TY - GEN
T1 - Research on Security Assessment of Cross Border Data Flow
AU - Na, Wang
AU - Gaofei, Wu
AU - Qiuling, Yue
AU - Jinglu, Hu
AU - Zhang, Yuqing
N1 - Publisher Copyright:
© 2022, Springer Nature Singapore Pte Ltd.
PY - 2022
Y1 - 2022
N2 - At present, the trend of cross-border data flow is inevitable. Therefore, as the liquidity demand for cross-border data increases, the issues related to national security and the protection of personal data are gradually exposed. Due to the demand and cost problems, the domestic risk assessment only stays in the business scope of the company or enterprise. Even if the data processing process involves the data subject and data controller, the evaluation object is only for the data controller. In order to avoid risks, enterprises will conduct multiple risk assessments on data during the business execution cycle. Therefore, the domestic risk assessment model has the characteristics of a single process and multiple cycles. However, there are differences in use, scope, and characteristics between cross-border data risk assessment and domestic risk assessment. That’s why the general evaluation model can’t be directly applied to the cross-border process. Therefore, the purpose of this paper is to propose a multi process and multi cycle data security risk assessment model applicable to cross-border data. The two processes of domestic risk assessment and foreign cross-border process assessment are integrated in this article. Therefore, the analysis of risk factors is also based on these two perspectives. In addition, common risk assessment methods such as comprehensive analytic hierarchy process will be used to assess and describe the risk level of data cross-border operations. Then, the risk threshold is calculated, and the wavelet neural network is used to simulate the evaluation process. Ultimately, the prospect of cross-border data can provide references for the development and research of cross-border data in the future.
AB - At present, the trend of cross-border data flow is inevitable. Therefore, as the liquidity demand for cross-border data increases, the issues related to national security and the protection of personal data are gradually exposed. Due to the demand and cost problems, the domestic risk assessment only stays in the business scope of the company or enterprise. Even if the data processing process involves the data subject and data controller, the evaluation object is only for the data controller. In order to avoid risks, enterprises will conduct multiple risk assessments on data during the business execution cycle. Therefore, the domestic risk assessment model has the characteristics of a single process and multiple cycles. However, there are differences in use, scope, and characteristics between cross-border data risk assessment and domestic risk assessment. That’s why the general evaluation model can’t be directly applied to the cross-border process. Therefore, the purpose of this paper is to propose a multi process and multi cycle data security risk assessment model applicable to cross-border data. The two processes of domestic risk assessment and foreign cross-border process assessment are integrated in this article. Therefore, the analysis of risk factors is also based on these two perspectives. In addition, common risk assessment methods such as comprehensive analytic hierarchy process will be used to assess and describe the risk level of data cross-border operations. Then, the risk threshold is calculated, and the wavelet neural network is used to simulate the evaluation process. Ultimately, the prospect of cross-border data can provide references for the development and research of cross-border data in the future.
KW - BP neural network
KW - Cross-border data
KW - Risk assessment
KW - Wavelet theory
UR - http://www.scopus.com/inward/record.url?scp=85126232065&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85126232065&partnerID=8YFLogxK
U2 - 10.1007/978-981-19-0523-0_21
DO - 10.1007/978-981-19-0523-0_21
M3 - Conference contribution
AN - SCOPUS:85126232065
SN - 9789811905223
T3 - Communications in Computer and Information Science
SP - 327
EP - 341
BT - Frontiers in Cyber Security - 4th International Conference, FCS 2021, Revised Selected Papers
A2 - Cao, Chunjie
A2 - Zhang, Yuqing
A2 - Hong, Yuan
A2 - Wang, Ding
PB - Springer Science and Business Media Deutschland GmbH
T2 - 4th International Conference on Frontiers in Cyber Security, FCS 2021
Y2 - 17 December 2021 through 19 December 2021
ER -