首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 78 毫秒
1.
在分布式应用中,难以在不损害用户隐私的情况下,一次性获取群体的规模与成员身份,而传统公钥加密机制由于需用接收群体每个成员的公钥加密后再分发,所以必须获取接收群体中每个成员的身份。针对这一矛盾,论文给出了一种基于CP-ABE(Ciphertext-Policy Attribute-Based Encryption,基于密文策略的属性加密体制)的访问控制系统的设计与实现方案。由于CP-ABE具有广播式的、授权人通过满足某些条件就能确定的特点,使本方案能够在保证访问控制安全性与用户隐私的前提下,对共享数据进行细粒度的访问控制,降低了共享处理开销和加密次数。通过笔者单位所开发的两套系统的实际应用,进一步证明本方案的正确性与优越性。  相似文献   

2.
对于日益增长的互联网应用,隐私保护越来越重要。目前,用于隐私保护的框架主要有P3P(Platform for Privacy Preferences),EPAL(Enterprise Privacy Authorization Language),XACML(eXtensible Access Control Mark...  相似文献   

3.
针对云计算环境下的安全性和隐私性问题,在CP-ABE的基础上提出MAH-ABE(Multiple and Hierarchical Attribute Based Encryption)访问控制模型,划分了公共领域和私人领域,私人领域采用CP,ABE密文访问控制,公共领域采用等级多信任机构来管理属性和密钥,减少了管理复杂度.同时,该模型引入失效时间属性来执行属性更新操作.最后给出模型的安全性证明和仿真,表明该模型是高效灵活,细粒度并且安全的.  相似文献   

4.
针对传统的访问控制方案无法在云计算环境下保护用户的属性隐私,提出了具有隐私保护的云存储访问控制方案。采用混合加密体制实现了数据的机密性,即利用对称密钥加密明文数据,再利用公钥密码体制对对称密钥进行加密。在新的访问控制方案中,公钥加密采用了匿名的密文策略下基于属性的加密技术。安全性分析表明,新方案在保护用户属性隐私的同时,达到了选择明文安全性,可抵抗恶意用户及云存储服务器的合谋攻击。  相似文献   

5.
基于CP-ABE算法的云存储数据访问控制   总被引:5,自引:0,他引:5  
孙国梓  董宇 《通信学报》2011,32(7):146-152
针对云存储服务网络特性和数据共享特性安全问题,提出一种基于CP-ABE算法的密文访问控制机制。从访问权限控制及访问控制体系结构2个方面对上述访问控制机制进行研究。给出相应的安全算法数据结构,并对其进行了仿真和性能分析。该安全机制在服务提供商不可信的前提下,保证在开放环境下云存储系统中数据的安全性,并通过属性管理降低权限管理的复杂度。  相似文献   

6.
LBS随移动互联网的发展逐步进入人们的日常生活。文章针对位置隐私保护这一问题,介绍了位置隐私保护方案的系统结构,从4个不同的技术方向研究了位置隐私保护方案,总结了现有的位置隐私保护方案,并对未来的研究方向进行了展望。  相似文献   

7.
唐瑞鹏 《电子设计工程》2022,30(3):185-188,193
目前设计的电力监控数据访问控制系统控制耗时过长,导致控制过程十分复杂.为了解决上述问题,基于CP-ABE算法设计了一种新的电力监控数据访问控制系统.系统硬件主要由高速缓冲存储器、MicroBlaze软核处理器、以太网媒体访问控制器、中断控制器4部分组成.利用CP-ABE算法设计了数据存储程序和数据访问程序.实验结果表明...  相似文献   

8.
针对云计算技术分布式特点,采用基于用户身份的公开加密法(IBE),同时结合秘密共享策略,共同构建了用户隐私数据安全保护方案,主要应用于非可信任的云计算服务提供商中,利用门限策略来防止非由于可信任的云计算服务商带来的用户隐私数据泄露等问题,具有一定的理论借鉴价值。  相似文献   

9.
随着计算机技术的迅猛发展以及网络的普及,数据库的规模、范围和深度都在不断的扩大,从而积累了海量的,以不同形式存储的数据资料。使用数据挖掘这一新技术能够从大量的数据中获取有价值的信息。另一方面,隐私问题是一个全世界关注的问题。近来,数据隐私问题已越来越受到政府、媒体和个人客户的广泛关注。  相似文献   

10.
近几年,我国社会经济发展突飞猛进,新兴科技不断涌现,信息通信技术在民众生活和社会生产中得到了较为广泛的应用,为民众提供了极大的便利,促进了民众生活质量的提升。但值得注意的是,由于相关制度不够健全、民众网络安全意识薄弱等原因,信息通信技术时代下民众隐私泄露问题频出,对民众带来了极大的困扰,造成了一定的损失,不利于社会经济的长久稳定发展。文章从隐私及隐私权的改进入手,对信息通信技术时代隐私保护问题进行了详细的阐述,并提出了一些关于隐私保护的建议,以期能够为相关人员开展工作提供参考。  相似文献   

11.
In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.  相似文献   

12.
This study examines how organizations in Malaysia frame their privacy policy notice to comply with the Personal Data Protection Act (PDPA, 2010) and if these organizations differ in their level of compliance and the readability of their privacy notices. We collected the online privacy polices of 306 organizations from 12 sectors to assess their readability and compliance with PDPA requirements. The results show that private-owned organizations have higher compliance level compared to public-owned organizations. Sectors that hold more personal sensitive data obtain higher compliance scores. Non-governmental organizations demonstrate higher compliance level compared to government-owned organizations. Despite differences in the compliance scores, most organizations fail to meet the requirements of the PDPA. Our study also reveals that readability has a negative correlation with the compliance score because simple and shorter version of the privacy policies often lack detailed information. Our findings provide valuable insights into organizations’ privacy policy compliance across different sectors in Malaysia. Specifically, the Malaysian authority should implement more effective mechanisms to enforce the compliance of the PDPA. Organizations should also take corrective actions to improve the compliance scores of their online privacy policies.  相似文献   

13.
To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing operation in traditional CP-ABE was replaced with the relatively lightweight scalar multiplication,thus the overall computation overhead was reduced.And OBDD was used as the access structure of CP-ABE,which can not only represent any Boolean expression about attributes,but also support both positive and negative attributes.The length of the key was independent of the number of attributes and the length of the ciphertext was only related to the number of valid paths in the access policy.The security and performance analysis show that the scheme can resist chosen plaintext attack under the decisional Diffie-Hellman (DDH) assumption,and the computation efficiency can meet the practical application requirements of Internet of things.  相似文献   

14.
This meta-analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective measures. A total of 166 studies from 34 countries (n = 75,269) were included in the analysis. In line with the premise of privacy paradox, privacy concerns did not predict SNS use. However, users concerned about privacy were less likely to use online services and share information and were more likely to utilize privacy protective measures. Except for information sharing, the relationships were comparable for intentions and behavior. Analyses also confirm the role that privacy literacy plays in enhancing use of privacy protective measures. The findings can be generalized across gender, cultural orientation, and national legal systems.  相似文献   

15.
With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level.  相似文献   

16.
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox.Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user’s decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed.  相似文献   

17.
郁滨  张顺 《通信学报》2011,(9):116-122
通过对蓝牙位置隐私攻击机制和现有保护方案不足的分析,建立了蓝牙地址分级模型,依据此模型设计了蓝牙位置隐私保护方案,与现有方案相比,该协议不仅可以抵抗针对蓝牙位置隐私的窃听攻击、重放攻击、跳频序列攻击、会话地址跟踪攻击、字典攻击和中间人攻击,同时具有较小的计算量和存储需求.  相似文献   

18.
郭威  周学广  瞿成勤  罗芳  纪祥君 《通信学报》2015,36(Z1):250-258
属性基加密机制(ABE, attribute-based encryption)能够细粒度地实现敏感数据的访问控制以及一对多保密通信。代理重加密技术能够实现跨域数据密文的转换。针对舰艇编队一对多跨域指挥和舰艇随遇接入的实际需求,在ABE机制和代理重加密技术的基础上,提出了一种基于密文策略(CP, cipher policy)的属性基加密机制(CP-ABE)的编队跨域通信方案,给出了具体案例,进行了安全性分析。分析表明该方案能够满足编队内一对多通信和舰艇跨域的通信安全需求,并同时满足了舰艇随遇接入的需求。  相似文献   

19.
To solve the problem of security and efficiency of anonymous authentication in the vehicle Ad-hoc network(VANET), a conditional privacy protection authentication scheme for vehicular networks is proposed based on bilinear pairings. In this scheme, the tamper-proof device in the roadside unit (RSU) is used to complete the message signature and authentication process together with the vehicle, which makes it more secure to communicate between RSU and trusted authority (TA) and faster to update system parameters and revoke the vehicle. And this is also cheaper than installing tamper-proof devices in each vehicle unit. Moreover, the scheme provide provable security proof under random oracle model (ROM), which shows that the proposed scheme can meet the security requirements such as conditional privacy, unforgeability, traceability etc. And the results of simulation experiment demonstrate that this scheme not only of achieves high efficiency, but also has low message loss rate.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号