Previous Article in Journal
Involutive Symmetries and Langlands Duality in Moduli Spaces of Principal G-Bundles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

An Intelligent Risk Assessment Methodology for the Full Lifecycle Security of Data

1
School of Cyber Security, Northwest Polytechnical University, Xi’an 710072, China
2
Research & Development Institute of Northwest Polytechnical University, Shenzhen 518057, China
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(6), 820; https://doi.org/10.3390/sym17060820 (registering DOI)
Submission received: 29 April 2025 / Revised: 20 May 2025 / Accepted: 22 May 2025 / Published: 24 May 2025

Abstract

With the development of Internet of Things and artificial intelligence, large amounts of data exist in our daily life. In view of the limitations in current data security risk assessment research, this paper puts forward an intelligent data security risk assessment method based on an attention mechanism that spans the entire data lifecycle. The initial step involves formulating a security-risk evaluation index that spans all phases of the data lifecycle. By constructing a symmetric mapping of subjective and objective weights using the Analytic Hierarchy Process (AHP) and the Entropy Weight Method (EWM), both expert judgment and objective data are comprehensively considered to scientifically determine the weights of various risk indicators, thereby enhancing the rationality and objectivity of the assessment framework. Next, the fuzzy comprehensive evaluation method is used to label the risk level of the data, providing an essential basis for subsequent model training. Finally, leveraging the structurally symmetric attention mechanism, we design and train a neural network model for data security risk assessment, enabling automatic capture of complex features and nonlinear correlations within the data for more precise and accurate risk evaluations. The proposed risk assessment approach embodies symmetry in both the determination of indicator weights and the design of the neural network architecture. Experimental results indicate that our proposed method achieves high assessment accuracy and stability, effectively adapts to data security risk environments, and offers a feasible intelligent decision aid tool for data security management.
Keywords: data security; risk assessment; attention mechanism; neural networks data security; risk assessment; attention mechanism; neural networks

Share and Cite

MDPI and ACS Style

Liu, J.; Han, T.; Zhao, J.; Mu, D.; Liu, H.; Tang, B. An Intelligent Risk Assessment Methodology for the Full Lifecycle Security of Data. Symmetry 2025, 17, 820. https://doi.org/10.3390/sym17060820

AMA Style

Liu J, Han T, Zhao J, Mu D, Liu H, Tang B. An Intelligent Risk Assessment Methodology for the Full Lifecycle Security of Data. Symmetry. 2025; 17(6):820. https://doi.org/10.3390/sym17060820

Chicago/Turabian Style

Liu, Jinhui, Tianyi Han, Jingjing Zhao, Dejun Mu, Huan Liu, and Bo Tang. 2025. "An Intelligent Risk Assessment Methodology for the Full Lifecycle Security of Data" Symmetry 17, no. 6: 820. https://doi.org/10.3390/sym17060820

APA Style

Liu, J., Han, T., Zhao, J., Mu, D., Liu, H., & Tang, B. (2025). An Intelligent Risk Assessment Methodology for the Full Lifecycle Security of Data. Symmetry, 17(6), 820. https://doi.org/10.3390/sym17060820

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop