首页|基于等保2.0的网络隐私数据联动防护控制方法

基于等保2.0的网络隐私数据联动防护控制方法

扫码查看
研究基于等保2.0的网络隐私数据联动防护控制方法,保障网络运行中隐私数据的完整性与安全性.结合区块链、安全标记及流量镜像分析等技术,以等保2.0的"一个中心,三重防护"为核心控制理念,从网络管理中心、计算环境、区域边界以及通信网络4个方面出发,设计网络隐私数据联动防护控制方法整体框架,通过4个方面的安全防护控制,实现对整体网络隐私数据的联动防护控制.结果表明,在该方法的联动防护控制下可实现对不同类型实验网络隐私数据的加密防护,有效避免了所存储与传输数据被盗用与破坏,保障了网络隐私数据在通信、传输、存储等过程中的安全性与完整性,提升了整体网络运行的安全性.
Network Privacy Data Linkage Protection Control Method Based on Equal Protection 2.0
This paper researches the linkage protection control method of network privacy data based on equal protection 2.0 to ensure the integrity and security of private data in network operation.Combining technologies such as blockchain,security marking and traffic image analysis,and taking"one center,three protection"as the core control concept of equal protection 2.0,the overall framework of network privacy data linkage protection control method is designed from the four aspects of net-work management center,computing environment,regional boundary and communication network.To realize the linkage pro-tection control of the overall network privacy data.The results show that under the linkage protection control of the method can realize the different types of experimental network privacy data encryption protection,effectively avoid the storage and trans-mission data theft and destruction,protect network privacy data in the process of communication and transport and storage se-curity and integrity,enhance the safety of the whole network operation.

equal protection 2.0network privacy datalinkage protection controlnetwork computing environmentblock-chain technologyregional boundary

芦伟、邵峰、黄明瑞

展开 >

长江水上交通监测与应急处置中心,湖北,武汉 430010

湖北星野科技发展有限公司,湖北,武汉 430070

等保2.0 网络隐私数据 联动防护控制 网络计算环境 区块链技术 区域边界

2024

微型电脑应用
上海市微型电脑应用学会

微型电脑应用

CSTPCD
影响因子:0.359
ISSN:1007-757X
年,卷(期):2024.40(8)