信息安全研究 ›› 2018, Vol. 4 ›› Issue (2): 104-114.

• 学术论文 • 上一篇    下一篇

客户隐私数据流转安全管理系统

艾解清1,魏理豪1,梁承东2,陈亮2   

  1. 1. 广东电网有限责任公司
    2. 广州竞远安全技术股份有限公司
  • 收稿日期:2018-02-25 出版日期:2018-02-15 发布日期:2018-02-25
  • 通讯作者: 艾解清
  • 作者简介:艾解清 博士研究生,主要研究方向为信息化评测技术. dotrai@126.com 魏理豪 硕士研究生,主要研究方向为信息化评测技术. wlh_wind@126.com 梁承东 硕士研究生,主要研究方向为信息化评测技术. liangcd@chinagdn.com 陈亮 硕士研究生,主要研究方向为安全检测技术、数据安全技术. eddie.chen@hotmail.com

Customer Privacy Data Lifecycle Security Management System

  • Received:2018-02-25 Online:2018-02-15 Published:2018-02-25

摘要: 企业通过应用系统对公众提供业务的同时也收集到了个人隐私数据.这些个人隐私数据在与企业生产数据关联后,成为具有更高附加值的客户隐私数据.客户隐私数据面临诸多的安全威胁,在产生、传输、处理、存储、使用、销毁过程中涉及多个应用系统和多个网络边界,同时由于应用系统的不断扩建,与外部系统数据交换的接口不断增加,造成客户隐私数据分布在网络中的各个节点,无法进行统一管理和集中化安全保障.从客户隐私数据在网络流转过程的角度去分析和设计,建立1个客户隐私数据流转安全管理系统用于保护客户的隐私数据.该系统使用了深度包检测技术、文档加解密技术、数据脱密技术和异常行为检测技术,为结构化数据和非结构化数据在全生命周期过程中提供了安全技术保障.

关键词: 客户隐私, 隐私数据, 深度包检测, 文档加密, 异常行为

Abstract: Enterprises provide services to the public through web application systems, and they collect personal privacy data at the same time. Associated with enterprises’ production data, such personal privacy data has become higher value-added customer privacy data. Multiple applications and network boundaries are involved during the process of data creation, data transmission, data storage, data usage and data destruction. Customers privacy data is faced with a lot of security threats. In the meantime, due to continuous expansions of application systems and external system data exchange interface, customer privacy data is distributed in various nodes of the network, which makes the data hard to manage under unified management and centralized security. This paper analyzes the life cycle of customer privacy data, clarifies the distribution and security status of customer privacy data in the network, and establishes a customer privacy data lifecycle security management system for security protection. The system employs DPI technology, document encryption and decryption technology, data desensitization technology and abnormal behavior detection technology, and it provides security technical support for both structured data and unstructured data in the whole life cycle process.

Key words: customer privacy, privacy data, DPI, document encryption, abnormal behavior