期刊文献+

大数据环境下电信运营商数据安全保护方案 被引量:7

Data security protection schema of telecom operators under the environment of big data
下载PDF
导出
摘要 随着大数据、云计算技术的应用普及,电信运营商用户数据向海量化和多样化方向发展,面临着安全管理、黑客攻击、风险评估等方面的风险。做好数据安全工作对保护电信运营商用户隐私、提升企业竞争力尤为重要。从数据采集传输安全保密、数据分级、数据脱敏、数据加密、数据发布安全防护等方面,提出了行之有效的电信运营商数据安全保护实施方案,以保障平台数据的保密性、完整性、可用性、可控性,并且可在中国电信数据安全保护工程中实施。 With the popularity of big data and cloud computing technology, data of telecom operators collected is increa- singly larger, and much more various. The data faces the risk of broken security management, hacker attacks, and imper- fection of risk assessment, etc. The current situation of data security in the environment was analyzed, and a more com- plete data security implementation plan was put forward. From the two aspects of data security technology and manage- ment, several strategies were proposed, including security classification, privacy protection, data desensitization eneryption and security protection. The proposed schema has been implemented in China Telecom data security protection project.
出处 《电信科学》 北大核心 2017年第5期119-125,共7页 Telecommunications Science
关键词 电信运营商 数据安全 隐私保护 数据加密 telecom operator, data security, privacy protection, data encryption
  • 相关文献

参考文献10

二级参考文献64

  • 1刘正伟,张华忠,文中领,王旭.海量数据持续数据保护技术研究及实现[J].计算机研究与发展,2012,49(S1):37-41. 被引量:16
  • 2林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 3杨洋.存储层:动态数据、静态数据分而制之.中国计算机报.2008.09-22. 被引量:1
  • 4Wang G J, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud computing. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2010. 被引量:1
  • 5De Capitani di Vimercati S, Foresti S, Jajodia S, et al. Encryption- based policy enforcement for cloud storage. Proceedings of IEEE the 30th International Conference on Distributed Computing Systems Workshops, Genova, Italy, 2010:42-51. 被引量:1
  • 6密钥管理:云计算系统保护数据的核心机制.http://wwwciotimes.eom/eloud/eaq/52436.html,2011. 被引量:1
  • 7王天予.同态加密用于云端数据泄露或成往事.http://wwwenet.conrcn/article/201I/0809/A20l10809895739.shtml,2011. 被引量:1
  • 8Amazon simple storage service (Amazon S3).http://aws.amazon. corn/s3/. 被引量:1
  • 9程克非,罗江华,兰文富.云计算基础教程.人民邮电出版社,2013. 被引量:2
  • 10The big data security gap: protecting the Hadoop custer challenges and opportunities with big data. http://www.zettaset. com/info-center/datasheets/zettaset_wp_security_0413.pdf. 被引量:1

共引文献138

同被引文献105

引证文献7

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部