TID-MOP: The Comprehensive Framework of Security Management and Control in the Scenario of Data Exchange

被引:0
|
作者
Ziran D. [1 ]
Yue D. [2 ]
Chengqi Y. [2 ]
Boran H. [3 ]
Mingze G. [3 ]
Lin L. [3 ]
机构
[1] Department of Platform Research and Development, Greater Bay Area Big Data Research Institute, Shenzhen
[2] Department of Big Data Development, State Information Center, Beijing
[3] Department of Engineering Management, Greater Bay Area Big Data Research Institute, Shenzhen
来源
关键词
Data Exchange; Data Transaction Security; Mechanism Guarantee; Technical Path;
D O I
10.11925/infotech.2096-3467.2021.1412
中图分类号
学科分类号
摘要
[Objective] In order to promote the safety and compliance development of data exchange, this paper proposes a comprehensive framework of data transaction security management and control which takes both technical path and mechanism guarantee into account for data transaction risk, data security risk and infrastructure security risk in data exchange scenarios. [Methods] Using literature research method, this paper reviews the current literature of technology and management in the field of data transaction security at home and abroad. Combining the practice of data exchange, this paper puts forward a “TID-MOP” data transaction security management and control framework which contains both technology and mechanism. [Results] The “TID-MOP” comprehensive framework designs a core technology architecture to realize transaction security, that is, “separation of business flow, computing flow and capital flow, and convergence of circulation environment through blockchain”; “Separate the experimental environment from the production computing environment, and link the computing environment through model management and data management”; “Data computing is separated from safety supervision, and the supervision environment is uniformly managed through the control and management center”. The technology architecture improves the safety of data circulation and transaction, and realizes the safety control and unified supervision of the whole process. [Limitations] Further research is needed to verify the actual operation efficiency of the comprehensive framework. [Conclusions] The “TID-MOP” framework takes the data transaction process as the core, and provides an effective reference for the development and innovation of data transaction. © 2022, Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:13 / 21
页数:8
相关论文
共 23 条
  • [1] Zhenguang Lei, Research and Implementation of Key Technologies of Data Transaction Based on Blockchain[D], (2020)
  • [2] Xiaofang Zhang, Rongrong Zhu, Design and Implementation of Data Security Platform Based on Blockchain Smart Contract[J], Wireless Internet Technology, 18, 4, pp. 73-75, (2021)
  • [3] Naigang Chen, Minwei Yao, Lingxuan Yuan, Et al., Application of Blockchain in Data Transaction[J], Electric Power Information and Communication Technology, 19, 10, pp. 119-125, (2021)
  • [4] Fangcheng Fu, Chen Hou, Yong Cheng, Et al., Key Technology and Innovation of Privacy Preserving Computing[J], Information and Communications Technology and Policy, 47, 6, pp. 27-37, (2021)
  • [5] Jing Qin, Design and Implementation of Docker-based OpenStack Cloud Platform Automation Deployment Scheme[D], (2019)
  • [6] Gupta H, Sharma V K., Role of Multiple Encryption in Secure Electronic Transaction[J], International Journal of Network Security & Its Applications, (2011)
  • [7] Kodge B G., Information Security: A Review on Steganography with Cryptography for Secured Data Transaction[J], International Journal of Scientific Research in Network Security and Communication, 5, 6, pp. 1-4, (2017)
  • [8] Brindha B T, Shaji R S., An Efficient Framework for Providing Secured Transaction of Data in Cloud Environment[J], Indian Journal of Science and Technology, 9, 44, pp. 1-6, (2016)
  • [9] Peiyi Han, Chuanyi Liu, Jiahui Wang, Et al., Research on Data Encryption System and Technology for Cloud Storage[J], Journal on Communications, 41, 8, pp. 55-65, (2020)
  • [10] Yi Chen, Zhimeng Jiang, Yu Zhang, Security Transmission Mechanism of Big Data Based on Homomorphic Hash Authentication in Cloud System[J], Computer Engineering and Design, 42, 5, pp. 1250-1256, (2021)