Big Data Research ›› 2023, Vol. 9 ›› Issue (6): 3-14.doi: 10.11959/j.issn.2096-0271.2023074

• TOPIC: BIG DATA SECURITY AND PRIVACY COMPUTING • Previous Articles     Next Articles

Application of big data technology in data security governance

Wei CHENG1,2, Cheng MA2, Jie LING3   

  1. 1 Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    2 Unicom (Guangdong) Industrial Internet Co., Ltd., Guangzhou 510320, China
    3 School of Computer Science, Guangdong University of Technology, Guangzhou 510006, China
  • Online:2023-11-15 Published:2023-11-01
  • Supported by:
    Guangzhou Key Field Research and Development Project(202007010004)

Abstract:

Facing the challenges of data security governance in the new situation and following the technological development trends in the field of data security, in response to the prominent issue of identifying key authorized personnel in the practical application of data security governance in large state-owned enterprises, this article proposes a key authorized personnel identification technology based on graph algorithm, which can discover potential authorization influencing factors in the system and measure the weight influence of different meanings from multiple perspectives, The recognition results have strong interpretability.Aiming at the problems of user and entity behavior anomaly detection in data security governance, this paper proposes a user and entity behavior anomaly detection method based on the generative adversarial network.The experimental results show that the accuracy, recall rate and average F1-score of the proposed method are better than the comparison baseline model method.A data security platform has been designed and developed.The platform has played an important role in reducing data security risks, assisting enterprise compliance construction, promoting data development and utilization, and has been applied in multiple data centralized management projects.It can meet the needs of big data processing in security scenarios, and has good application and promotion value.

Key words: data security governance, graph algorithm, UEBA, data security platform

CLC Number: 

No Suggested Reading articles found!