Research on access control for secure cross-domain data circulation

To address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control we...

Full description

Saved in:
Bibliographic Details
Main Authors: LI Heng, LI Fenghua, SHI Xinyi, GUO Yunchuan, GUO Shoukun
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2025-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025042/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control were systematically examined, followed by an in-depth investigation into the fundamental concepts of cross-domain data circulation and the essential implications of cross-domain access control. Subsequently, a comprehensive review was conducted on access control technologies for secure cross-domain data circulation, which encompassed: access control models categorized as provenance-based, purpose-based, and cyberspace-oriented approaches; key policy management technologies involving label mining for policies, policy negotiation and generation, conflict detection and resolution, policy propagation and enforcement, and auditing of anomalous policy execution; policy implementation mechanisms developed based on blockchain technology, data capsules, and data infrastructure. Finally, current challenges in cross-domain data circulation are systematically summarized, and future research directions are proposed.
ISSN:1000-436X