信息网络安全 ›› 2024, Vol. 24 ›› Issue (12): 1855-1870.doi: 10.3969/j.issn.1671-1122.2024.12.005

• 理论研究 • 上一篇    下一篇

面向数据合规的匿名通用流程与风险评估方法

袁煜琳1,2,3, 袁曙光1,3, 于晶1,2,3, 陈驰1,2,3()   

  1. 1.中国科学院信息工程研究所,北京 100085
    2.中国科学院大学网络空间安全学院,北京 100049
    3.网络空间安全防御重点实验室,北京 100085
  • 收稿日期:2024-08-20 出版日期:2024-12-10 发布日期:2025-01-10
  • 通讯作者: 陈驰 chenchi@iie.ac.cn
  • 作者简介:袁煜琳(1998—),女,河南,博士研究生,主要研究方向为数据安全|袁曙光(1994—),男,山东,助理研究员,博士,CCF会员,主要研究方向为数据安全|于晶(1986—),女,辽宁,高级工程师,博士,主要研究方向为数据安全|陈驰(1978—),男,山东,正高级工程师,博士,主要研究方向为云计算安全理论与技术、数据安全理论与技术
  • 基金资助:
    中国科学院战略性先导科技专项(B类)(XDB0690303)

Anonymization General Process and Risk Assessment Method for Data Compliance

YUAN Yulin1,2,3, YUAN Shuguang1,3, YU Jing1,2,3, CHEN Chi1,2,3()   

  1. 1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3. Key Laboratory of Cyberspace Security Defense, Beijing 100085, China
  • Received:2024-08-20 Online:2024-12-10 Published:2025-01-10

摘要:

个人隐私泄露是当前数据安全面临的严峻挑战。匿名技术通过对个人信息去标识化以降低隐私泄露的风险,但是不恰当的匿名处理流程会影响匿名结果,并且匿名数据仍存在一定程度的重识别风险。随着国内对数据安全流通监管的加强,如何面向数据合规,制定匿名流程,评估数据风险,对个人信息共享有重要意义。以往的匿名风险评估大多通过攻击模型判定安全性,忽视了匿名流程中的风险以及匿名数据的合规性。因此,文章提出一个匿名通用流程,并在此基础上,聚焦数据的安全性和合规性展开风险评估。安全性评估围绕流程风险和数据重识别风险提出配套的评估方法以及指标体系。合规性评估归纳现有标准并提出可量化的合规要求,在评估安全性的同时完成合规判定。文章设计匿名流程的仿真实验,验证了匿名通用流程的可行性,并通过模拟不同的风险场景,验证了风险评估方法可有效发现潜在威胁。

关键词: 数据合规, 匿名通用流程, 匿名风险评估, 流程风险, 重识别风险

Abstract:

The leakage of personal privacy has emerged as a critical challenge in data security. Anonymization can effectively reduce the risk of privacy leakage by deidentification of personal information. However, inappropriate data processing methods can affect the results. Moreover, a residual risk of re-identification remains after data release. As domestic security supervision on data circulation intensifies, it is of great significance for personal information sharing to establish a reasonable anonymization process and assess the residual risks of anonymized data under data compliance. The previous anonymous risk assessment primarily center on evaluating data security through attack models. Additionally, these studies often overlook inherent risks within the anonymous process itself and the compliance of anonymous data. Therefore, this article introduced an anonymization general process. Building upon it, a risk assessment around data security and compliance was devised. The risk assessment method focused on process risk and data re-identification risk. It contained a supporting evaluation method and index system. In compliance evaluation, this article summarized existing standards. It proposed quantifiable compliance requirements to ensure compliance while assessing data risks. Finally, this article conducted a simulation experiment of anonymous process to verify process feasibility. The experimental result verifies that the risk assessment method can effectively detect potential threats in anonymization by simulating different risk scenarios.

Key words: data compliance, anonymization general process, anonymization risk assessment, process risk, re-identification risk

中图分类号: