Font Size: a A A

Research And Implementation Of Key Security Technologies Of Data Sharing Exchange Platform

Posted on:2022-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:J LinFull Text:PDF
GTID:2518306524489904Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the development of big data and cloud computing,data has been gradually valued as a major production factor.In the process of circulation and exchange,data generates value and becomes a kind of asset.In reality,a large amount of data is stored by each organization itself,which leads to a large amount of data redundancy and data barriers between organizations.To effectively use data and discover the value of data assets,data holding organizations in different industries have also begun to seek data sharing methods.With the increasing awareness of data security and privacy protection,how to ensure data security in the process of sharing and exchange has become the key points of the current focus.In the process of traditional data sharing and exchange,data holding organizations need to transfer their data to a data center which is outside the security boundary.The industry uses mechanisms such as data secure storage,communication encryption transmission,homomorphic encryption,and K anonymity algorithms to ensure data security issues in this data sharing and exchange mode.However,in this mechanism data is always outside the security boundary of the data holding organizations and is out of the management control of the organizations.Sharing data in a way that the data does not go out of the security boundary and the application code flows can avoid the data security risks caused by the data leaving the security boundary of the holding organization.This thesis studies the key security technologies in the data sharing and exchange platform,designs the platform's security framework,designs and implements verification according to the platform's characteristics of "bring the code to the data".The security scheme plays a supplementary support role for the platform,making it a data security sharing and exchange platform.The main research work of this paper is as follows:(1)Design of data sharing platform security architecture.We research the learning status of data sharing and data islands in various industries and analyze the technical design and existing advantages and disadvantages of existing solutions and research results for various types of data security sharing and exchange.Under the theoretical support of the preliminary analysis and research,the functional requirements and security requirements of the data sharing exchange platform are analyzed,and the architecture and security framework of the sharing exchange platform of this article is designed.(2)Design and implementation of data sharing platform security scheme.Combining the overall data sharing and exchange process,design and implement a security plan suitable for the data sharing and exchange platform from the aspects of platform user identity and authority management,network communication security between clusters,secure and trusted computing framework,and other security measures.(3)Verification,and testing of security solutions.We carry out the coding realization of relevant modules for the designed and verified the relevant functions of the security scheme.At the same time,it is tested in conjunction with the business process of the data sharing and exchange platform to verify the effectiveness and feasibility of the security plan.
Keywords/Search Tags:data sharing, trusted computing, data security, privacy protection
PDF Full Text Request
Related items