪装技术,将敏感客体扩展为真实客体和伪装客体;定义客体激活的方法,建立用户对真实客体和伪装客体的访问控制机制.最后,形式化证明PPR-RBAC模型的基本安全定理,为模型在地理信息系统中的应用奠定基础. Due to the fact that GIS(Geographic Information System) could provide high-resolution image with commercial observation satellites,this commercial availability of unprecedented and timely information and images of the earth poses significant threats to national security.Since existing access control models could not avoid the information inference according to the authorization results,a privacy-preserved RBAC for Raster Data is proposed,in PPR-RBAC,fake objects are made to protect sensitive raster objects,and authorization mechanisms are contributed for user to access sensitive raster objects by sensitive object activation.In conclusion,PPR-RBAC is formally proved to be safe and it lays the groundwork for the security deployment of PPR-RBAC in GIS.
出处 《电子学报》 EI CAS CSCD 北大核心 2012年第4期647-653,共7页 Acta Electronica Sinica
基金 国家863高技术研究发展计划重大项目(No.2007AA120404 No.2007AA120405) 国家自然科学基金项目(No.61003228)
关键词 地理信息系统 栅格数据 敏感信息保护 数据伪装 客体激活 GIS raster data sensitive information protection data counterfeiting sensitive object activation
  • 相关文献

参考文献13

  • 1M L Damiani, E Berfino. Spatial Data on the Web[ M]. Berlin, Heidelberg: Springer,2007.189 - 214.
  • 2R S Sandhu,E J Coyne,H L Feinstein,et al. Role-based access control models[ J]. IEEE Computer, 1996,29(2) : 38 - 47.
  • 3M J Covington, W Long, S Srinivasan, et al. Securing context- aware applications using environment roles [ A ]. Proc of 6th ACM Symp on Access Control Models and Technologies[ C ]. New York:ACM,2001.10 - 20.
  • 4J Joshi, E Bertino, U Latif, et al. A generalized temporal role- based access conlrol model[ J]. IEEE. Trans on Knowledge and Data Engineering, 2005,17 ( 1 ) : 4 - 23.
  • 5R Bhatli,A Ghafoor, E Bertino, et al. X-GTRBAC: an XML- based policy specification framework and architecture for enter- prise-wide access control[ J]. ACM Trans on Information and System Security, 2005,8 (2) : 187 - 227.
  • 6S M Chandmn, James B D Joshi. A location and time-based RBAC model[ A]. Proc of WISE 6th Infl Conf on Web Infor- marion Systems Engineering[ C ]. Berlin: Springer, 2005. 361 - 375.
  • 7E Berfino,B Catania,M L Damiani, et al. GEO-RBAC: a spa- tially aware RBAC[ A] .Proc of the 10th ACM Symp on Access Conlrol Models and Technologies[ C] .New YOrk:ACM,2005. 29 - 37.
  • 8M L Damiani,E Berfino, B Catania,et al. GEO-RBAC: a spa- fially aware RBAC[ J] .ACM Trans on Information and System Security, 2007,10(1) :1 - 42.
  • 9E Bertino,M L Damiani,D Momini. An access control system for a web map management service[ A ]. Proc of 14th Intl Workshop on Research Issues in Data Engineering [C ]. Los Alamitos, CA: IEEE, 2004.33 - 39.
  • 10A Belussi, E Bertino, E Catania, et al. An authorization model for geographical maps[ A ]. Proc of 12th ACM Intl Workshop on Geographic Information Systems [ C ]. New York: ACM, 2004.82 - 91.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部