首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
蒋洁 《情报杂志》2012,31(7):157-162
云数据自云端形成至完全销毁的完整生命周期中,时刻面临着云服务商和公权机关侵害数据保密权、支配权、知情权等诸多风险.通过构建云环境标准体系、云隐私影响评估制度、云数据隐私法律保护框架、云服务协议的数据隐私保护条款、侵权赔偿幅度与专门监督制度等,矫正恶意侵权人利益驱动与规则缺失联合作用导致的机会成本过低的畸形状态,寻求云环境高效运转与保护云数据隐私之间的动态平衡.  相似文献   

2.
Predictive computation now is a more and more popular paradigm for artificial intelligence. In this article, we discuss how to design a privacy preserving computing toolkit for secure predictive computation in smart cities. Predictive computation technology is very important in the management of cloud data in smart cities, which can realize intelligent computing and efficient management of cloud data in the city. Concretely, we propose a homomorphic outsourcing computing toolkit to protect the privacy of multiple users for predictive computation. It can meet the needs of large-scale users to securely outsource their data to cloud servers for storage, management and processing of their own data. This toolkit, using the Paillier encryption system and Lagrangian interpolation law, can implement most commonly basic calculations such as addition, subtraction, multiplication and division etc. It can also implement secure comparison of user data in the encrypted domain. In addition, we discuss how to implement the derivative of polynomial functions using our homomorphic computing encryption tool. We also introduce its application in neural networks. Finally, we demonstrate the security and efficiency of all our protocols through rigorous mathematical analysis and performance analysis. The results show that our toolkit is efficient and secure.  相似文献   

3.
陶涛 《现代情报》2014,34(2):162-167
近年来,各国因采用云计算技术而频繁发生的信息和数据泄露事件严重侵犯了用户的隐私权,为此,国家进行了相应的立法保护,监督云计算提供商的行为,并敦促云计算提供商改进技术,结果却收效甚微。鉴于此,本文从云计算的特点、行业自律、立法、经济发展、政府介入这5个维度对云计算领域隐私权保护的现实困境进行分析,试图探究云计算领域隐私权难以保护的深层次原因,为云计算领域隐私权保护对策的制定提供思路上的参考和借鉴。  相似文献   

4.
概述了数字图书馆用户隐私保护的概念、国内外研究现状、数字图书馆建设中产生的隐私问题等,并探讨了云计算服务给数字图书馆建设带来的机遇和挑战,进而探讨在云计算环境下,数字图书馆用户隐私保护的对策和方法,讨论了其为云计算服务提供商带来的启示。  相似文献   

5.
云计算环境下数据库服务应用系统中的隐私保护问题是影响组织是否选择相关服务的重要因素之一,本文界定了云计算数据库服务应用系统架构;分析了基于密码学理论实现访问控制方法的不足,探讨了云计算环境下支持多管理域合成的访问控制模型;研究了云计算环境数据动态变化场景下的用户隐私保护问题;介绍了经典数据发布模型,对比了发布数据效用度量方法。最后指出云计算环境数据发布服务中隐私保护的热点研究方向。  相似文献   

6.
[目的/意义]个体云存储服务中的安全问题已经成为其推广的主要阻碍,分析用户云存储服务使用过程中对具体风险因素的感知,是提高云存储服务质量、提升用户满意度的基础。[方法/过程]从服务保障、功能、连接、财务、心理、隐私6个维度来探讨用户使用云存储服务中的具体感知风险,重点引入转换成本这一调节变量,对用户感知风险、用户感知转换成本与用户持续使用意愿进行回归分析。[结果/结论]用户感知隐私风险、连接风险、心理风险对用户持续使用行为有显著的负向影响;感知转换成本对用户持续使用意愿具有显著负向影响;感知转换成本负向调节用户感知隐私风险与持续使用意愿之间的关系。  相似文献   

7.
Today’s data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM).  相似文献   

8.
This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection.  相似文献   

9.
以Scopus数据库中"大数据"相关研究作为分析对象,采用关键词共现网络聚类的方法,确定相关的10个研究方向,分别是Hadoop研究、MapReduce优化、大数据下的数据挖掘研究、大数据下的网络安全与隐私、分布式计算机系统、数据密集型计算、可视化技术、物联网、移动云计算和云制造等研究方向。结合论文数、H指数等指标,识别不同研究方向下的代表性专家,并对其主要研究成果进行分析。结果发现网络安全与隐私中顶尖专家较多,同时在云制造方向下,我国大陆地区的研究人员较多。  相似文献   

10.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches.  相似文献   

11.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   

12.
Users increasingly use mobile devices to engage in social activity and commerce, enabling new forms of data collection by firms and marketers. User privacy expectations for these new forms of data collection remain unclear. A particularly difficult challenge is meeting expectations for contextual integrity, as user privacy expectations vary depending upon data type collected and context of use. This article illustrates how fine-grained, contextual privacy expectations can be measured. It presents findings from a factorial vignette survey that measured the impact of diverse real-world contexts (e.g., medical, navigation, music), data types, and data uses on user privacy expectations. Results demonstrate that individuals’ general privacy preferences are of limited significance for predicting their privacy judgments in specific scenarios. Instead, the results present a nuanced portrait of the relative importance of particular contextual factors and information uses, and demonstrate how those contextual factors can be found and measured. The results also suggest that current common activities of mobile application companies, such as harvesting and reusing location data, images, and contact lists, do not meet users’ privacy expectations. Understanding how user privacy expectations vary according to context, data types, and data uses highlights areas requiring stricter privacy protections by governments and industry.  相似文献   

13.
[目的/意义]研究有效的数据安全防护策略,以应对高校图书馆面临的数据安全威胁,为高校图书馆提升服务质量和效率提供可靠的技术保障。[方法/手段]运用云存储、分级加密、大数据分析、WAF、RBAC等技术和生命周期理论,结合高校图书馆面临的数据安全问题,从存储安全、网络安全、隐私泄露三方面进行分析、研究。[结论/结果]从数据云安全存储、提高网络安全防护技术、基于数据生命周期的隐私保护三方面提出多维、有效的高校图书馆数据安全防护策略。  相似文献   

14.
陈臣  崔治总 《现代情报》2012,32(7):8-11
"云"计算是一种新兴的共享基础架构方法。"云"计算虽然给用户带来经济与高效的应用,但用户信息资源安全与隐私保护也受到极大的挑战。本文分析了数字图书馆IaaS云计算平台的安全问题,然后根据IaaS云计算平台特点,提出了数字图书馆IaaS云计算平台安全结构与安全策略。  相似文献   

15.
This paper proposes a privacy-preserving consensus algorithm which enables all the agents in the directed network to eventually reach the weighted average of initial states, and while preserving the privacy of the initial state of each agent. A novel privacy-preserving scheme is proposed in our consensus algorithm where initial states are hidden in random values. We also develop detailed analysis based on our algorithm, including its convergence property and the topology condition of privacy leakages for each agent. It can be observed that final consensus point is independent of their initial values that can be arbitrary random values. Besides, when an eavesdropper exists and can intercept the data transmitted on the edges, we introduce an index to measure the privacy leakage degree of agents, and then analyze the degree of privacy leakage for each agent. Similarly, the degree for network privacy leakage is derived. Subsequently, we establish an optimization problem to find the optimal attacking strategy, and present a heuristic optimization algorithm based on the Sequential Least Squares Programming (SLSQP) to solve the proposed optimization problem. Finally, numerical experiments are designed to demonstrate the effectiveness of our algorithm.  相似文献   

16.
基于云计算信息处理系统体系结构设计   总被引:2,自引:0,他引:2  
刘燕 《科技通报》2012,28(8):100-102,106
研究面向云计算的智能管理系统的体系架构与集约化数据管理的理论和方法。建立面向云计算的智能管理系统原型,数据空间的模式规范化理论和需求归约化方法,实现云计算个性化管理;采用分离式管理架构,实现按需双向动态一致性维护,多源、非结构数据的抽取、融合与分析;建立面向数据安全与隐私保护的安全体系结构,保证系统中各类数据的安全和可信。  相似文献   

17.
In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information can violate privacy but does not call for consent.  相似文献   

18.
Caller ID service continues to be a controversial issue in the U.S. because of its privacy implications. State and federal regulators, legislators, scholars, and the courts have examined and responded to the privacy issue from a policy perspective, but perhaps without a complete understanding of the meaning of privacy in the context of the debate. What types of privacy are involved, how significant are these interests, and how might privacy needs compare and be balanced? This article explores privacy in the context of the Caller ID debate from a social science perspective. It examines motives for seeking and preserving privacy and explores the dynamic relationship between the caller and called party positions. It then provides an analysis of current and proposed Caller ID features and policies with a view toward understanding how these proposals balance competing privacy needs. This article establishes an analytic framework and a foundation for further study of caller and called party privacy that should lead to a better understanding of the privacy debate and the privacy implications of Caller ID.  相似文献   

19.
刘松 《现代情报》2007,27(7):190-192
基于现行数据隐私问题日益严重,如何防止数据挖掘过程中隐私信息的泄漏,将是一个重要的研究议题。本文主要针对关联规则挖掘技术,从数据挖掘资源共享方面探讨隐私信息的保护,提出数据汇总概念的保护机制.将欲公开的内容隐藏到汇总内容中。此机制不仅确保公开内容的隐私,还可以从汇总内容中获取有用信息,从而在隐私保护和知识获取间取得一个平衡。  相似文献   

20.
云计算的出现和应用,促进了信息服务的进程,也为电子健康信息服务提供有力的技术支持,然而云计算在我国电子健康信息服务领域的应用与我国的现状和发展要求仍有差距,云计算在电子健康信息服务的应用前景应该成为我们关注的问题。通过对国内外文献的梳理,探讨云计算在电子健康服务领域应用的优势和挑战,并据此提出了解决对策。针对云计算在电子健康信息服务的应用挑战,从有效降低投入成本、建立隐私机制、引入第三方认证、完善相关法律以及采取容错技术5个方面提出建设意见,以期能为电子健康信息服务行业的发展提供借鉴。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号