浏览全部资源
扫码关注微信
1. 南京邮电大学计算机学院,江苏 南京210023
2. 江苏省无线传感网高技术研究重点实验室,江苏 南京210023
3. 南京电讯技术研究所,江苏 南京210007
[ "沙乐天(1985-),男,江苏徐州人,博士,南京邮电大学讲师,主要研究方向为网络安全、物联网攻防等。" ]
[ "肖甫(1980-),男,湖南邵阳人,博士,南京邮电大学教授、博士生导师,主要研究方向为传感网和物联网等。" ]
[ "陈伟(1979-),男,江苏淮安人,博士,南京邮电大学教授,主要研究方向为无线网络安全、移动互联网安全。" ]
[ "孙晶(1985-),男,江苏宿迁人,南京电讯技术研究所工程师,主要研究方向为通信网络技术、通信技术保障。" ]
[ "王汝传(1943-),男,安徽合肥人,博士,南京邮电大学教授、博士生导师,主要研究方向为物联网、网络安全等。" ]
网络出版日期:2017-07,
纸质出版日期:2017-07-25
移动端阅览
沙乐天, 肖甫, 陈伟, 等. 基于多属性决策及污点跟踪的大数据平台敏感信息泄露感知方法[J]. 通信学报, 2017,38(7):56-69.
Le-tian SHA, Fu XIAO, Wei CHEN, et al. Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking[J]. Journal on communications, 2017, 38(7): 56-69.
沙乐天, 肖甫, 陈伟, 等. 基于多属性决策及污点跟踪的大数据平台敏感信息泄露感知方法[J]. 通信学报, 2017,38(7):56-69. DOI: 10.11959/j.issn.1000-436x.2017143.
Le-tian SHA, Fu XIAO, Wei CHEN, et al. Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking[J]. Journal on communications, 2017, 38(7): 56-69. DOI: 10.11959/j.issn.1000-436x.2017143.
基于多属性决策及污点跟踪提出一种面向大数据平台中敏感信息泄露的感知方法,该方法通过分析已知大数据平台敏感信息泄露的相关已知漏洞,抽取并推演目标敏感信息集合,并结合敏感信息操作语义建立目标集多属性模型,进而设计基于灰色关联分析及理想优基点法的敏感度计算方法,并基于污点跟踪实现了原型系统,最终实现了基于所提方案的跨平台敏感信息泄露漏洞的挖掘与验证。实验表明,所提方法可有效实现敏感信息泄露场景的已知漏洞验证及未知漏洞挖掘,从而为敏感信息动态数据流的安全防护提供支持。
Based on multiple-attribute-decision-making and taint tracking
a sensitive-information leakage awareness method was proposed
some relative known vulnerabilities in big data platform was analyzed
target database was extracted and extended
multiple attribute model was built combined with operation semantic
a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking
sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios
which can be regarded as a support for protection in dynamic sensitive information data flow.
付钰 , 李洪成 , 吴晓平 , 等 . 基于大数据分析的 APT 攻击检测研究综述 [J ] . 通信学报 , 2015 , 36 ( 11 ): 1 - 14 .
FU Y , LI H C , WU X P , et al . Detecting APT attacks:a survey from the perspective of big data analysis [J ] . Journal on Communications , 2015 , 36 ( 11 ): 1 - 14 .
张浩 , 王丽娜 , 谈诚 , 等 . 云环境下 APT 攻击的防御方法综述 [J ] . 计算机科学 , 2016 , 43 ( 3 ): 1 - 7 .
ZHANG H , WANG L N , TAN C , et al . Review of defense methods against advanced persistent threat in cloud environment [J ] . Computer Science , 2016 , 43 ( 3 ): 1 - 7 .
冯登国 , 张敏 , 李昊 . 大数据安全与隐私保护 [J ] . 计算机学报 , 2014 , 37 ( 1 ): 246 - 258 .
FENG D G , ZHANG M , LI H . Big data security and privacy protection [J ] . Chinese Journal of Computers , 2014 , 37 ( 1 ): 246 - 258 .
梁吉业 , 冯晨娇 , 宋鹏 . 大数据相关分析综述 [J ] . 计算机学报 , 2016 , 39 ( 1 ): 1 - 18 .
LIANG J Y , FENG C J , SONG P . A survey on correlation analysis of big data [J ] . Chinese Journal of Computers , 2016 , 39 ( 1 ): 1 - 18 .
刘雅辉 , 张铁赢 , 靳小龙 , 等 . 大数据时代的个人隐私保护 [J ] . 计算机研究与发展 , 2015 , 52 ( 1 ): 229 - 247 .
LIU Y H , ZHANG T Y , JIN X L , et al . Personal privacy protection in the era of big data [J ] . Journal of Computer Research and Development , 2015 , 52 ( 1 ): 229 - 247 .
黄刘生 , 田苗苗 , 黄河 . 大数据隐私保护密码技术研究综述 [J ] . 软件学报 , 2015 , 26 ( 4 ): 945 - 959 .
HUANG L S , TIAN M M , HUANG H . Preserving privacy in big data:a survey from the cryptographic perspective [J ] . Journal of Software , 2015 , 26 ( 4 ): 945 - 959 .
田洪亮 , 张勇 , 许信辉 , 等 . 可信固态硬盘:大数据安全的新基础 [J ] . 计算机学报 , 2016 , 39 ( 1 ): 154 - 168 .
TIAN H L , ZHANG Y , XU X H , et al . Trusted SSD:new foundation for big data security [J ] . Chinese Journal of Computers , 2016 , 39 ( 1 ): 154 - 168 .
DAMGARD I , PASTRO V , SMART N , et al . Multiparty computation from somewhat homomorphic encryption [C ] // Advances in Cryptology-CRYPTO 2012 . 2012 : 643 - 662 .
熊金波 , 张媛媛 , 李凤华 , 等 . 云环境中数据安全去重研究进展 [J ] . 通信学报 , 2016 , 37 ( 11 ): 238 - 250 .
XIONG J B , ZHANG Y Y , LI F H , et al . Research progress on secure data deduplication in cloud [J ] . Journal on Communications , 2016 , 37 ( 11 ): 238 - 250 .
陈越 , 李超零 , 兰巨龙 , 等 . 基于确定/概率性文件拥有证明的机密数据安全去重方案 [J ] . 通信学报 , 2015 , 36 ( 9 ): 1 - 12 .
CHEN Y , LI C L , LAN J L , et al . Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership [J ] . Journal on Communications , 2015 , 36 ( 9 ): 1 - 12 .
CHENG H , RONG C , HWANG K , et al . Secure big data storage and sharing scheme for cloud tenants [J ] . China Communications , 2015 , 12 ( 6 ): 106 - 115 .
孙国梓 , 董宇 , 李云 . 基于CP-ABE算法的云存储数据访问控制 [J ] . 通信学报 , 2011 , 32 ( 7 ): 146 - 152 .
SUN G Z , DONG Y , LI Y . CP-ABE based data access control in cloud storage [J ] . Journal on Communications , 2011 , 32 ( 7 ): 146 - 152 .
惠榛 , 李昊 , 张敏 , 等 . 面向医疗大数据的风险自适应的访问控制模型 [J ] . 通信学报 , 2015 , 36 ( 12 ): 190 - 199 .
HUI Z , LI H , ZHANG M , et al . Risk-adaptive access control model for big data in healthcare [J ] . Journal on Communications , 2015 , 36 ( 12 ): 190 - 199 .
徐泽水 . 不确定多属性决策方法及应用 [M ] . 北京 : 清华大学出版社 , 2004 .
XU Z S . Uncertain multiple attribute decision making:methods and applications [M ] . Beijing : Tsinghua University Press , 2004 .
胡毓达 . 多目标决策:实用模型和选优方法 [M ] . 上海 : 上海科学技术出版社 , 2010 .
HU Y D . Multiple target making decision [M ] . ShangHai : Shanghai Scientific & Technical Publishers , 2010 .
谭学瑞 , 邓聚龙 . 灰色关联分析:多因素统计分析新方法 [J ] . 统计研究 , 1995 , 12 ( 3 ): 46 - 48 .
TAN X R , DENG J L . Grey connected analysis:a new method of multifactor statistical analysis [J ] . Statistical Research , 1995 , 12 ( 3 ): 46 - 48 .
黄强 , 曾庆凯 . 基于信息流策略的污点传播分析及动态验证 [J ] . 软件学报 , 2011 , 22 ( 9 ): 2036 - 2048 .
HUANG Q , ZENG Q K . Taint propagation analysis and dynamic verification with information flow policy [J ] . Journal of Software , 2011 , 22 ( 9 ): 2036 - 2048 .
GANAPATHY V , JHA S , CHANDLER D , et al . Buffer overrun detection using linear programming and static analysis [C ] // ACM Conference on Computer and Communications Security . 2003 : 345 - 354 .
ZHU D , JUNG J , SONG D , et al . TaintEraser:protecting sensitive data leaks using application-level taint tracking [J ] . ACM SIGOPS Operating Systems Review , 2011 , 45 ( 1 ): 142 - 154 .
ENCK W , GILBERT P , HAN S , et al . TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones [C ] // USENIX Conference on Operating Systems Design & Implementation . 2014 : 393 - 407 .
0
浏览量
1297
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构