Computer Science ›› 2022, Vol. 49 ›› Issue (4): 67-73.doi: 10.11896/jsjkx.211000010

• Special Issue of Social Computing Based Interdisciplinary Integration • Previous Articles     Next Articles

Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives

SUN Xuan1,2,3, WANG Huan-xiao1   

  1. 1 Zhou Enlai School of Government, Nankai University, Tianjin 300350, China;
    2 Computational Social Science Laboratory, Nankai University, Tianjin 300350, China;
    3 Digital Urban Governance Laboratory, Nankai University, Tianjin 300350, China
  • Received:2021-10-08 Revised:2022-01-14 Published:2022-04-01
  • About author:SUN Xuan,born in 1985,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include digital governance,urban computing and smart city.
  • Supported by:
    This work was supported by the General Program of Social Science of Tianjin(TJGL19-005) and Fundamental Research Funds for the Central Universities(63192205).

Abstract: Government big data is the core asset for digital government construction in the new era, and it is of great significance to the upgrade of government functions and services and the development of economic and social innovation.However, in a complex network circulation environment, in order to ensure the rational, orderly, and reliable use of government big data, capability building for data security protection cannot be ignored.On the technical aspect, government big data security protection involves several core elements, including the network security, platform security, and application security, and on the management aspect, government big data security protection needs to be focused on personnel quality and institutional quality.On the basis of the oretical discussions, specific technical and management capability indicators are given, and the construction practice of provincial-level agency unit A is analyzed.

Key words: Capability building, Data safety protection, Government big data, Management system, Technology application

CLC Number: 

  • TP391
[1] SUN X,SUN T.Dynamic Urban Governance in a Big Data Computing Environment:Conceptual Connotation and Application Framework[J].E-government,2020(1):20-28.
[2] MARRISON C.Gartner warns of big data security problems[J].Network Security,2014(6):1-20.
[3] MEHMOOD A,NATGUNANATHAN I,XIANG Y,et al.Pro-tection of big data privacy[J].IEEE Access,2016,4:1821-1834.
[4] CARDENAS A,MANADHATA P,RAJAN S.Big Data Analytics for Security[J].IEEE Security & Privacy,2013,11(6):74-76.
[5] ERDMANN J.As Personal Genomes Join Big Data Will Privacy and Access Shrink?[J].Chemistry & Biology,2013,20(1):1-2.
[6] WANG D,ZHAO W B,DING Z M.An Overview of Key Tech-nology Analysis of Big Data Security Assurance[J].Journal of Beijing University of Technology,2017,43(3):335-349,322.
[7] CHEN X S,YANG L,LUO Y G.Big data security protection technology[J].Advanced Engineering Sciences,2017,49(5):1-12.
[8] WEI K M,WENG J,REN K.Big data security protection technology[J].Chinese Journal of Network and Information Security,2016,2(4):1-11.
[9] TIAN H L,ZHANG Y,XU X H,et al.Trusted solid state-drive:a new foundation for big data security[J].Chinese Journal of Computers,2016,39(1):154-168.
[10] Information technology—Security techniques—Information se-curity management systems—Requirements:ISO/IEC 27001:2013[S].Switzerland:Schweizerische Normen-Vereinigung(SNV),2013.
[11] TANKARD C.Big data security[J].Network Security,2012(7):5-8.
[12] KSHETRI N.Big data’s impact on privacy,security and consumer welfare[J].Telecommunications Policy,2014,38(11):1134-1145.
[13] FENG D G,ZHANG M,LI H.Big data security and privacy protection[J].Chinese Journal of Computers,2014,37(1):246-258.
[14] TIAN W.The Connotation,Current Situation and Basis of Public Big Data Information Security Legislation[J].Henan Social Sciences,2018,26(7):86-91.
[15] HAN W.The balance of security and freedom-analysis of the purpose of data security legislation[J].Science Technology and Law,2019(6):41-48,67.
[16] HU K,LIU D,LIU M H.Research on the Security Understan-ding and Countermeasures of Big Data[J].Telecommunication Science,2014,30(2):112-117,122.
[17] HUANG G B,ZHENG L.Research on Big Data Information Security Risk Framework and Countermeasures[J].Researches in Library Science,2015(13):24-29.
[18] XU Y.Challenges and countermeasures facing China in the era of big data[J].Forum on Science and Technology in China,2015 (3):24-29.
[19] LIU Y,DENG Q,PENG Y S.Security Challenges Facing Data Sovereignty and Privacy Protection in the Big Data Era[J].Modernization of Management,2019,39(1):104-107.
[20] MENG X F,CHI X.Big data management:concepts,technolo-gies and challenges[J].Journal of Computer Research and Development,2013,50(1):146-169.
[21] CHEN H,WANG X X,DUAN Y Q.Analysis and Research on the Value Orientation of Chinese Government’s Big Data Policy[J].Library and Information Service,2020,64(11):19-27.
[22] ZHANG X J,WANG W Q,TANG C L.Research on the Policies and Regulations of China-US Government Data Opening and Personal Privacy Protection[J].Information Studies:Theory & Application,2016,39(1):38-43.
[23] CAI Q X,HUANG R H.Policy and Regulation Guarantee of U.S.Government Data Opening and Its Enlightenment to my country[J].Library and Information,2017(1):10-17.
[24] YU H.Opportunities,Challenges and Countermeasures of Go-vernment Data Management in the Big Data Era[J].Chinese Public Administration,2015(3):127-130.
[25] DU H H.Research on the Construction of Evaluation Systemfor Privacy Protection of my country’s Government Data Open Platform[J].Journal of Information,2020(3):172-179. [26] WANG C H.Analysis of the Six Legal Systems of “Network Security Law”[J].Journal of Nanjing University of Posts and Telecommunications (Natural Science),2017,37(1):1-13.
[27] The network security grade protection system 2.0 standard is officially released[EB/OL].(2019-05-16) [2021-09-13].http://it.people.com.cn/n1/2019/0516/c1009-31087714.html.
[28] KOU G,WANG S,Tang G.Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction[J].Chinese Journal of Electronics,2019,28(1):166-175.
[29] SINGH S,SHARMA P K,MOON S Y,et al.A comprehensive study on APT attacks and countermeasures for future networks and communications:challenges and solutions[J].Journal of Supercomputing,2016,75:4543-4574.
[30] BREAUX T,BAUMER D.Legally “reasonable” security re-quirements:A 10-year FTC retrospective-Science Direct[J].Computers & Security,2011,30(4):178-193.
[31] LIN C,SU W B,MENG K,et al.Cloud computing security:architecture,mechanism and model evaluation[J].Chinese Journal of Computers,2013,36(9):1765-1784.
[32] JAIN R,PAUL S.Network virtualization and software defined networking for cloud computing:a survey.
[J].IEEE Communications Magazine,2013,51(11):24-31.
[33] FAWCETT L,SCOTT-HAYWARD S,BROADBENT M,et al.Tennison:A Distributed SDN Framework for Scalable Network Security[J].IEEE Journal on Selected Areas in Communications,2018,36(12):2805-2818.
[34] LI B H,LI B,REN W,et al.Research on Resource Security Management Mechanism Oriented to Trusted Cloud Computing[J].Journal of Cyber Security,2018,3(2):76-86. [35] ZHANG K,MA L,XU Y F.Research on Security Assurance System of Complex Information System[J].Chinese Journal of Management Science,2000(S1):336-346.
[36] LI J H.Overview of Threat Intelligence Awareness,Sharing and Analysis Technology in Cyberspace[J].Chinese Journal of Network and Information Security,2016,2(2):16-29.
[37] DING H F,MENG Q Q,WANG X,et al.Analysis of data security and privacy protection countermeasures of government data opening oriented to data life cycle[J].Journal of Information,2019,38(7):151-159.
[38] CHEN C B,CHENG S.Regulatory Responsibility in Government Data Opening:Practical Dilemma and Optimal Path[J].Journal of Information,2019,38(10):188-194.
[1] GU Xiao-yan and XIA Zhi-qiang. Design and Implementation of Teaching Equipment Management System Based on Two-dimensional Code [J]. Computer Science, 2017, 44(Z6): 523-525.
[2] SUN Zhen-yu, SHI Jing-yan, JIANG Xiao-wei, ZOU Jia-heng and DU Ran. Evaluation of Resource Management Methods for Large High Energy Physics Computer Cluster [J]. Computer Science, 2017, 44(10): 85-90.
[3] CHEN Guang-zhi,PAN Rong and LI Lei. Survey and Research Trends of Workflow Modeling Techniques [J]. Computer Science, 2014, 41(Z6): 11-17.
[4] YU Jun-yang and GU Zi-yao. Design and Implementation of Personnel Training Information MS Based on Business Rule Engine [J]. Computer Science, 2013, 40(Z11): 428-431.
[5] YANG Yang , JIA Jun-jun ,LI Wei-wei. Development and Application Research of Network File Management System Based on ASP. NET [J]. Computer Science, 2011, 38(Z10): 222-224.
[6] ZHONG Guo-xiang (Chongqing Education College, Chongqing 400067, China). [J]. Computer Science, 2009, 36(4): 125-128.
[7] LI Heng YANG Dan FANG Wei-tao HU Yue WANG Xian-wei (Department of Information Center,Chongqing University,Chongqing 400030,China). [J]. Computer Science, 2008, 35(8): 293-296.
[8] WU Di JIA ,Zhuo-Sheng (Institute of Computer Science and Engineering, Beijing Jiaotong University, Beijing 100044). [J]. Computer Science, 2008, 35(3): 120-122.
[9] HE Wei, WANG Hai-Yang (School of Computer Science and Technology, Shandong University,Jinan 250100). [J]. Computer Science, 2008, 35(3): 117-119.
[10] ZHAO Zheng (Graduate University of Chinese Academy of Sciences, Beijing 100049). [J]. Computer Science, 2008, 35(2): 104-106.
[11] . [J]. Computer Science, 2007, 34(8): 184-186.
[12] . [J]. Computer Science, 2007, 34(7): 203-207.
[13] . [J]. Computer Science, 2007, 34(3): 87-89.
[14] XI Lei ,SHI Lei, CHE Yin-Chao ,WANG Xiao-Lei (Information & Management Science College, Henan Agricultural University, Zhengzhou 450002). [J]. Computer Science, 2007, 34(3): 132-134.
[15] . [J]. Computer Science, 2007, 34(10): 149-151.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!