信息安全研究 ›› 2019, Vol. 5 ›› Issue (5): 406-413.

• 大数据安全专题 • 上一篇    下一篇

大数据时代网络安全技术的演进

刘国伟1,张艺2,朱岩3   

  1. 1. 北京市经济和信息化局
    2. 北京科技大学计算机与通信工程学院
    3. 北京科技大学
  • 收稿日期:2019-05-06 出版日期:2019-05-15 发布日期:2019-05-06
  • 通讯作者: 刘国伟
  • 作者简介:刘国伟 硕士,主要研究方向为网络安全. liugw@bjeit.gov.cn 张艺 硕士研究生,主要研究方向为信息安全、密码学. wangjing@xs.ustb.edu.cn 朱岩 教授,中国密码学会安全协议专委会委员,中国电子学会区块链专委会副主任,北京市通信保障和信息安全应急专家,已发表学术论文100余篇,已申请和授权国内和国际专利20余项.主要研究方向为密码学、大数据安全、区块链技术. zhuyan@ustb.edu.cn

Evolution Research of Network Security Technology in Big Data Era

  • Received:2019-05-06 Online:2019-05-15 Published:2019-05-06

摘要: 摘要随着大数据时代的到来,信息系统表现出了一些新的特征,包括系统边界模糊化、虚拟化、数据类型非结构和泛化、功能和数据耦合程度低等,这些特征不仅导致大数据技术(data technology, DT)与信息技术(information technology, IT)有较大不同,也推进了网络安全技术的升级换代和演进.针对这些变化,对信息时代和大数据时代的特点进行了对比,提出了以私密性、完整性、追溯性、可控性为4原则的大数据安全基本属性,以及基于 “传播预测、审计溯源、动态管控”的主动、动态防御策略.在此基础上,对DT所面临的安全挑战和安全保障策略进行了讨论,将大数据安全技术按“淘汰、延续、改进、新创”分为4级,并按照访问控制、标识与鉴别、数据加密、数据隐私、入侵防范、安全审计与灾备6类分别进行了分析、梳理和探讨,这些结果将对DT时代安全技术发展、大数据平台构建和安全保障策略制定与技术选择提供支持.

关键词: 大数据时代, 安全保障策略, 安全基本属性, 安全技术分级, 安全分类

Abstract: With the advent of the era of big data, information systems have exhibited some new features, including boundary obfuscation, system virtualization, unstructure and diversification, and the low coupling degree of function and data. These features not only lead to a big difference between big data technology (DT) and information technology (IT), but also promote the upgrading and evolution of network security technology. In response to these changes, in this paper we compare the characteristics between IT era and DT era, and then propose four DT security principles: privacy, integrity, traceability, and controllability, as well as active and dynamic defense strategy based on “propagation prediction, tracking audit, dynamic management and control”. We further discusses the security challenges faced by DT and the corresponding assurance strategies. On this basis, the big data security technologies can be divided into four levels: “elimination, continuation, improvement, and innovation”, and we provide analyzation, combination and explaination for these technologies according to six categories: access control, identification and authentication, data encryption, data privacy, intrusion prevention, security audit and disaster recovery. These results will offer important assistance for the evolution of security technologies in the DT era, the construction of big data platform, the designation of security assurance strategies, and technology suitable for big data.

Key words: big data era, security assurance strategy, security attribute, security technology grading, security category