Method and system for auditing and distributing sensitive data based on evolution strategy

A sensitive data and evolutionary strategy technology, applied in the field of information security, can solve problems such as content change, loss of effectiveness in confirming the original data source, highly sensitive data leakage audit application, etc.

Inactive Publication Date: 2010-11-24
WUHAN UNIV
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although watermarking has many advantages such as concealment and security when tracking and identifying the copyright and leakage source of digital works, digital watermarking technology also has the following disadvantages: 1) The embedding process of watermarking will lead to changes in the content of the original information carrier, 2. ) The watermarking technology itself is relatively fragile, easily damaged in the process of data processing, and may even be tampered by malicious users, so that it loses the effectiveness of confirming the source of the original data. 3) It is not suitable for highly sensitive data leakage with strict integrity requirements Audit application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for auditing and distributing sensitive data based on evolution strategy
  • Method and system for auditing and distributing sensitive data based on evolution strategy
  • Method and system for auditing and distributing sensitive data based on evolution strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The evolution strategy-based sensitive data audit distribution method and system provided by the present invention can be applied to the technical field of anti-leakage applications such as enterprise design drawings and confidential documents of confidential institutions, without any preprocessing of sensitive data carriers (such as embedding watermarks) operation), and because the distribution refers to the user attributes of the received data, once a data leak is found, the system can detect the leak source with a high probability in a short period of time, thereby rejecting the leak source’s subsequent application and suppressing its leak behavior , effectively preventing the leakage of sensitive data.

[0056] The present invention needs to generate an initial allocation plan based on whether there is a distribution history, obtain a group of feasible allocation sub-schemes from the initial plan, and analyze the allocation plan by using evaluation criteria; in addit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information safety, particularly to a method and a system for auditing and distributing sensitive data based on an evolution strategy. The system of the invention comprises a risk evaluation module based on trust, an auditing and distributing module based on a strategy, a data leakage auditing module and a sensitive data management service module; the risk evaluation module calculates the trust level of the user behavior and investigates the intersection of a leakage set and an intersection of an acquired set of the user, so that the crime risk of the user is obtained; the distributing module determines a distribution policy under the guide of a crime factor and a judging sum formula according to user application and distribution records; and the auditing module records a distributing log, counts the information for analyzing the user behavior and the data leakage, and feeds back an auditing result to the risk evaluation module and the distributing module. The invention meets the requirements of the anti-leakage application of the sensitive data having high requirements for data completeness; the detection source is detected by the intersection of the acquired data set of the user and the leakage data set; and no watermark information needs to be imbedded, so that the invention meets the application requirements of the sensitive data having high requirements for the completeness and the privacy.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a sensitive data audit distribution method and system based on an evolution strategy. Background technique [0002] Data Leakage Protection (DLP) has a strategic position in protecting national data security and an important role in ensuring information security, and is an important part of national security. At present, the security of information content is mainly manifested in the security of documents or data, and its threats mainly include hacking, document or data leakage caused by foreign spies stealing secrets or internal leaks, such as hackers obtaining user files through illegal means such as network attacks, computer virus theft, etc. Taking documents and materials, misoperation by employees without confidentiality awareness, loss of mobile storage devices, etc. In addition, developed countries monopolize computer chips and key software technologies used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06Q50/00H04L29/06G06F21/60G06Q50/26
Inventor 余荣威王丽娜马小燕高汉军董永峰刘炜彭洋
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products