浏览全部资源
扫码关注微信
1. 中国人民解放军理工大学,江苏 南京210095
2. 浙江警察学院,浙江 杭州310053
3. 华信咨询设计研究院有限公司,浙江 杭州310014
[ "周胜利(1982−),男,浙江警察学院工程师,中国人民解放军理工大学博士生,主要研究方向为大数据安全管理。" ]
[ "陈斌(1969−),男,华信设计咨询研究院教授级高级工程师,主要研究方向为云计算、大数据安全。" ]
[ "吴礼发(1968−),男,博士,中国人民解放军理工大学教授,主要研究方向为大数据安全。" ]
网络出版日期:2017-05,
纸质出版日期:2017-05-15
移动端阅览
周胜利, 陈斌, 吴礼发. 大数据环境下电信运营商数据安全保护方案[J]. 电信科学, 2017,33(5):119-125.
Shengli ZHOU, Bin CHEN, Lifa WU. Data security protection schema of telecom operators under the environment of big data[J]. Telecommunications science, 2017, 33(5): 119-125.
周胜利, 陈斌, 吴礼发. 大数据环境下电信运营商数据安全保护方案[J]. 电信科学, 2017,33(5):119-125. DOI: 10.11959/j.issn.1000−0801.2017136.
Shengli ZHOU, Bin CHEN, Lifa WU. Data security protection schema of telecom operators under the environment of big data[J]. Telecommunications science, 2017, 33(5): 119-125. DOI: 10.11959/j.issn.1000−0801.2017136.
随着大数据、云计算技术的应用普及,电信运营商用户数据向海量化和多样化方向发展,面临着安全管理、黑客攻击、风险评估等方面的风险。做好数据安全工作对保护电信运营商用户隐私、提升企业竞争力尤为重要。从数据采集传输安全保密、数据分级、数据脱敏、数据加密、数据发布安全防护等方面,提出了行之有效的电信运营商数据安全保护实施方案,以保障平台数据的保密性、完整性、可用性、可控性,并且可在中国电信数据安全保护工程中实施。
With the popularity of big data and cloud computing technology
data of telecom operators collected is increa-singly larger
and much more various.The data faces the risk of broken security management
hacker attacks
and imper-fection of risk assessment
etc.The current situation of data security in the environment was analyzed
and a more com-plete data security implementation plan was put forward.From the two aspects of data security technology and manage-ment
several strategies were proposed
including security classification
privacy protection
data desensitization encryption and security protection.The proposed schema has been implemented in China Telecom data security protection project.
HUANG W , CHEN Z , DONG W , et al . Mobile internet big data platform in China Unicom [J ] . Tsinghua Science and Technology , 2014 , 19 ( 1 ): 95 - 101 .
ZHAO J , WANG L , TAO J , et al . A security framework in G-Hadoop for big data computing across distributed Cloud data centres [J ] . Journal of Computer and System Sciences , 2014 , 80 ( 5 ): 994 - 1007 .
CHEN D , ZHAO H . Data security and privacy protection issues in cloud computing [C ] // 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE),March 23,2012,Hangzhou,Zhejiang,China . New Jersey : IEEE Press , 2012 : 647 - 651 .
SUBASHINI S , KAVITHA V . A survey on security issues in service delivery models of cloud computing [J ] . Journal of Net-work and Computer Applications , 2011 , 34 ( 1 ): 1 - 11 .
ZHOU L , VARADHARAJAN V , HITCHENS M . Achieving secure role-based access control on encrypted data in cloud sto-rage [J ] . IEEE Transactions on Information Forensics and Secu-rity , 2013 , 8 ( 12 ): 1947 - 1960 .
PUTHAL D , NEPAL S , RANJAN R , et al . A dynamic prime number based efficient security mechanism for big sensing data streams [J ] . Journal of Computer and System Sciences , 2017 , 83 ( 1 ): 22 - 42 .
胡坤 , 刘镝 , 刘明辉 . 大数据的安全理解及应对策略研究 [J ] . 电信科学 , 2014 , 30 ( 2 ): 112 - 117,122 .
HU K , LIU D , LIU M H , et al . Research on Security Connota-tion and Response Strategies for Big Data [J ] . Telecommunica-tions Science , 2014 , 30 ( 2 ): 112 - 117,122 .
张启云 . 云计算中数据安全问题的研究 [J ] . 计算机光盘软件与应用 , 2012 , 30 ( 2 ): 25 - 26 .
ZHANG Q Y . Research on data security in cloud computing [J ] . Computer CD Software and Applications , 2012 , 30 ( 2 ): 25 - 26 .
卢川英 . 大数据环境下的信息系统安全保障技术 [J ] . 价值工程 , 2014 , 30 ( 4 ): 188 - 190 .
LU C Y . Information systems security technology for big data environments [J ] . Value Engineering , 2014 , 30 ( 4 ): 188 - 190 .
赵祥 , 冯华 , 韩利凯 . 云计算数据安全问题 [J ] . 电子世界 , 2014 , 30 ( 2 ): 8 - 9 .
ZHAO X , FENG H , HAN L K . Data Security in Cloud compu-ting [J ] . Electronics World , 2014 , 30 ( 2 ): 8 - 9 .
刘明辉 , 张尼 , 张云勇 , 等 . 云环境下的敏感数据保护技术研究 [J ] . 电信科学 , 2014 , 30 ( 11 ): 2 - 8 .
LIU M H , ZHANG N , ZHANG Y Y , et al . Research on sensi-tive data protection technology on cloud computing [J ] . Tele-communications Science , 2014 , 30 ( 11 ): 2 - 8 .
王志中 , 周城 , 牟宇飞 . 基于分离密钥的云存储加密解决方案 [J ] . 电信科学 , 2013 ( 11 ): 51 - 56 .
WANG Z Z , ZHOU C , MOU Y F . A project designed by cloud storage encryption based on separated key [J ] . Telecommunica-tions Science , 2013 ( 11 ): 51 - 56 .
唐磊 , 马铮 . 运营商网络安全基线研究与探讨 [J ] . 邮电设计技术 , 2016 ( 1 ): 65 - 69 .
TANG L , MA Z . Research and discussion on the network safety baseline of the telecom operators [J ] . Designing Techniques of Posts and Telecommunications , 2016 ( 1 ): 65 - 69 .
张震 , 冯伟 , 颜金韬 . 一种基于云扫描技术的系统安全配置基线核查机制及方法 [J ] . 电信工程技术与标准化 , 2012 ( 4 ): 31 - 34 .
ZHANG Z , FENG W , YAN J T . New mechanism and method for system security configuration baseline verification based on cloud scanning technique [J ] . Telecom Engineering Technics and Standardization , 2012 ( 4 ): 31 - 34 .
陈玺 , 马修军 , 吕欣 . Hadoop 生态体系安全框架综述 [J ] . 信息安全研究 , 2016 , 2 ( 8 ): 684 - 698 .
CHEN X , MA X J , LV X . An overview of Hadoop security framework [J ] . Journal of Information Security Research , 2016 , 2 ( 8 ): 684 - 698 .
0
浏览量
1
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构