Research on access control for secure cross-domain data circulation

To address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control we...

Full description

Saved in:
Bibliographic Details
Main Authors: LI Heng, LI Fenghua, SHI Xinyi, GUO Yunchuan, GUO Shoukun
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2025-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025042/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849728499066077184
author LI Heng
LI Fenghua
SHI Xinyi
GUO Yunchuan
GUO Shoukun
author_facet LI Heng
LI Fenghua
SHI Xinyi
GUO Yunchuan
GUO Shoukun
author_sort LI Heng
collection DOAJ
description To address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control were systematically examined, followed by an in-depth investigation into the fundamental concepts of cross-domain data circulation and the essential implications of cross-domain access control. Subsequently, a comprehensive review was conducted on access control technologies for secure cross-domain data circulation, which encompassed: access control models categorized as provenance-based, purpose-based, and cyberspace-oriented approaches; key policy management technologies involving label mining for policies, policy negotiation and generation, conflict detection and resolution, policy propagation and enforcement, and auditing of anomalous policy execution; policy implementation mechanisms developed based on blockchain technology, data capsules, and data infrastructure. Finally, current challenges in cross-domain data circulation are systematically summarized, and future research directions are proposed.
format Article
id doaj-art-b024c3f5387549b9b43ad64fb0aa85ef
institution DOAJ
issn 1000-436X
language zho
publishDate 2025-04-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-b024c3f5387549b9b43ad64fb0aa85ef2025-08-20T03:09:32ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2025-04-0146238254100122657Research on access control for secure cross-domain data circulationLI HengLI FenghuaSHI XinyiGUO YunchuanGUO ShoukunTo address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control were systematically examined, followed by an in-depth investigation into the fundamental concepts of cross-domain data circulation and the essential implications of cross-domain access control. Subsequently, a comprehensive review was conducted on access control technologies for secure cross-domain data circulation, which encompassed: access control models categorized as provenance-based, purpose-based, and cyberspace-oriented approaches; key policy management technologies involving label mining for policies, policy negotiation and generation, conflict detection and resolution, policy propagation and enforcement, and auditing of anomalous policy execution; policy implementation mechanisms developed based on blockchain technology, data capsules, and data infrastructure. Finally, current challenges in cross-domain data circulation are systematically summarized, and future research directions are proposed.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025042/cross-domain access controldata elements circulationdata usage controlextended controldata security
spellingShingle LI Heng
LI Fenghua
SHI Xinyi
GUO Yunchuan
GUO Shoukun
Research on access control for secure cross-domain data circulation
Tongxin xuebao
cross-domain access control
data elements circulation
data usage control
extended control
data security
title Research on access control for secure cross-domain data circulation
title_full Research on access control for secure cross-domain data circulation
title_fullStr Research on access control for secure cross-domain data circulation
title_full_unstemmed Research on access control for secure cross-domain data circulation
title_short Research on access control for secure cross-domain data circulation
title_sort research on access control for secure cross domain data circulation
topic cross-domain access control
data elements circulation
data usage control
extended control
data security
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025042/
work_keys_str_mv AT liheng researchonaccesscontrolforsecurecrossdomaindatacirculation
AT lifenghua researchonaccesscontrolforsecurecrossdomaindatacirculation
AT shixinyi researchonaccesscontrolforsecurecrossdomaindatacirculation
AT guoyunchuan researchonaccesscontrolforsecurecrossdomaindatacirculation
AT guoshoukun researchonaccesscontrolforsecurecrossdomaindatacirculation