Railway passenger information security and big data applicationmanagement process
-
摘要: 为解决铁路旅客信息使用过程中的旅客信息安全问题,提出并设计了基于铁路客票系统的旅客信息保护安全应用“中铁客户码”,以及一套规范且行之有效的铁路旅客信息数据保护和应用流程体系,同时,提出了铁路旅客大数据应用创新方法步骤,最大程度地确保铁路科研人员在使用旅客大数据过程中旅客隐私信息的安全性,为进一步完善智能铁路系统工程建设打下坚实的基础。通过研究并解决旅客大数据使用过程中的安全性问题,有助于积极稳妥地提升铁路旅客大数据应用的服务能力,实现铁路运营企业战略转型和业务创新的同时,有效避免探索创新过程中可能遇到的舆论和法律风险。Abstract: In order to solve the problem of passenger information security in the process of using railway passengerinformation, this article put forward and designed a "China Railway Customer Code" of passenger information protectionand security application based on railway ticketing and reservation system, as well as a set of standardized and effectivedata protection and application process system for railway passenger information. By using these means, the security ofpassenger privacy information in the process of using passenger big data for railway researchers was ensured to the greatestextent, which laid a solid foundation for further improving the construction of intelligent railway system. By researchingand solving the security problems in the process of using passenger big data, it was helpful to actively and steadily improvethe service ability of railway passenger big data application, realize the strategic transformation and business innovation ofrailway operation enterprises, and effectively avoid the possible public opinion and legal risks in the process of exploring andinnovating.
-
[1] 苑雪.大数据时代的隐私权保护[J].山东农业工程学院学报, 2014, 31(3):98-100. [2] 程学旗,靳小龙,王元卓,等.大数据系统和分析技术综述[J].软件学报, 2014, 25(9):1889-1908. [3] 蔡恒.网络信息隐私权保护中的利益平衡问题研究[J].华北电力大学学报(社会科学版), 2005, 1(3):68-71. [4] 周亮谨.基于区块链和分布式数据库的铁路旅客隐私保护技术研究[D].北京:中国铁道科学研究院集团有限公司,2018. [5] 张衠.大数据时代的隐私保护与权益平衡[J].信息安全与通信保密, 2017(9):7-7. [6] 刘雅辉,张铁赢,靳小龙,等.大数据时代的个人隐私保护[J].计算机研究与发展, 2015, 52(1):229-247. [7] 王菲.互联网精准营销的隐私权保护:法律、市场、技术[J].国际新闻界, 2011(12):90-95. [8] 张德栋,祝咏升,司群.大数据环境下信息安全分析[J].铁路计算机应用, 2015, 24(2):76-78. [9] 史天运.铁路行业信息安全管理面临的挑战及对策探讨[J].铁路计算机应用, 2015, 24(2):1-4. [10] Li B, He J, Huang J, et al. A survey on image stega-nographyand steganalysis[J]. Department of Computing, 2011, 2(3):288-289.
点击查看大图