期刊文献+

数据安全治理中的安全技术研究 被引量:18

Research on Security Technologies in Data Security Governance
下载PDF
导出
摘要 以数据为中心的数字经济连续几年快速发展,占国民GDP的比重不断提高.但在发展的同时,数据安全事件频发,数据安全问题愈加突出.在已经将数据视为生产要素的大背景下,以规范数据处理活动、提高数据安全能力、建设数据健康生态为目标的数据安全治理是引导数据产业继续稳步前进的关键.《中华人民共和国数据安全法》的推行可以为数据安全治理提供方向,但还需要相应的技术来配合数据安全治理的落地.数据安全治理的技术研究,需要从数据安全的基本概念出发,围绕用于数据安全治理的数据生命周期,研究数据生命周期各个阶段的适用技术.此外,也需要根据数据安全治理的主要理念,如隐私保护或数据权属,进行数据安全治理的技术路线研究,形成推进数据安全治理的相应思路. The data-centric digital economy has developed rapidly in recent years,and its proportion in GDP continuously increases.However,data security incidents occur frequently behind the development,and data security issues have attracted much attention.Under the background that data is regarded as a factor of production,data security governance with the goals of standardizing data processing activities,improving data security capabilities,and building a healthy data ecology is the key to make the data industry continue to develop.Though the"Data Security Law of the People’s Republic of China"provides direction for data security governance,the implementation of data security governance also requires corresponding technologies.In this paper,we introduce the basic concepts of data security,propose the data life cycle for data security governance,and study the applicable technologies at each stage of the data life cycle.After that,under the guidance of privacy protection and data ownership,we respectively introduce two technical routes of data security governance.Finally,we propose the ideas of data security governance.
作者 吴振豪 高健博 李青山 陈钟 Wu Zhenhao;Gao Jianbo;Li Qingshan;Chen Zhong(Key Laboratory of High Confidence Software Technologies(Peking University),Ministry of Education,Beijing 100871;Department of Computer Science and Technology,School of Electronics Engineering and Computer Science,Peking University,Beijing 100871)
出处 《信息安全研究》 2021年第10期907-914,共8页 Journal of Information Security Research
关键词 数据安全治理 数据生命周期 数据安全技术 隐私保护 数据权属 data security governance data life cycle data security technologies privacy protection data ownership
  • 相关文献

参考文献8

二级参考文献68

  • 1Song XD,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of the IEEE Symp.on Security and Privacy.IEEE Press,2000.44-55.[doi:10.1109/SECPRI.2000.84B445].
  • 2Boneh D,Di Crescenzo G,Ostrovsky R,Persiano G.Public key encryption with keyword search.In:Camenisch LJ,Cachin C,eds.Proc.of the Advances in Cryptology-EUROCRYPT 2004.LNCS 3027,Berlin:Springer-Verlag,2004.506-522.[doi:10.1007/978-3-540-24676-3J0].
  • 3Feng DG,Zhang M,Zhang Y,Xu Z.Study on cloud computing security.Ruan Jian Xue Bao/Joumal of Softwase,2011,22(1):71-83(in Chinese with English abstract).http://www.jos.org.cn/1000-9B25/3958.htxn[doi:10.3724/SP.J.1001.2011.03958].
  • 4Goh E.Secure indexes.Technical Report,20037216,IACR ePrint Cryptography Archive,2003.http://eprinUacr.org/2003/216.
  • 5Chang Y,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data.In:Ioannidis J,Keromytis A,Yung M,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3531,Berlin:Springer-Verlag,2004.391-421.[doi:10.1007/11496137一30].
  • 6Curtmola R,Garay J,Kamara S,Ostrovsky R.Searchable symmetric encryption:Improved definitions and efficient constructions.In:Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS 2006).New York:ACM Press,2006.79-88.
  • 7Van Liesdonk P,Sedghi S,Doumen J,Hartel P,Jonker W.Computationally efficient searchable symmetric encryption.In:Jonker W,Petkovic M,eds.Proc.of the Secure Data Management.LNCS 6358,Berlin;Springer-Verlag,2010,87-100.[doi:10.1007/978-3-642-15546-8-7].
  • 8Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption.In:Proc.of the 19th ACM Conf.on Computer and Communications Security (CCS 2012).New York:ACM Press,2012.965-976.[doi;10.1145/2382196.2382298].
  • 9Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption.In:Sadeghi AR,ed.Proc.of the Financial Cryptography and Data Security.LNCS 7859,Berlin:Springer-Verlag,2013.258-274.[doi:10.1007/978-3-642-39884-122].
  • 10Golle P,Staddon J,Waters B.Secure conjunctive keyword search over encrypted data.In:Jakobsson Mj Yung M,Zhou J,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3089,Berlin:Springer-Verlag,2004.31-45.[doi:10.1007/978-3-540-24852-1一3].

共引文献163

同被引文献146

引证文献18

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部