Font Size: a A A

The Study On Self-destruction Of Marine Environmental Monitoring Data

Posted on:2015-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:J J MaFull Text:PDF
GTID:2180330422475820Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the first session of the Twelfth National People’s Congress which was held inBeijing, Premier Wen Jiabao on behalf of The State Council published tenthgovernment work report. The report summarizes the work of the government over thepast five years, and puts forward some suggestions on this year’s work. The contentssuch as “Strengthening comprehensive marine management, development of marineeconomy, improve the development of marine resources, the protection of the marineecological environment, safeguard national maritime rights and interests......”[1]and soon,won the delegates and members of applause. Sea-related content is written into thegovernment work report, and has repeatedly stressed that strengthening comprehensivemarine management, which make everybody feel exciting inspired, believe that themarine industry will develop faster and better.In nowadays, information technology developed with a fast speed, and constantlyimprovement of ocean monitoring techniques, the country is gradually increased theconstruction of marine areas: Integration of data and application in National908digitalocean system; vigorously develop and improve three-dimensional marine environmentmonitoring technology, especially far-reaching sea monitoring techniques; developmentof marine cutting-edge technology, establish base of marine high-tech research;realization the strategic of marine technology transfer from shallow sea to deep sea[2].Marine information technology is a double-edged sword. It creates favorableconditions for the rapid development of marine industry, while inevitably brings theinformation security issues. With the gradual expansion of information securityincidents, more and more people gradually focus on how to maintain the confidentialityand integrity of ocean data information. Marine environmental monitoring dataelements belong to the national secret information, within the scope of protection ofnational information system. Currently, the national standards of confidentiality[3]“involving state secrets protection technology information system gradingrequirements” and “involving state secrets protection and management informationsystems classification norms”[4]which are executing, from physical part, supportsystems, network parts, applications and management systems five aspects to protect the involving state secrets information, highlight the importance of data security. Disclosureor loss of classified data will bring unpredictable losses to the relevant researchdepartment and may even be harmful to the interests of the state. Therefore, the safetyof marine environmental monitoring data for in-depth study of the elements is essential."Research on key technology of offshore environmental automatic monitoring anddisaster warning" is the key project of Shanghai Science and Technology Commission,the content of this paper is a sub-project of the project. From the need to furtherstrengthen the security of the marine environmental monitoring data elements, the papercarried a marine environmental monitoring data self-destruct technology research.This paper introduces the importance of ocean monitoring networking security,according to basic requirements of the information system security protection,conducted a safety study of physical, network, data areas. Marine environmentalmonitoring data elements belong to the national secret information, is crucial to theprotection of confidential information, the focus of this paper is to study the security ofthe marine environment monitoring elements data in buoy system.Give a comprehensive interpretation of the data security in buoy system from theoverall, including the buoy system architecture and functional design. Used for thestudy of data self-destruction of the marine environment is divided into two key points:out of control detection and data destruction. Out of control detection technique is usedto determine whether the data in the buoy system is in the threatened state, datadestruction is the data protection measures according to the conclusion of out of controldetection determination, the two complement each other together to maintain thesecurity of secret data.In the example application, use BP neural network to establish the out of controldetection model to train and evaluate the safety of the system. On the basis of the largenumbers of relevant references and marine experts in the field, selected the basis indexand evaluation index were used as the input layer and output layer of the out controldetection model. This sample data from buoy data center NDBC, in order to improvethe accuracy of the network model, prior to conducting training data preprocessing,remove burrs data. Repeated training sample data, until the out of control detectionnetwork model to detect satisfactory.Using the out of control detection model which was trained to simulation and backsentence, the simulation results show that the use of BP neural network to predict thesafety of the buoy system is feasible, as long as the various factors that affect thedetermination of the safety of buoy system, and there is enough accurate and reliable sample data for the network learning and training, can the safety status of the buoy foraccurate and timely prediction.The data security status of buoy system is divided into security, in general, moredangerous, dangerous these four levels, if it is not in a safe state will need to takerelevant measures to protect the data after getting data security risk level assessment ofthe buoy system. In this paper, using the data overwrite combine with high-voltagecircuit, to escort to the safety of ocean environment monitoring data in buoy system, toprevent leakage and loss of data, to maintain the security of secret data, therebysafeguard the country in the field of marine interests.
Keywords/Search Tags:Marine Network, Marine environmental monitoring data elements, Datasecurity, BP neural network, Data overwrite
PDF Full Text Request
Related items