{"title":"Research and application of sensitive data intelligent identification technology in power grid data protection","authors":"Lei Chen, Congcong Shi, Xiangqun Wang, Pengfei Yu, Fei Liang, Xianzhou Gao","doi":"10.1109/ICESIT53460.2021.9697013","DOIUrl":null,"url":null,"abstract":"The purpose of this paper is to study the security control measures when data is distributed and shared, and necessary privacy data protection measures should be taken. On the one hand, when data leakage occurs after data is distributed, it can accurately locate which responsibility link occurs according to the added data watermark information, and then trace the responsibility and strengthen the weak link control. On the other hand, through the joint query technology in the data encryption sharing scenario, this paper studies how to build a trusted security system to ensure the complete trust between the data participants and provide effective support for big data analysis.","PeriodicalId":164745,"journal":{"name":"2021 IEEE International Conference on Emergency Science and Information Technology (ICESIT)","volume":"09 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Emergency Science and Information Technology (ICESIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICESIT53460.2021.9697013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The purpose of this paper is to study the security control measures when data is distributed and shared, and necessary privacy data protection measures should be taken. On the one hand, when data leakage occurs after data is distributed, it can accurately locate which responsibility link occurs according to the added data watermark information, and then trace the responsibility and strengthen the weak link control. On the other hand, through the joint query technology in the data encryption sharing scenario, this paper studies how to build a trusted security system to ensure the complete trust between the data participants and provide effective support for big data analysis.