大数据 ›› 2023, Vol. 9 ›› Issue (4): 44-58.doi: 10.11959/j.issn.2096-0271.2023049

• 专题:跨域数据管理 • 上一篇    

基于数据对象的跨域情报可信共享

彭泰1,2, 孙晶1, 陈旭涧1,2, 周纤2, 叶宇铭2, 白晓颖2   

  1. 1 北方工业大学信息学院,北京 100144
    2 中国人民解放军军事科学院军事科学信息研究中心,北京 100142
  • 出版日期:2023-07-01 发布日期:2023-07-01
  • 作者简介:彭泰(1998- ),男,北方工业大学信息学院硕士生,主要研究方向为数字对象体系
    孙晶(1968- ),女,北方工业大学信息学院副教授,中国计算机学会(CCF)会员,主要研究方向为软件体系结构
    陈旭涧(1998- ),男,北方工业大学信息学院硕士生,主要研究方向为数据分析和区块链技术
    周纤(1995- ),女,博士,军事科学院军事科学信息研究中心助理研究员,主要研究方向为数据处理和分析
    叶宇铭(1990- ),男,军事科学院军事科学信息研究中心工程师,主要研究方向为大数据处理技术、信息服务
    白晓颖(1973- ),女,博士,军事科学院军事科学信息研究中心研究员、博士生导师,CCF高级会员,主要研究方向为计算机软件

Trusted sharing of cross-domain intelligence based on data objects

Tai PENG1,2, Jing SUN1, Xujian CHEN1,2, Xian ZHOU2, Yuming YE2, Xiaoying BAI2   

  1. 1 School of Information, North China University of Technology, Beijing 100144, China
    2 Information Research Center of Military Services, PLA Academy of Military Science, Beijing 100142, China
  • Online:2023-07-01 Published:2023-07-01

摘要:

情报数据作为一种高价值的数据资产,被存储在不同平台,被不同主体所持有,具有高分散性和低可用性特点。由于结构形态与存储方式不同,多源异构情报数据难以实现高效汇聚共享,多主体间情报信息融合和综合分析利用存在较大困难。因此亟须在跨域情报主体间建立安全可信的共享互操作机制,在满足数据确权、安全审计等管理要求的同时,实现情报信息的深度挖掘。针对跨域情报数据可信共享需求与应用特点,提出基于数据对象的情报管理方法,并采用数字对象体系架构及区块链可信访问控制技术构建跨域情报数据可信共享系统,实现多源异构情报数据的视图统一和跨域可信共享,为情报数据融合汇聚、情报信息智能分析提供技术支撑,充分挖掘情报信息的巨大潜力。

关键词: 可信共享, 数据对象, 情报分析

Abstract:

Intelligence data, as a high-value data asset, is stored on different platforms and held by different subjects, and has the characteristics of high dispersion and low availability.Due to the different structural forms and storage methods, it is non-trivial to achieve efficient aggregation and sharing of multi-source heterogeneous intelligence data, and there are great difficulties in the fusion and comprehensive analysis and utilization of intelligence information among multiple subjects.Therefore, there is an urgent need to establish a secure and trustworthy sharing and interoperability mechanism among cross-domain intelligence subjects to meet management requirements such as data validation and security auditing, while realizing correlation analysis and cross-validation of intelligence information and deeply mining the intelligence value therein.To address the needs and application characteristics of cross-domain intelligence data trustworthy sharing, this paper proposes a data object-based intelligence management method and adopts the digital object architecture and blockchain trusted access control technology to build a cross-domain intelligence data trustworthy sharing system, realizing the view unification and cross-domain trustworthy sharing of multisource heterogeneous intelligence data, providing technical support for intelligence data fusion and convergence and intelligence information intelligent analysis, and fully exploiting the huge potential of intelligence information.This will provide technical support for intelligence data convergence and intelligent analysis, and fully exploit the huge potential of intelligence information.

Key words: trusted sharing, data object, intelligence analysis

中图分类号: 

No Suggested Reading articles found!