期刊文献+

基于分类分级的数据资产安全管控平台设计与实现 被引量:19

Data security control platform based on hierarchical classification:design and implementation
在线阅读 下载PDF
导出
摘要 针对企业大数据环境下散乱、粗放的数据安全防护问题,提出一种基于分类分级的数据全生命周期安全防护体系,设计实现了数据资产安全管控平台。首先,基于数据资产分类分级模型对数据资产进行细粒度的划分,有效界定了数据资产之间的价值差异,为企业制定精确、恰当的安全防护策略奠定了基础;其次,通过将加解密、防泄漏、跟踪取证等不同安全工具集成联动、统一配置,实现了对数据资产全生命周期的无缝保护;最后,基于分布式数据库HBase对海量审计日志进行分析处理,为管理员提供了快速告警取证和全方位的安全视图。分级加密实验中,数据量相同时,Speck算法的加密效率是AES-128的2.7倍,且随着数据量的快速增加,Speck的加密效率优势更加明显。平台的实际应用表明,分级防护策略、告警事件取证和数据资产的统一安全监控视图能够有效提高数据资产的安全防护能力。 Since the data security protection of corporation is scattered and coarse-grained under big data environment,a security protection architecture around the whole life cycle of data based on hierarchical classification was proposed,and a data security control platform was designed and implemented.Firstly,data assets were partitioned granularly based on the data hierarchical classification model,and then the difference in the value of data assets was expressed effectively,so that it is possible for corporation to make precise and appropriate security policy.Secondly,the integration of many different security tools achieves the whole life cycle security of data,such as encryption tool,leakage protection tool and forensic tool.Finally,huge amounts of audit logs were analyzed based on HBase,which is a distributed database,and then rapid forensics and full security view were provided.In the hierarchical encryption experiments,the encryption efficiency of Speck algorithm is 2.7times better than AES-128 on the same amount of data,and with the data size increases rapidly,the advantage of Speck is highlighted.From the practical applications,grading protection strategy,alarm event forensics and the united security view of data assets can effectively improve the security protection ability of data assets.
出处 《计算机应用》 CSCD 北大核心 2016年第A01期265-268,共4页 journal of Computer Applications
基金 中国科学院战略性先导科技专项(XDA06040601) 新疆维吾尔自治区科技专项(201230121)
关键词 数据资产 分类分级 加密 防泄漏 取证 data assets hierarchical classification encryption leakage prevention forensics
  • 相关文献

参考文献8

二级参考文献28

  • 1陈立伟,李春燕.一种基于多尺度语义分析的图像识别方法[J].计算机应用研究,2009,26(2):799-800. 被引量:1
  • 2樊兴华,孙茂松.一种高性能的两类中文文本分类方法[J].计算机学报,2006,29(1):124-131. 被引量:70
  • 3徐江峰,庄海燕,杨有.Oracle数据库加密技术分析[J].计算机科学,2006,33(1):134-136. 被引量:8
  • 4邓书基,宋小春,陆载涵.MS SQL Server数据库加密系统的设计与实现[J].计算机与现代化,2006(5):66-68. 被引量:3
  • 5Douglas R Stinson.Cryptography theory and practice[M].2nd Ed.CRC Press,2003.
  • 6Stallings.密码编码学与网络安全[M].北京:电子工业出版社,2005.
  • 7Emesto Damiani,De Capitanidi Vimercati S,Sushil Jajodia.Balancing confidentiality and efficiency in untrusted relational DBMSs[C].Washington DC,USA:Proceedings of the 10th ACM Conference on Computer and Communications Security,2003:93-102.
  • 8Hacigumus H,Iyer B,Mehrotra S,et al.Executing SQL over encrypted data in the database-service-provider model[C].Madison,WI,USA:Proc of the ACM SIGMOD,2002.
  • 9Hacigumus H,Mehrotra S.Performance-conscious key management in encrypted databases[C].DBSec,2004:95-109.
  • 10Agrawal R,Kjerman J,Srikant R,et al.Order preserving encryption for numeric data[C].Paris,France:Proc of ACM SIGMOD,2004.

共引文献41

同被引文献211

引证文献19

二级引证文献129

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部