期刊文献+

信息生命周期视角下的大数据隐私风险管理框架研究 被引量:13

An Analysis of Big Data Privacy Risk Management Framework from Information Lifecycle Perspective
原文传递
导出
摘要 文章总结归纳了大数据环境下面临的隐私问题,分析了现有隐私保护机制的不足,从信息生命周期视角,明确大数据隐私的内涵及特征,对大数据隐私的主动式保护进行了需求分析,构建了大数据隐私风险管理框架,并对大数据隐私生命周期建模、大数据隐私风险评估和大数据隐私溯源问责等功能模块的实现策略进行了详细的阐述。最后,从风险评估的角度对图书馆用户的隐私保护进行了实例分析。 This paper summarizes the problems of big data privacy, and analyzes the deficiency of the existing privacy protection mechanism. From the perspective of information lifecycle theory, the connotation and characteristics of big data privacy are defined. Then, the risk management framework of big data privacy is designed by the demand analysis of active protection. At last, the implementation of function modules such as life cycle model, risk assessment and provenance accountability of big data privacy are discussed in detail. At last, the privacy protection analysis of li- brary users is proposed
出处 《情报资料工作》 CSSCI 北大核心 2016年第1期99-103,共5页 Information and Documentation Services
基金 国家自然科学基金项目"信息生命周期视角下的大数据隐私风险评估与溯源问责机制研究"(编号:71503133) 南京信息工程大学科研启动经费"大数据环境下数字媒体资源的信任管理机制研究"(编号:SK20140080)的研究成果之一
关键词 生命周期 大数据隐私 主动保护 风险评估 溯源问责 from perspective of risk assessment. life cycle, big data privacy, active protection, risk assessment, provenance accountability
  • 相关文献

参考文献21

  • 1Weitzner D J, Bruce E J.Big Data Privacy Workshop: Advanc- ing the State of the Art in Technology and Practice [EB/OL]. [2015-07-15 ].http://web.mit..edu/bigdata-priv/index.html.
  • 2Big Data and Pfivacy:A Technological Perspective [EB/OL]. [ 2015-07-15 ].http://www.whitehouse.gov/sites/default/micros ites/ostp/PCAST/pcast big_data_and_privacy_may_2014.pdf.
  • 3工信部电信研究院大数据白皮书[EB/OL].[2015—07—15].http://www.cctime.com/htm//2014-5-12/20145121139179652.-htm.
  • 4Hu H, Xu J, Xu X, et al.Private search on key-value stores with hierarchical indexes [C].Proc of the 30th IEEE IntConf on Date Engineering (ICDE 2014).Piscataway, NJ:IEEE,2014: 628-639.
  • 5Xuyun Zhang, Chang Liu,Surya Nepal, et al.A hybrid approach for scalable sub-tree anonymization over big data using map reduce on cloud [J ].Journal of Computer and System Scienees, 2014,80(5):1008-1020.
  • 6Daniel A, Guillerm0 N, Vicenq T.Spherical microaggregation: Anonymizing sparse vector spaces [J].Computers & Security, 2015,49(3):28-44.
  • 7Dwork C.Differential Privacy [M ].Automata, Languages and Progamming.Berlin: Springer,2006.
  • 8Dwork C.The promise of differential privacy: A tutorial on al gorithmic techniques[C].Proc of the Foundations of Computer Science(FOCS) 2011.Piscataway, NJ:IEEE, 2011:1-2.
  • 9Kato Mivule, Claude Turner.Applying moving average filtering for non-interactive differential privacy settings [J].Procedia Computer science, 2014,36(1): 409--415.
  • 10Li C, Hay M, Gereme M.Data and workload aware algorithm for range queries under differential privacy [J].Preceedings of the VLDB Endowment, 2014,7(5): 341-3522.

二级参考文献177

共引文献228

同被引文献145

引证文献13

二级引证文献89

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部