[1]冯登国, 张敏, 李昊. 大数据安全和隐私保护[J]. 计算机学报, 2014, 37(1): 246258[2]王珊, 王会举, 覃雄派, 等. 架构大数据: 挑战, 现状与展望[J]. 计算机学报, 2011, 34(10): 17411752[3]Cloud Security Alliance. Expanded top ten big data security & privacy challenges[EBOL]. [20130407]. https:cloudsecurityalliance.org[4]NIST. NISTIR7298. Glossary of Key Information Security Terms, Revision 1[S]. San Francisco: NIST, 2011[5]Cloud Security Alliance. Big data analytics for security intelligence[EBOL]. [20130924]. https:cloudsecurityalliance.org[6]中国电子技术标准化研究院. 大数据标准白皮书(第一版)[EBOL]. [20140724]. http:www.cesi.cn[7]PCI Security Standard Council. Requirements and Security Evaluation Programs, Payment Card Industry (PCI) Data Security Standard, Version 3[S]. Wakefield: PCI Security Standard Council, 2013[8]Whitehouse Public Law 10419. Health Insurance Portability and Accountability Act (HIPAA)[SOL]. 1996 [20160410]. http:www.healthinfolaw.orgfederallawHIPAA[9]NIST. SP 15004. Big Data Interoperability Framework: Voluem 4, Big Data Security and Privacy Requirements[S]. San Francisco: NIST, 2015[10]ISOIEC. ISOIEC29100. Information Technology—Security Techniques—Privacy Framework[S]. Geneva, Switzerland: ISOIEC, 2013[11]ISOIEC. ISOIEC29101. Information Technology—Security Techniques—Privacy Architecture Framework[S]. Geneva, Switzerland: ISOIEC, 2013[12]ISOIEC. ISOIEC27018. Information Technology—Security Techniques—Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds Acting as PII Processors[S].Geneva, Switzerland: ISOIEC, 2014[13]ISOIEC. ISOIEC29134. Information Technology—Privacy Impact Assessment—Guidelines[S].Geneva, Switzerland: ISOIEC, 2016