Geo-information security technology: progress and prospects

被引:0
作者
Zhu C. [1 ,2 ,3 ]
Ren N. [1 ,2 ,3 ]
Xu D. [1 ,2 ,3 ]
机构
[1] Key Laboratory of Virtual Geographic Environment, Nanjing Normal University, Ministry of Education, Nanjing
[2] State Key Laboratory Cultivation Base of Geographical Environment Evolution, Jiangsu Province, Nanjing
[3] Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing
来源
Cehui Xuebao/Acta Geodaetica et Cartographica Sinica | 2022年 / 51卷 / 06期
基金
中国国家自然科学基金;
关键词
application; geographic information security; progress; prospects; technology;
D O I
10.11947/j.AGCS.2022.20220172
中图分类号
学科分类号
摘要
With the in-depth utilization of geographic information, the conflicts in geographic information become severe between the requirements of high-precision wide-security-range protection and the requirements of sharing from current economy development. Therefore, sharing geographic information to the maximum under safe conditions has become an important issue, which is to be solved urgently. Consequently, the reliable protection techniques are in urgent demand for protecting the security of geographic information. In this paper, the recent progress of security techniques for geographic information has been reviewed, including the encryption techniques to convert the data into cipher text, the digital watermarking techniques for copyright protection and traceability, the security control techniques for term of validity and permission, the confidential treatment techniques for reducing the data precision and deleting the security property, and the certifiable block chain techniques for tamper proof. Then, the utilization of security techniques in protection for geographic information is discussed. Finally, the future developing direction and the key problems to be further solved are prospected for security techniques of geographic information. © 2022 SinoMaps Press. All rights reserved.
引用
收藏
页码:1017 / 1028
页数:11
相关论文
共 90 条
[51]  
Bo JU, Access control policy research progress[J], Audio Engineering, 44, 12, pp. 78-80, (2020)
[52]  
VINH P T, LE MINH T., To assign and control the right accessing geo-database by access control cube, Proceedings of 2011 International Conference on Information and Electronics Engineering, pp. 253-257, (2011)
[53]  
FATHY M, AZER M, BAHGAT M, Et al., Security access control research trends, Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), pp. 1-6, (2013)
[54]  
PAN Ruijie, WANG Gaocai, HUANG Hengyi, Attribute access control based on dynamic user trust in cloud computing[J], Computer Science, 48, 5, pp. 313-319, (2021)
[55]  
ZHANG Bin, Research and implementation of Zone-based RBAC model, (2018)
[56]  
RAO K R, NAYAK A, RAY I G, Et al., Role recommender-RBAC:Optimizing user-role assignments in RBAC[J], Computer Communications, 166, pp. 140-153, (2021)
[57]  
MALIK A K, ALI M A, MATEEN A, Et al., A comparison of collaborative access control models[J], International Journal of Advanced Computer Science and Applications, 8, 3, pp. 290-296, (2017)
[58]  
MAO Jian, ZHU Changqing, GUO Jifa, Et al., A threat model and its coping strategies for geospatial data access control[J], Science of Surveying and Mapping, 43, 2, pp. 88-94, (2018)
[59]  
MAO Jian, Research on the model of geospatial data access control[D], (2015)
[60]  
GAO Minghua, Research on temporal-spatial based access control and privacy protection[D], (2021)