首页 | 本学科首页   官方微博 | 高级检索  
     检索      

地理信息安全技术研究进展与展望
引用本文:朱长青,任娜,徐鼎捷.地理信息安全技术研究进展与展望[J].测绘学报,2022,51(6):1017-1028.
作者姓名:朱长青  任娜  徐鼎捷
作者单位:1. 虚拟地理环境教育部重点实验室(南京师范大学), 江苏 南京 210023;2. 江苏省地理环境演化国家重点实验室培育建设点, 江苏 南京 210023;3. 江苏省地理信息资源开发与利用协同创新中心, 江苏 南京 210023
基金项目:国家自然科学基金(41971338;42071362);;江苏省自然科学基金(BK20191373)~~;
摘    要:随着地理信息应用的深入,精度高、涉密广的地理信息安全保护要求与现阶段经济发展对地理信息共享需求的矛盾日益尖锐,如何在安全的前提下促进地理信息最大程度的共享已成为目前迫切需要解决的重要问题,亟须可靠的技术保护地理信息安全。本文综述了近几年来地理信息安全技术的进展,包括将数据转变为密文的加密技术、具有版权保护和溯源追踪作用的数字水印技术、能够控制时间和权限的安全控制技术、可以降低数据精度和删除涉密属性的保密处理技术以及防止篡改和可认证的区块链技术。然后,论述了地理信息安全技术在地理信息安全防护中的应用。最后,展望了地理信息安全技术的未来发展方向和进一步需要解决的关键问题。

关 键 词:地理信息安全  技术  进展  应用  展望  
收稿时间:2022-03-06
修稿时间:2022-04-07

Geo-information security technology: progress and prospects
ZHU Changqing,REN Na,XU Dingjie.Geo-information security technology: progress and prospects[J].Acta Geodaetica et Cartographica Sinica,2022,51(6):1017-1028.
Authors:ZHU Changqing  REN Na  XU Dingjie
Institution:1. Key Laboratory of Virtual Geographic Environment (Nanjing Normal University), Ministry of Education, Nanjing 210023, China;2. State Key Laboratory Cultivation Base of Geographical Environment Evolution (Jiangsu Province), Nanjing 210023, China;3. Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing 210023, China
Abstract:With the in-depth utilization of geographic information, the conflicts in geographic information become severe between the requirements of high-precision wide-security-range protection and the requirements of sharing from current economy development. Therefore, sharing geographic information to the maximum under safe conditions has become an important issue, which is to be solved urgently. Consequently, the reliable protection techniques are in urgent demand for protecting the security of geographic information. In this paper, the recent progress of security techniques for geographic information has been reviewed, including the encryption techniques to convert the data into cipher text, the digital watermarking techniques for copyright protection and traceability, the security control techniques for term of validity and permission, the confidential treatment techniques for reducing the data precision and deleting the security property, and the certifiable block chain techniques for tamper proof. Then, the utilization of security techniques in protection for geographic information is discussed. Finally, the future developing direction and the key problems to be further solved are prospected for security techniques of geographic information.
Keywords:
点击此处可从《测绘学报》浏览原始摘要信息
点击此处可从《测绘学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号