期刊文献+

开放环境下敏感信息在线监测系统的研究与设计

Research and Design of Sensitive Information Online Monitoring System in Open Environment
下载PDF
导出
摘要 不同应用环境下敏感信息的数据安全性保护一直是信息安全领域的一个热点问题。特殊环境下,某些业务系统的配置信息、本地数据库及系统运行程序等系统核心数据依然需要存储在客户机上,而此类敏感信息极易受到用户的违法篡改和破坏,因此对其进行有效的数据安全保护十分必要。文章在对传统敏感信息保护研究基础上,通过采用数据加密算法,结合文件状态实时监测与日志审计方式,探索开放环境下的敏感信息安全保护方法,设计了一套能够在线监控用户敏感信息访问的实时监控系统,并通过实验测试了该系统的有效性。 Data security protection of sensitive information in different application environments has always been a hot issue in the field of information security.Especially in some special open environments,the core data of some business systems,such as configuration information,local database and system running program,still need to be stored on the client.Such sensitive information is also vulnerable to illegal tampering and destruction by users,so it is necessary to protect its data security effectively.Based on the research of traditional sensitive information protection,this paper explores the method of sensitive information security protection in open environment by using data encryption algorithm and combining with real-time monitoring of file status and log audit,and designs a real-time monitoring system which can monitor users'sensitive information access online.Finally,the effectiveness of the system is tested by experiments.
作者 章功干 ZHANG Gonggan
出处 《淮南师范学院学报》 2020年第2期128-131,共4页 Journal of Huainan Normal University
基金 安徽高校人文社会科学研究重点项目“面向高校应急管理的大数据分析技术应用研究”(SK2017A0507)。
关键词 敏感信息 数据安全 加密算法 访问控制 sensitive information data security encryption algorithms access control
  • 相关文献

参考文献3

二级参考文献77

  • 1国内首个运营商自主的RTB平台在浙江电信上线.http://it.21 cn.com/tel/a/2013/1206/07/25384164.shtml,2013. 被引量:1
  • 2敏感信息.http://baike.baidu.com/view/3061484.htm?fr=aladdin,2014. 被引量:1
  • 3电信和互联网用户个人信息保护规定.http://www.miit.gov.cn/n11293472/n11294912/n11296542/15514014.html,2014. 被引量:1
  • 4Aggarwal C C,Yu P S.A condensation approach to privacy preserving data mining.Proceedings of the 9th International Conference on Extending Database Technology(EDBT),Heraklion,Greece,2004:183-199. 被引量:1
  • 5Sweeney L.k-anonymity:a model for protecting privacy.International Journal on Uncertainty,Fuzziness and Knowledgebased Systems,2002,10(5):557-570. 被引量:1
  • 6Li N,Li T.T-closeness:privacy beyond k-anonymity and l-diversity.Proceedings of the 23rd International Conference on Data Engineering(ICDE),Istanbul,Turkey,2007:106-115. 被引量:1
  • 7Bessani AN, Correia MID, QuaresmaB, et al. DepSky: Dependa- ble and secure storage in a cloud-of-clouds [C] //Proceedings of the 6th Conference on Computer Systems, 2011 = 31-46. 被引量:1
  • 8Wilcox-O'Hearn Z, Warner B. Tahoe The ].east-authority filesystem [C] //4th ACM International Workshop on Storage Security and Survivability, 2008: 21-26. 被引量:1
  • 9Bowers KD, Juels A, Oprea A. HAIL: A high-availability and integrity layer for cloud storage [C] //16th ACM Confe- rence on Computer and Communications Security, 2009: 187-198. 被引量:1
  • 10Daniel Slamanig, Christian Hanser. On cloud storage and the cloud of clouds approach [C] //Tth International Conference for Internet Technology and Secured Transactions, 2012: 649-655. 被引量:1

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部