Next Article in Journal
Correlation Analysis of APT Attack Organizations Based on Knowledge Graphs
Previous Article in Journal
An Adaptive Switching Algorithm for Element Resource Scheduling in Digital Array Radars Based on an Improved Ant Colony Optimization
Previous Article in Special Issue
Blockchain-Driven Smart Contracts for Advanced Authorization and Authentication in Cloud Security
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

A Sensitive Information Masking-Based Data Security Auditing Method for Chinese Linux Operating System

1
School of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou 450000, China
2
Beijing Shenzhou Aerospace Software Technology Co., Ltd., Beijing 100000, China
*
Author to whom correspondence should be addressed.
Electronics 2026, 15(1), 86; https://doi.org/10.3390/electronics15010086
Submission received: 31 October 2025 / Revised: 13 December 2025 / Accepted: 19 December 2025 / Published: 24 December 2025

Abstract

With the rapid development of information technology and the deepening of digitalization, operating systems are increasingly applied in critical information infrastructure, making data security issues particularly important. Traditional cloud storage auditing models based on third-party auditing authorities (TPA) face trust risks and potential data leakage during data integrity verification, which makes them inadequate to meet the dual requirements of high security and local controllability in the current information technology environment. To address this, this paper proposes a system-wide data security auditing method for the Chinese Linux operating system, constructing a lightweight and localized framework for sensitive information protection and auditing. By dynamically intercepting system calls and performing real-time content analysis, the method achieves accurate identification and visual masking of sensitive information, while generating corresponding audit logs. To overcome the efficiency bottleneck of traditional pattern matching in high-concurrency environments, this paper introduces a Chinese Aho-Corasick (AC) automaton-based character matching algorithm using a hash table to enhance the rapid retrieval capability of sensitive information. Experimental results demonstrate that the proposed method not only ensures controllable and auditable sensitive information but also maintains low system overhead and good adaptability, thereby providing a feasible technical path and implementation scheme for data security.
Keywords: system security; data security; auditing; privacy system security; data security; auditing; privacy

Share and Cite

MDPI and ACS Style

Ma, W.; Guo, H.; Xia, A.; Mao, X. A Sensitive Information Masking-Based Data Security Auditing Method for Chinese Linux Operating System. Electronics 2026, 15, 86. https://doi.org/10.3390/electronics15010086

AMA Style

Ma W, Guo H, Xia A, Mao X. A Sensitive Information Masking-Based Data Security Auditing Method for Chinese Linux Operating System. Electronics. 2026; 15(1):86. https://doi.org/10.3390/electronics15010086

Chicago/Turabian Style

Ma, Wei, Haolong Guo, Angran Xia, and Xuegang Mao. 2026. "A Sensitive Information Masking-Based Data Security Auditing Method for Chinese Linux Operating System" Electronics 15, no. 1: 86. https://doi.org/10.3390/electronics15010086

APA Style

Ma, W., Guo, H., Xia, A., & Mao, X. (2026). A Sensitive Information Masking-Based Data Security Auditing Method for Chinese Linux Operating System. Electronics, 15(1), 86. https://doi.org/10.3390/electronics15010086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop