信息安全研究 ›› 2023, Vol. 9 ›› Issue (7): 655-.

• 数据合规高效流通使用专题 • 上一篇    下一篇

政务数据端到端溯源技术研究与应用实践

范絮妍;谈松;余振京;张钰;李经纬;   

  1. (全国海关信息中心北京100005)
  • 出版日期:2023-07-01 发布日期:2023-07-01
  • 通讯作者: 范絮姸 硕士,高级工程师.主要研究方向为网络与信息安全、数据追踪溯源、网络威胁感知. 31958712@qq.com
  • 作者简介:范絮姸 硕士,高级工程师.主要研究方向为网络与信息安全、数据追踪溯源、网络威胁感知. 31958712@qq.com 谈松 高级工程师.主要研究方向为网络与信息安全、关键信息基础设施安全、系统管理、大数据云平台. songtan@customs.gov.cn 余振京 高级工程师.主要研究方向为网络与信息安全、系统管理、大数据治理及应用. marvin_yzj@163.com 张钰 主要研究方向为大数据安全、网络安全等级保护. 294694112@qq.com 李经纬 主要研究方向为大数据安全、网络威胁监测. 864952874@qq.com

Research and Application of EndtoEnd Traceability Technology for Government Data

  • Online:2023-07-01 Published:2023-07-01

摘要: 随着国家数字化政府战略布局的持续推进,为充分发挥大数据聚合分析效益,数字政府各节点集中处理大量重要数据,且节点间数据互通、信息共享,数据安全风险日趋暴露,给数据泄露事件追踪溯源带来巨大挑战.首先,对政务数据泄露风险进行分析.然后,基于国内外著名溯源模型7W,ProVOC等,提出数据端到端追踪溯源模型和技术方法,对标注法和反向查询法2种方法进行综合运用,并对数据库水印、动态脱敏等技术进行场景化的技术改良,形成贯穿政务数据流动各环节的追踪溯源技术及落地实践方法,包括数据打标、数据染色、数据操作日志关联分析等.最后,以某政府核心节点网络环境为例,进行应用实践研究,达到成功追溯数据泄露出口和数据访问传输全链条证据链的效果,较好地提升了数据安全事件溯源效率和精准度.

关键词: 数字政府, 追踪溯源, 重要数据, 个人敏感信息, 数据打标, 数据染色

Abstract: Along with the national digital government strategic layout’s continuous advancement, in order to give full play to the benefits of big data aggregation and analysis, the nodes of digital government deal with a large amount of important data, and the data communication and information sharing among the nodes, and the data security risk is exposed day by day, which brings a great challenge to trace the source of data leakage events. This paper first analyzes the risk scenario of digital government data leakage. Then, based on the domestic and foreign wellknown traceability models 7W, ProVOC and so on, the endtoend traceability model and technical method are proposed. The model is a comprehensive application of the annotation method and the reverse query method. The method is a scenariobased improvement of database watermarking, dynamic desensitization and other technologies, and makes use of big data and association analysis technology, the traceability technology and the landing practice strategy are formed through each link of the service data flow, including data marking, staining, data operation log association analysis. Finally, taking a government core node network environment as an example, the paper carries on the application practice research, and achieves the effect of successfully tracing the evidence chain of data leakage exit and data access transmission chain, it improves the traceability efficiency and accuracy of data security events.

Key words: digital government, tracing the source, important data, personal sensitive information, data watermarking, data staining