首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种大数据平台敏感数据安全共享的框架
引用本文:董新华,李瑞轩,何亨,周湾湾,薛正元,王聪.一种大数据平台敏感数据安全共享的框架[J].科技导报(北京),2014,32(34):47-52.
作者姓名:董新华  李瑞轩  何亨  周湾湾  薛正元  王聪
作者单位:华中科技大学计算机科学与技术学院, 武汉 430074
基金项目:国家自然科学基金项目(61300222,61173170,60873225);华中科技大学自主创新基金项目(2012TS052,2012TS053,2013QN120,CXY13Q019)
摘    要: 大数据平台存储了海量的用户敏感数据,这些敏感数据的共享有助于企业降低为用户提供个性化服务的成本,实现数据增值,而数据的安全共享是一个亟待解决的问题.通过分析敏感数据安全现状,提出了一个大数据平台敏感数据安全共享系统框架,包括数据平台上敏感数据的安全提交、存储、使用和销毁;研究了基于密文异构转化的代理重加密算法和基于虚拟机监控器的用户进程保护方法等关键技术,为系统功能的实现提供了支撑.该框架能够保护用户敏感数据的安全性,有效实现这些数据的安全共享,同时使数据拥有者完全掌握自身数据的控制权,从而有利于营造现代互联网信息安全的良好环境.

关 键 词:安全共享  敏感数据  代理重加密  进程空间保护  大数据  
收稿时间:2014-09-25

A Framework for Secure Sharing of Sensitive Data on Big Data Platform
DONG Xinhua,LI Ruixuan,HE Heng,ZHOU Wanwan,XUE Zhengyuan,WANG Cong.A Framework for Secure Sharing of Sensitive Data on Big Data Platform[J].Science & Technology Review,2014,32(34):47-52.
Authors:DONG Xinhua  LI Ruixuan  HE Heng  ZHOU Wanwan  XUE Zhengyuan  WANG Cong
Institution:School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
Abstract:Vast amounts of users sensitive data are stored on the big data platform. The sharing of sensitive data will help enterprises to reduce the cost of providing users with personalized service, and achieve value-added services of data. However, the secure sharing of data is an urgent problem. By analyzing the present security situation of sensitive data, this paper proposes a framework for secure sharing of those data on big data platform, including security submission, storage, use and destruction of sensitive data on the semi-trusted big data sharing platform. Relevant key technologies were studied, such as the proxy re-encryption algorithm based on heterogeneous cipher-text transformation and user process protection methods based on the virtual machine monitor, which provides support for the realization of system functions. The framework well protects the security of users sensitive data, and shares these data effectively and safely. At the same time, the data owners have complete control of their own data, which is conducive to foster a sound environment for modern Internet information security.
Keywords:secure sharing  sensitive data  proxy re-encryption  process space protection  big data  
本文献已被 CNKI 等数据库收录!
点击此处可从《科技导报(北京)》浏览原始摘要信息
点击此处可从《科技导报(北京)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号