计算机科学与探索 ›› 2019, Vol. 13 ›› Issue (12): 2061-2072.DOI: 10.3778/j.issn.1673-9418.1810016

• 网络与信息安全 • 上一篇    下一篇

面向隐式类型化资源的安全防护

段玉聪,张欣悦,周长兵,黄梦醒,曹春杰,周晓谊   

  1. 1.海南大学 计算机与网络空间安全学院,海口 570228
    2.中国地质大学 信息工程学院,北京 100083
  • 出版日期:2019-12-01 发布日期:2019-12-10

Security Provision for Implicit Typed Resources

DUAN Yucong, ZHANG Xinyue, ZHOU Zhangbing, HUANG Mengxing, CAO Chunjie, ZHOU Xiaoyi   

  1. 1.School of Computer Science & Cyberspace Security, Hainan University, Haikou 570228, China
    2.School of Information Engineering, China University of Geosciences, Beijing 100083, China
  • Online:2019-12-01 Published:2019-12-10

摘要: 在物联网、边缘计算和大数据智能处理高速发展的背景下,安全保护研究的内容已经从显式内容保护扩展到了对隐式内容的保护。多来源内容背景下的隐式内容的安全保护对内容的采集、识别,保护策略定制,保护方法的建模、实现都提出了新的挑战。而实际应用中对性价比的追求更加剧了解决方案的挑战性。受DIKW方法启发提出将保护目标及背景内容分类为数据、信息和知识三种类型化资源。在DIKW上构建基于数据图谱、信息图谱和知识图谱的类型化资源安全资源保护架构。将目标安全资源根据它们在搜索空间中的存在形式分为显式的和隐式的资源,依据不同类型资源表达所对应的表达类型转换及搜索代价差异构造了对应的安全防护方案。该方案支持在不同类型转换过程中的代价以及转换后的搜索代价的差异基础上,设计并提供价值导向的安全服务。

关键词: 隐式类型化资源, 安全防护, 知识图谱

Abstract: With the rapid development of internet of things, edge computing and intelligent big data processing, the content of security protection has been expanded from explicit content protection to implicit content protection. The security protection of implicit content in the context of multi-source content poses new challenges to the collection, identification, customization of protection strategies, modeling and implementation of protection methods. But in practice, the pursuit of performance/cost adds more challenge to the solution. Inspired by the DIKW (data, infor-mation, knowledge, wisdom) method, this paper proposes to classify the target of protection content and background content into three types of resources: data, information and knowledge. A typed resource security protection architecture based on data graph, information graph and knowledge graph is constructed on DIKW. Target security resources are divided into explicit and implicit resources according to their existing forms in the search space, and corresponding security protection schemes are constructed according to the conversion and search cost differences corresponding to different types of resource expressions. The scheme supports the design and provision of value driven security solutions based on the differences of the conversion cost of different types of resources and the search cost after conversion.

Key words: implicit typed resources, security provision, knowledge graph