Geo-information security technology: progress and prospects

被引:0
|
作者
Zhu C. [1 ,2 ,3 ]
Ren N. [1 ,2 ,3 ]
Xu D. [1 ,2 ,3 ]
机构
[1] Key Laboratory of Virtual Geographic Environment, Nanjing Normal University, Ministry of Education, Nanjing
[2] State Key Laboratory Cultivation Base of Geographical Environment Evolution, Jiangsu Province, Nanjing
[3] Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing
来源
Cehui Xuebao/Acta Geodaetica et Cartographica Sinica | 2022年 / 51卷 / 06期
基金
中国国家自然科学基金;
关键词
application; geographic information security; progress; prospects; technology;
D O I
10.11947/j.AGCS.2022.20220172
中图分类号
学科分类号
摘要
With the in-depth utilization of geographic information, the conflicts in geographic information become severe between the requirements of high-precision wide-security-range protection and the requirements of sharing from current economy development. Therefore, sharing geographic information to the maximum under safe conditions has become an important issue, which is to be solved urgently. Consequently, the reliable protection techniques are in urgent demand for protecting the security of geographic information. In this paper, the recent progress of security techniques for geographic information has been reviewed, including the encryption techniques to convert the data into cipher text, the digital watermarking techniques for copyright protection and traceability, the security control techniques for term of validity and permission, the confidential treatment techniques for reducing the data precision and deleting the security property, and the certifiable block chain techniques for tamper proof. Then, the utilization of security techniques in protection for geographic information is discussed. Finally, the future developing direction and the key problems to be further solved are prospected for security techniques of geographic information. © 2022 SinoMaps Press. All rights reserved.
引用
收藏
页码:1017 / 1028
页数:11
相关论文
共 90 条
  • [1] Changqing ZHU, Research progresses in digital watermarking and encryption control for geographical data[J], Acta Geodaetica et Cartographica Sinica, 46, 10, pp. 1609-1619, (2017)
  • [2] CHUNG Y H., A spread random interleaver based efficient DES algorithm for personal cloud computing environments[J], Journal of the Korea Institute of Information and Communication Engineering, 17, 1, pp. 41-48, (2013)
  • [3] WADI S M, ZAINAL N., High definition image encryption algorithm based on AES modification[J], Wireless Personal Communications, 79, 2, pp. 811-829, (2014)
  • [4] CHEN Zhiwei, DU Min, YANG Yatao, Et al., Homomorphic cloud computing scheme based on RSA and Paillier[J], Computer Engineering, 39, 7, pp. 35-39, (2013)
  • [5] ZHAO Yougang, LI Weimin, Elliptic curve public-key cryptosystem[J], Journal of Laiyang Agricultural College, 22, 1, pp. 75-77, (2005)
  • [6] CUI Hanchuan, Research on the sharing security of vector geography data[D], (2013)
  • [7] ZHANG Shanshan, Research on the algorithm of encryption in network transmission of vector graphic data, (2005)
  • [8] ZHANG Hanlin, WANG Qingshan, ZOU Yongchu, Encryption of vector data based on composite chaotic System[J], Science of Surveying and Mapping, 37, 5, pp. 87-89, (2012)
  • [9] WANG Hairong, Scrambling encryption methods and scrambling performance evaluation for vector geographic data, (2014)
  • [10] WU Xuerong, LI Anbo, WU Saisong, Et al., Scrambling transformation of GIS line/polygon layer vector data based on Sierpinski Gasket[J], Science of Surveying and Mapping, 40, 9, pp. 102-106, (2015)