Table of Content

    15 January 2020, Volume 6 Issue 1
    The New National Strategy of Financial Information Security in the Era of Digital Economy
    2020, 6(1):  2-7. 
    Asbtract ( )   PDF (1004KB) ( )  
    Related Articles | Metrics
    To Vigorously Develop the Digital Economy, We Must Consolidate the Cornerstone of Cybersecurity
    2020, 6(1):  8-9. 
    Asbtract ( )   PDF (409KB) ( )  
    Related Articles | Metrics
    Implement the Cryptography Law to Promote the Development of Network Trusted Systems
    2020, 6(1):  10-13. 
    Asbtract ( )   PDF (679KB) ( )  
    Related Articles | Metrics
    A Survey of Research Work on Critical Information Infrastructure System Security Defense
    2020, 6(1):  14-24. 
    Asbtract ( )   PDF (2054KB) ( )  
    References | Related Articles | Metrics
    Critical information infrastructure involves a large amount of national critical basic data, important government data and citizens personal information. As a result, security protection of critical information infrastructure directly affects the development of digital economy and construction of a cyberpower. This paper first studies the policy system, safeguard measurements, laws and regulations of countries and organizations with developed information technology, and then analyzes current research work of our country in the security protection level of critical information infrastructure from the topmost national strategy level. Moreover, to circumvent potential threats and current situation, this paper proposes the topmost strategy proposal of collaborative protection of the critical information infrastructure system security, which not only has important theoretical value and practical significance, but also plays a research foundation for improving the security protection of critical information infrastructure.
    Research on Security Mechanism of Blockchain Platform
    2020, 6(1):  25-36. 
    Asbtract ( )   PDF (2276KB) ( )  
    References | Related Articles | Metrics
    Blockchain is characterized by high integrity, collective maintenance and openness and transparency. They are regarded as subversive innovations in computing mode after mainframes, personal computers and the Internet. They are expected to promote the evolution of information Internet into value Internet and orderly Internet. Blockchain has gradually extended from a single application of digital money to various fields of economic and social, including finance, notarization, social networking, health care, supply chain, Internet of things and so on. Blockchain has a positive impact on various fields, but they also face attacks from internal and external entities. Based on the block chain function view model, this paper analyzes the technical risks of block chain application in detail. In view of the above risks, the functions and limitations of the existing security mechanisms are analyzed. Combined with the technical security risks and security requirements of blockchain application, the corresponding technical improvement direction suggestions are put forward, which provides important reference for the development of blockchain technology in the future.
    Data Management Scheme Based on Blockchain
    2020, 6(1):  37-45. 
    Asbtract ( )   PDF (2519KB) ( )  
    References | Related Articles | Metrics
    Aiming at the problem of personal privacy leaking and the ownership of digital information that individuals can not control, a data management scheme based on blockchain is proposed. This paper combines access control and outofchain storage based on blockchain. Users can effectively manage digital personal information and share_authorized information. Firstly, IBC is used to generate public and private keys for users, which reduces the key management process of certificatebased public key infrastructure, and provides the possibility for supervision and audit. Then, proxy reencryption technology is used to provide security for data storage outside the chain. Extrachain storage is used to reduce the pressure of blockchain storage, improve the efficiency of block construction, and protect data security while ensuring the transparency of blockchain. Finally, the performance and advantages of the proposed scheme are analyzed.
    Research on 5G Supply Chain Security Under Global Digital Economy Strategic
    2020, 6(1):  46-51. 
    Asbtract ( )   PDF (859KB) ( )  
    References | Related Articles | Metrics
    The world is entering a new era of digital economic development. The fifth generation mobile communication technology (5G) is using the emerging technology system to promote the interconnection of all things, build the key information infrastructure for the overall digital transformation of the economy and society, and promote the development of global digital economy. This paper carefully analyses the contribution and influence of 5G to the development of digital economy, the security strategy of 5G global supply chain in various countries under the strategic game of global digital economy, and puts forward corresponding countermeasures for the development of 5G in China, which can provide reference for further promoting the development of 5G in China and supporting the development of network power and digital economy in China.
    Research on Network Security of 5G System
    2020, 6(1):  52-61. 
    Asbtract ( )   PDF (1365KB) ( )  
    References | Related Articles | Metrics
    Abstract5G system is a higher stage of the development of mobile communication systems, the foundation of Internet of things, and an important infrastructure for realizing social services and the smart of people's lives. Under the guidance of the Ministry of Industry and Information Technology, China has made brilliant achievements in the development of communications technology. The rapid development of mobile communication technology in 5G will become the cornerstone of the rapid development of various industries. The higher the degree of dependence on network communication technology, the more important the security protection techniques and security assurance mechanisms will be. Therefore, the security of 5G systems is the key to 5G system design, network deployment, and normal operation. Based on the research of the first stage Rel15 version documents of the 5G security standard of the 3GPP standard organization, it introduces the progress of 5G security standardization research, analyzes the security threats and security requirements of 5G systems, proposes the security objectives of 5G systems, and sorts out 5G The security design principles of the system. It summarizes the enhanced security features of 5G mobile communication systems by comparing the differences between the security functions of 5G systems and 4G systems.
    Research on Security and Application of IoT Based on Security Element
    2020, 6(1):  62-66. 
    Asbtract ( )   PDF (819KB) ( )  
    References | Related Articles | Metrics
    With the advent of digital economy era, the application of IoT (Internet of things) is developing rapidly, and is penetrating into all aspects of people's production and life. While IoT brings us convenience, its equipment, network and application are also facing severe security challenges. This paper firstly analyzes the security threats faced by all levels of IoT in digital economy era, and uses SE and its characteristics to propose a security protection mechanism based on SE(Security Element) , which can build a one-stop cloud-to-end overall security solution from the system architecture level to solve the shortcomings and loopholes of the current IoT business. Applying this security mechanism to the field of e-government can solve the security problems of the mobile end, and achieve the goal of high security, high convenience, low cost, reproducibility and popularity of the mobile end.
    Research on Mobile Phone Recycling Model from the Perspective of Information Security
    2020, 6(1):  67-78. 
    Asbtract ( )   PDF (2610KB) ( )  
    References | Related Articles | Metrics
    The quantity of waste mobile phones in China is growing rapidly, but a large proportion is recycled informally. This has threatened the personal information security and environmental quality, and also caused insufficient supply for those certified enterprises. In combination with the current situations and foreign experiences, this paper proposes a scheme for the recycling of waste mobile phones in China, based on fuzzy hierarchical analysis both quantitatively and qualitatively. Results suggest that recycling modes that compose thirdparty recyclers and retailers as front ends, and thirdparty recyclers as second level mid ends displayed optimal performances in information security, economic and environmental benefits, based on which regarding suggestions are provided to support the construction of recycling mode design for waste mobile phones in China.
    The Experience and Enlightenment of Personal Information Protection Regulation
    2020, 6(1):  79-84. 
    Asbtract ( )   PDF (857KB) ( )  
    References | Related Articles | Metrics
    In the era of big data, the strengthening of personal information protection has become a world trend, administrative regulation plays a more and more important role. In fact, by setting up an independent supervisory authority, clearing the basic regulatory goal and responsibility, formulating detailed rules of regulations and procedures to coordinate a series of measures, the E.U. and its major member states, the U.S., Japan, South Korea and Hong Kong, Macao and Taiwan have established complete personal information protection regulation systems. Facing the legal challenges from ICT and the complicated demands in balance of different interests, China should learn beneficial experiences from comparative law, actively explore the establishment and improvement of an administrative supervision system for personal information protection from the four aspects of regulatory subject, objectives, measures and procedures, to form a comprehensive system of personal information protection.
    IntelligenceDriven Network Security Vulnerability Management in the Big Data Environment
    2020, 6(1):  85-90. 
    Asbtract ( )   PDF (1169KB) ( )  
    References | Related Articles | Metrics
    The purpose of this paper is to study the application of intelligence in network security vulnerability management under big data environment. The methods and related information resources of network security vulnerability management are analyzed, and the disadvantages of ignoring vulnerability management, vulnerability information and big data are pointed out. The intelligencedriven closedloop management mechanism of network security vulnerabilities is proposed, and the intelligencedriven network security vulnerability management framework in big data environment is constructed. The application practice of campus network shows that the framework is effective and gives full play to the role and value of intelligence.
    DDoS Attack Detection Based on Knowledge Graph
    2020, 6(1):  91-96. 
    Asbtract ( )   PDF (985KB) ( )  
    References | Related Articles | Metrics
    Distributed denial of service (DDoS) is one of the most common network attacks by hackers. In this paper, a DDoS attack detection method based on knowledge graph is proposed, which is mainly aimed at the DDoS attack of TCP traffic. Knowledge graph is used to express the communication process of TCP traffic between two hosts, DDoS attack detection is carried out to determine whether the source host is the initiator of DDoS attack base on that. Experiments with UCLA CSD Packet Traces have shown that the proposed approach can effectively detect the source of DDoS attacks.