学报(中文)

新型电子政务及其安全保障技术

展开
  • 上海交通大学 网络空间安全学院, 上海 200240
李建华(1965-),男,江西省九江市人,教授,博士生导师,现主要从事网络空间安全理论与技术研究. 电话(Tel.):021-34205025;E-mail:lijh888@sjtu.edu.cn.

基金资助

国家自然科学基金(61431008, 61571300)资助项目

A Survey of New E-Government and Its Security Technologies

Expand
  • School of Cyber Security, Shanghai Jiao Tong University, Shanghai 200240, China

摘要

在“互联网+”的背景下,电子政务对提高国家公共事务管理水平,促进社会事务管理的信息化、智能化、透明化具有重要意义.当前,随着云计算、大数据和第5代移动通信技术(5G)等新兴技术的飞速发展,新型电子政务系统的功能架构、系统实施和运行维护均得到了变革性的发展,从而有效推动了计算与通信资源的优化调度、海量政务信息的高效处理以及政务大数据的共享与应用.为了应对新兴的信息技术带来的不可忽视的安全威胁,分析了国内外电子政务系统与技术的发展趋势,深入探讨了新型电子政务的特点与技术手段,并进一步讨论了新型电子政务系统的安全防御技术.

本文引用格式

李建华 . 新型电子政务及其安全保障技术[J]. 上海交通大学学报, 2018 , 52(10) : 1370 -1381 . DOI: 10.16183/j.cnki.jsjtu.2018.10.028

Abstract

In the context of “Internet plus”, e-government is of great significance for improving the informationization, intelligence and transparency of national public affairs and social affairs management. At the same time, emerging technologies such as cloud computing, big data, and 5th Generation Mobile Networks (5G) are developing rapidly, and bringing about a transformation in the functional architecture, system implementation, operation and maintenance of new e-government systems. It promotes the optimal scheduling of computing and communication resources, efficient processing of massive government information, and the sharing and application of government big data. However, these technologies have also brought security threats that cannot be ignored. Based on the analysis of the development trend in e-government systems and technologies at home and abroad, this paper studies the characteristics and technical means of new e-government. Furthermore, the security defense technology of new e-government system is analyzed and discussed.

参考文献

[1]熊涛. 政务云对电子政务的支撑研究[J]. 电子商务, 2018, 5: 31-32. XIONG Tao. Study on the government cloud support for e-government [J]. E-Business Journal, 2018, 5: 31-32. [2]梁紫怡. “互联网+”时代电子政务发展趋势初探[J]. 中小企业管理与科技(中旬刊), 2018, 4: 110-111. LIANG Ziyi. A preliminary study on the development trend of e-government in the “Internet+” era[J]. Management and Technology of SME (Mid Magazine), 2018, 4: 110-111. [3]新华网舆情监测分析中心. 全国政务新媒体综合影响力报告[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm. Xinhuanet Public Opinion Monitoring and Analysis Center. National government new media comprehensive impact report[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm. [4]梅宏. 推进“一网、一门、一次”改革 深化“互联网+政务服务”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm. MEI Hong. Promote “one network, one, once” reform deepen the “Internet + government services”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm. [5]白银元, 刘琼芳, 胡新丽. 中美电子政务发展比较分析[J]. 现代商贸工业, 2013, 25(2): 66-69. BAI Yinyuan, LIU Qiongfang, HU Xinli. A comparative analysis of the development of e-government between China and the United States[J]. Modern Business Trade Industry, 2013, 25(2): 66-69. [6]TINHOLT D, VAN DER LINDEN N, GROENEVELD A, et al. eGovernment benchmark 2017[EB/OL]. (2017-11-17)[2018-06-30]. https: //www.capgemini.com/wp-content/uploads/2017/11/2017-egovernment-benchmark_background_v7.pdf. [7]European Commission. European eGovernment Action Plan 2016-2020[R]. Brussels: European Commission, 2016. [8]European Union Agency for Network and Information Security(ENISA). Security framework for governmental clouds[R]. Brussels: European Commission, 2015. [9]吴曼青. 新时代政务信息系统建设的目标、思路与重点[EB/OL]. [2018-07-04].http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml. WU Manqing. Objectives, ideas and priorities for the construction of a new era of government affairs information system[EB/OL]. [2018-07-04]. http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml. [10]殷利梅. 新加坡电子政务总体规划(2011—2015)及启示[J]. 信息化建设, 2011, 11: 38-41. YIN Limei. Singapore’s e-government master plan (2011-2015) and its enlightenment[J]. Information Construction, 2011, 11: 38-41. [11]吴昊, 孙宝文. 当前我国电子政务发展现状、问题及对策实证研究[J]. 国家行政学院学报, 2009, 5: 123-127. WU Hao, SUN Baowen. Current status, problems and countermeasures of e-government development in China[J]. Journal of National School of Administration, 2009, 5: 123-127. [12]国家信息安全工程技术研究中心. 电子政务总体设计与技术实现[M]. 北京: 电子工业出版社, 2003. National Information Security Engineering Technology Research Center. Overall design and technology implementation of e-government [M]. Beijing: Publishing House of Electronics Industry, 2003. [13]张成福, 唐钧. 电子政务绩效评估: 模式研究与中国战略[J]. 探索, 2004, 2: 36-40. ZHANG Chengfu, TANG Jun. E-government performance evaluation: Model research and China strategy[J]. Exploration, 2004, 2: 36-40. [14]HAYES B. Cloud computing[J]. Communications of the ACM, 2008, 51(7): 9-11. [15]JACOBSON D H. A view on cloud computing[J]. International Journal of Computers & Technology, 2010, 4(2): 50-58. [16]BUYYA R, YEO C S, VENUGOPAL S, et al. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems, 2009, 25(6): 599-616. [17]罗军舟, 金嘉晖, 宋爱波, 等. 云计算: 体系架构与关键技术[J]. 通信学报, 2011, 32(7): 3-21. LUO Junzhou, JIN Jiahui, SONG Aibo, et al. Cloud computing: Architecture and key technologies[J]. Transactions of Communications, 2011, 32(7): 3-21. [18]SUBASHINI S, KAVITHA V. A survey on security issues in service delivery models of cloud computing[J]. Journal of Network & Computer Applications, 2011, 34(1): 1-11. [19]BELOGLAZOV A, ABAWAJY J, BUYYA R. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing[J]. Future Generation Computer Systems, 2012, 28(5): 755-768. [20]温锐松, 石友康. 基于云计算的电子政务公共平台顶层设计的研究与探索[J]. 电信网技术, 2014, 2: 26-34. WEN Ruisong, SHI Youkang. Research and exploration of top-level design of electronic government common platform based on cloud computing[J]. Telecommunications Network Technology, 2014, 2: 26-34. [21]BONOMI F, MILITO R, ZHU J, et al. Fog computing and its role in the internet of things[C]//Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. Helsinki, Finland: ACM, 2012: 13-16. [22]STOJMENOVIC I, WEN S. The fog computing paradigm: Scenarios and security issues[C]//2014 Federated Conference on Computer Science and Information Systems. Warsaw, Poland: IEEE, 2014: 1-8. [23]殷康. 从云计算到雾计算[J]. 高科技与产业化, 2014, 10(7): 76-79. YIN Kang. From cloud computing to fog calculation[J]. High Tech and Industrialization, 2014, 10(7): 76-79. [24]YI S, LI C, LI Q. A survey of fog computing: Concepts, applications and issues[C]//The Workshop on Mobile Big Data. Hangzhou: ACM, 2015: 37-42. [25]HE S, DONG M, OTA K, et al. Software-defined efficient service reconstruction in fog using content awareness and weighted graph[C]//2017 IEEE Global Communications Conference. Singapore: IEEE, 2017: 1-6. [26]SHI W, CAO J, ZHANG Q, et al. Edge computing: Vision and challenges[J]. IEEE Internet of Things Journal, 2016, 3(5): 637-646. [27]WOOD T, RAMAKRISHNAN K K, HWANG J, et al. Toward a software-based network: Integrating software defined networking and network function virtualization [J]. IEEE Network, 2015, 29(3): 36-41. [28]BOCCARDI F, HEATH R W, LOZANO A, et al. Five disruptive technology directions for 5G[J]. IEEE Communications Magazine, 2014, 52(2): 74-80. [29]OSSEIRAN A, BOCCARDI F, BRAUN V, et al. Scenarios for 5G mobile and wireless communications: The vision of the METIS project[J]. Communications Magazine IEEE, 2014, 52(5): 26-35. [30]WANG C X, HAIDER F, GAO X, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. Journal of Chongqing University of Posts & Telecommunications, 2014, 52(2): 122-130. [31]李福昌. 5G技术在4G网络中应用的前景探讨[J]. 通信世界, 2017, 13: 50-52. LI Fuchang. Discussion on the application of 5G technology in 4G network[J]. Communications, 2017, 13: 50-52. [32]欧阳秋梅, 吴超. 大数据与传统安全统计数据的比较及其应用展望[J]. 中国安全科学学报, 2016, 26(3): 1-7. OUYANG Qiumei, WU Chao. Comparison of big data and traditional security statistics and its application prospects[J]. China Safety Science Journal, 2016, 26(3): 1-7. [33]林龙成, 陈波, 郭向民. 传统网络安全防御面临的新威胁: APT攻击[J]. 信息安全与技术, 2013, 4(3): 20-25. LIN Longcheng, CHEN Bo, GUO Xiangmin. A new threat to traditional network security defense: APT attack[J]. Information Security & Technology, 2013, 4(3): 20-25. [34]栾庆林, 卢辉斌. 自适应遗传算法优化神经网络的入侵检测研究[J]. 计算机工程与设计, 2008, 29(12): 3022-3025. LUAN Qinglin, LU Huibin. Research of intrusion detection based on neural network optimized by adaptive genetic algorithm[J]. Computer Engineering and Design, 2008, 29(12): 3022-3025. [35]DATTA A, FRANKLIN J, GARG D, et al. A logic of secure systems and its application to trusted computing[C]//30th IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2009: 221-236. [36]郭瑞. 深度动态防御应对APT攻击[J]. 信息安全与技术, 2014, 9: 67-69. GUO Rui. Deep dynamic defense against APT attacks[J]. Information Security and Technology, 2014, 9: 67-69. [37]ROMEIS C, JAEGER J. Dynamic protection security assessment, a technique for blackout prevention[C]//2013 IEEE Grenoble Conference. Grenoble, France: IEEE, 2013: 1-6. [38]席荣荣, 云晓春, 金舒原, 等. 网络安全态势感知研究综述[J]. 计算机应用, 2012, 32(1): 1-4. XI Rongrong, YUN Xiaochun, JIN Shuyuan, et al. Review of network security situational awareness research[J]. Journal of Computer Applications, 2012, 32(1): 1-4. [39]贾焰, 王晓伟, 韩伟红, 等. YHSSAS: 面向大规模网络的安全态势感知系统[J]. 计算机科学, 2011, 38(2): 4-8. JIA Yan, WANG Xiaowei, HAN Weihong, et al. YHSSAS: Security situation awareness system for large-scale networks[J]. Computer Science, 2011, 38(2): 4-8. [40]张勇, 谭小彬, 崔孝林, 等. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011, 22(3): 495-508. ZHANG Yong, TAN Xiaobin, CUI Xiaolin, et al. Network security situational awareness method based on Markov game model[J]. Journal of Software, 2011, 22(3): 495-508.
Options
文章导航

/