计算机科学 ›› 2022, Vol. 49 ›› Issue (4): 67-73.doi: 10.11896/jsjkx.211000010

• 基于社会计算的多学科交叉融合专题* 上一篇    下一篇

政务大数据安全防护能力建设:基于技术和管理视角的探讨

孙轩1,2,3, 王焕骁1   

  1. 1 南开大学周恩来政府管理学院 天津 300350;
    2 南开大学计算社会科学实验室 天津 300350;
    3 南开大学数字城市治理实验室 天津 300350
  • 收稿日期:2021-10-08 修回日期:2022-01-14 发布日期:2022-04-01
  • 通讯作者: 孙轩(sunxuan@nankai.edu.cn)
  • 基金资助:
    天津市社会科学基金规划项目(TJGL19-005); 中央高校基本科研业务费专项资金(63192205)

Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives

SUN Xuan1,2,3, WANG Huan-xiao1   

  1. 1 Zhou Enlai School of Government, Nankai University, Tianjin 300350, China;
    2 Computational Social Science Laboratory, Nankai University, Tianjin 300350, China;
    3 Digital Urban Governance Laboratory, Nankai University, Tianjin 300350, China
  • Received:2021-10-08 Revised:2022-01-14 Published:2022-04-01
  • About author:SUN Xuan,born in 1985,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include digital governance,urban computing and smart city.
  • Supported by:
    This work was supported by the General Program of Social Science of Tianjin(TJGL19-005) and Fundamental Research Funds for the Central Universities(63192205).

摘要: 政务大数据是新时期数字政府建设的核心资产,对推动政府功能服务升级和经济、社会创新发展具有重要意义。但在复杂的网络流通环境下,为了保障政务大数据的合理、有序和可靠利用,其数据安全防护能力建设不容忽视。在技术层面,政务大数据安全防护涉及网络安全(Network Security)、平台安全(Platform Security)和应用安全(Application Security)等核心要素;在管理层面,政务大数据安全防护则需要重点关注人员素养(Personnel Quality)和制度质量(Institutional Quality)这两方面的内容。在理论探讨的基础上,给出了具体的技术和管理能力指标,并进一步对省级机关单位A的建设实践进行了分析。

关键词: 管理制度, 技术应用, 能力建设, 数据安全防护, 政务大数据

Abstract: Government big data is the core asset for digital government construction in the new era, and it is of great significance to the upgrade of government functions and services and the development of economic and social innovation.However, in a complex network circulation environment, in order to ensure the rational, orderly, and reliable use of government big data, capability building for data security protection cannot be ignored.On the technical aspect, government big data security protection involves several core elements, including the network security, platform security, and application security, and on the management aspect, government big data security protection needs to be focused on personnel quality and institutional quality.On the basis of the oretical discussions, specific technical and management capability indicators are given, and the construction practice of provincial-level agency unit A is analyzed.

Key words: Capability building, Data safety protection, Government big data, Management system, Technology application

中图分类号: 

  • TP391
[1] SUN X,SUN T.Dynamic Urban Governance in a Big Data Computing Environment:Conceptual Connotation and Application Framework[J].E-government,2020(1):20-28.
[2] MARRISON C.Gartner warns of big data security problems[J].Network Security,2014(6):1-20.
[3] MEHMOOD A,NATGUNANATHAN I,XIANG Y,et al.Pro-tection of big data privacy[J].IEEE Access,2016,4:1821-1834.
[4] CARDENAS A,MANADHATA P,RAJAN S.Big Data Analytics for Security[J].IEEE Security & Privacy,2013,11(6):74-76.
[5] ERDMANN J.As Personal Genomes Join Big Data Will Privacy and Access Shrink?[J].Chemistry & Biology,2013,20(1):1-2.
[6] WANG D,ZHAO W B,DING Z M.An Overview of Key Tech-nology Analysis of Big Data Security Assurance[J].Journal of Beijing University of Technology,2017,43(3):335-349,322.
[7] CHEN X S,YANG L,LUO Y G.Big data security protection technology[J].Advanced Engineering Sciences,2017,49(5):1-12.
[8] WEI K M,WENG J,REN K.Big data security protection technology[J].Chinese Journal of Network and Information Security,2016,2(4):1-11.
[9] TIAN H L,ZHANG Y,XU X H,et al.Trusted solid state-drive:a new foundation for big data security[J].Chinese Journal of Computers,2016,39(1):154-168.
[10] Information technology—Security techniques—Information se-curity management systems—Requirements:ISO/IEC 27001:2013[S].Switzerland:Schweizerische Normen-Vereinigung(SNV),2013.
[11] TANKARD C.Big data security[J].Network Security,2012(7):5-8.
[12] KSHETRI N.Big data’s impact on privacy,security and consumer welfare[J].Telecommunications Policy,2014,38(11):1134-1145.
[13] FENG D G,ZHANG M,LI H.Big data security and privacy protection[J].Chinese Journal of Computers,2014,37(1):246-258.
[14] TIAN W.The Connotation,Current Situation and Basis of Public Big Data Information Security Legislation[J].Henan Social Sciences,2018,26(7):86-91.
[15] HAN W.The balance of security and freedom-analysis of the purpose of data security legislation[J].Science Technology and Law,2019(6):41-48,67.
[16] HU K,LIU D,LIU M H.Research on the Security Understan-ding and Countermeasures of Big Data[J].Telecommunication Science,2014,30(2):112-117,122.
[17] HUANG G B,ZHENG L.Research on Big Data Information Security Risk Framework and Countermeasures[J].Researches in Library Science,2015(13):24-29.
[18] XU Y.Challenges and countermeasures facing China in the era of big data[J].Forum on Science and Technology in China,2015 (3):24-29.
[19] LIU Y,DENG Q,PENG Y S.Security Challenges Facing Data Sovereignty and Privacy Protection in the Big Data Era[J].Modernization of Management,2019,39(1):104-107.
[20] MENG X F,CHI X.Big data management:concepts,technolo-gies and challenges[J].Journal of Computer Research and Development,2013,50(1):146-169.
[21] CHEN H,WANG X X,DUAN Y Q.Analysis and Research on the Value Orientation of Chinese Government’s Big Data Policy[J].Library and Information Service,2020,64(11):19-27.
[22] ZHANG X J,WANG W Q,TANG C L.Research on the Policies and Regulations of China-US Government Data Opening and Personal Privacy Protection[J].Information Studies:Theory & Application,2016,39(1):38-43.
[23] CAI Q X,HUANG R H.Policy and Regulation Guarantee of U.S.Government Data Opening and Its Enlightenment to my country[J].Library and Information,2017(1):10-17.
[24] YU H.Opportunities,Challenges and Countermeasures of Go-vernment Data Management in the Big Data Era[J].Chinese Public Administration,2015(3):127-130.
[25] DU H H.Research on the Construction of Evaluation Systemfor Privacy Protection of my country’s Government Data Open Platform[J].Journal of Information,2020(3):172-179. [26] WANG C H.Analysis of the Six Legal Systems of “Network Security Law”[J].Journal of Nanjing University of Posts and Telecommunications (Natural Science),2017,37(1):1-13.
[27] The network security grade protection system 2.0 standard is officially released[EB/OL].(2019-05-16) [2021-09-13].http://it.people.com.cn/n1/2019/0516/c1009-31087714.html.
[28] KOU G,WANG S,Tang G.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction[J].Chinese Journal of Electronics,2019,28(1):166-175.
[29] SINGH S,SHARMA P K,MOON S Y,et al.A comprehensive study on APT attacks and countermeasures for future networks and communications:challenges and solutions[J].Journal of Supercomputing,2016,75:4543-4574.
[30] BREAUX T,BAUMER D.Legally “reasonable” security re-quirements:A 10-year FTC retrospective-Science Direct[J].Computers & Security,2011,30(4):178-193.
[31] LIN C,SU W B,MENG K,et al.Cloud computing security:architecture,mechanism and model evaluation[J].Chinese Journal of Computers,2013,36(9):1765-1784.
[32] JAIN R,PAUL S.Network virtualization and software defined networking for cloud computing:a survey.
[J].IEEE Communications Magazine,2013,51(11):24-31.
[33] FAWCETT L,SCOTT-HAYWARD S,BROADBENT M,et al.Tennison:A Distributed SDN Framework for Scalable Network Security[J].IEEE Journal on Selected Areas in Communications,2018,36(12):2805-2818.
[34] LI B H,LI B,REN W,et al.Research on Resource Security Management Mechanism Oriented to Trusted Cloud Computing[J].Journal of Cyber Security,2018,3(2):76-86. [35] ZHANG K,MA L,XU Y F.Research on Security Assurance System of Complex Information System[J].Chinese Journal of Management Science,2000(S1):336-346.
[36] LI J H.Overview of Threat Intelligence Awareness,Sharing and Analysis Technology in Cyberspace[J].Chinese Journal of Network and Information Security,2016,2(2):16-29.
[37] DING H F,MENG Q Q,WANG X,et al.Analysis of data security and privacy protection countermeasures of government data opening oriented to data life cycle[J].Journal of Information,2019,38(7):151-159.
[38] CHEN C B,CHENG S.Regulatory Responsibility in Government Data Opening:Practical Dilemma and Optimal Path[J].Journal of Information,2019,38(10):188-194.
[1] 肖军.
人脸识别技术在公安领域内的应用研究
Research on Application of Face Recognition in Area of Public Security
计算机科学, 2016, 43(Z11): 127-132. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.027
[2] .
MPLS网络环境下组播应用研究

计算机科学, 2006, 33(1): 25-27.
[3] 汪洋 余少华.
超立方体网络中路由生成算法的子立方分裂方法

计算机科学, 2005, 32(4): 16-18.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!