共查询到19条相似文献,搜索用时 78 毫秒
1.
在分布式应用中,难以在不损害用户隐私的情况下,一次性获取群体的规模与成员身份,而传统公钥加密机制由于需用接收群体每个成员的公钥加密后再分发,所以必须获取接收群体中每个成员的身份。针对这一矛盾,论文给出了一种基于CP-ABE(Ciphertext-Policy Attribute-Based Encryption,基于密文策略的属性加密体制)的访问控制系统的设计与实现方案。由于CP-ABE具有广播式的、授权人通过满足某些条件就能确定的特点,使本方案能够在保证访问控制安全性与用户隐私的前提下,对共享数据进行细粒度的访问控制,降低了共享处理开销和加密次数。通过笔者单位所开发的两套系统的实际应用,进一步证明本方案的正确性与优越性。 相似文献
2.
3.
4.
5.
基于CP-ABE算法的云存储数据访问控制 总被引:5,自引:0,他引:5
针对云存储服务网络特性和数据共享特性安全问题,提出一种基于CP-ABE算法的密文访问控制机制。从访问权限控制及访问控制体系结构2个方面对上述访问控制机制进行研究。给出相应的安全算法数据结构,并对其进行了仿真和性能分析。该安全机制在服务提供商不可信的前提下,保证在开放环境下云存储系统中数据的安全性,并通过属性管理降低权限管理的复杂度。 相似文献
6.
7.
目前设计的电力监控数据访问控制系统控制耗时过长,导致控制过程十分复杂.为了解决上述问题,基于CP-ABE算法设计了一种新的电力监控数据访问控制系统.系统硬件主要由高速缓冲存储器、MicroBlaze软核处理器、以太网媒体访问控制器、中断控制器4部分组成.利用CP-ABE算法设计了数据存储程序和数据访问程序.实验结果表明... 相似文献
8.
针对云计算技术分布式特点,采用基于用户身份的公开加密法(IBE),同时结合秘密共享策略,共同构建了用户隐私数据安全保护方案,主要应用于非可信任的云计算服务提供商中,利用门限策略来防止非由于可信任的云计算服务商带来的用户隐私数据泄露等问题,具有一定的理论借鉴价值。 相似文献
9.
10.
11.
In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution. 相似文献
12.
Hui Na Chua Anthony Herbland Siew Fan Wong Younghoon Chang 《Telematics and Informatics》2017,34(4):157-170
This study examines how organizations in Malaysia frame their privacy policy notice to comply with the Personal Data Protection Act (PDPA, 2010) and if these organizations differ in their level of compliance and the readability of their privacy notices. We collected the online privacy polices of 306 organizations from 12 sectors to assess their readability and compliance with PDPA requirements. The results show that private-owned organizations have higher compliance level compared to public-owned organizations. Sectors that hold more personal sensitive data obtain higher compliance scores. Non-governmental organizations demonstrate higher compliance level compared to government-owned organizations. Despite differences in the compliance scores, most organizations fail to meet the requirements of the PDPA. Our study also reveals that readability has a negative correlation with the compliance score because simple and shorter version of the privacy policies often lack detailed information. Our findings provide valuable insights into organizations’ privacy policy compliance across different sectors in Malaysia. Specifically, the Malaysian authority should implement more effective mechanisms to enforce the compliance of the PDPA. Organizations should also take corrective actions to improve the compliance scores of their online privacy policies. 相似文献
13.
To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing operation in traditional CP-ABE was replaced with the relatively lightweight scalar multiplication,thus the overall computation overhead was reduced.And OBDD was used as the access structure of CP-ABE,which can not only represent any Boolean expression about attributes,but also support both positive and negative attributes.The length of the key was independent of the number of attributes and the length of the ciphertext was only related to the number of valid paths in the access policy.The security and performance analysis show that the scheme can resist chosen plaintext attack under the decisional Diffie-Hellman (DDH) assumption,and the computation efficiency can meet the practical application requirements of Internet of things. 相似文献
14.
This meta-analysis investigates privacy concerns and literacy as predictors of use of online services and social network sites (SNSs), sharing information, and adoption of privacy protective measures. A total of 166 studies from 34 countries (n = 75,269) were included in the analysis. In line with the premise of privacy paradox, privacy concerns did not predict SNS use. However, users concerned about privacy were less likely to use online services and share information and were more likely to utilize privacy protective measures. Except for information sharing, the relationships were comparable for intentions and behavior. Analyses also confirm the role that privacy literacy plays in enhancing use of privacy protective measures. The findings can be generalized across gender, cultural orientation, and national legal systems. 相似文献
15.
With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level. 相似文献
16.
Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data. This systematic literature review explores the different theories on the phenomenon known as the privacy paradox.Drawing on a sample of 32 full papers that explore 35 theories in total, we determined that a user’s decision-making process as it pertains to the willingness to divulge privacy information is generally driven by two considerations: (1) risk-benefit evaluation and (2) risk assessment deemed be none or negligible. By classifying in accordance with these two considerations, we have compiled a comprehensive model using all the variables mentioned in the discussed papers. The overall findings of the systematic literature review will investigate the nature of decision-making (rational vs. irrational) and the context in which the privacy paradox takes place, with a special focus on mobile computing. Furthermore, possible solutions and research limitation issues will be discussed. 相似文献
17.
通过对蓝牙位置隐私攻击机制和现有保护方案不足的分析,建立了蓝牙地址分级模型,依据此模型设计了蓝牙位置隐私保护方案,与现有方案相比,该协议不仅可以抵抗针对蓝牙位置隐私的窃听攻击、重放攻击、跳频序列攻击、会话地址跟踪攻击、字典攻击和中间人攻击,同时具有较小的计算量和存储需求. 相似文献
18.
属性基加密机制(ABE, attribute-based encryption)能够细粒度地实现敏感数据的访问控制以及一对多保密通信。代理重加密技术能够实现跨域数据密文的转换。针对舰艇编队一对多跨域指挥和舰艇随遇接入的实际需求,在ABE机制和代理重加密技术的基础上,提出了一种基于密文策略(CP, cipher policy)的属性基加密机制(CP-ABE)的编队跨域通信方案,给出了具体案例,进行了安全性分析。分析表明该方案能够满足编队内一对多通信和舰艇跨域的通信安全需求,并同时满足了舰艇随遇接入的需求。 相似文献
19.
To solve the problem of security and efficiency of anonymous authentication in the vehicle Ad-hoc network(VANET), a conditional privacy protection authentication scheme for vehicular networks is proposed based on bilinear pairings. In this scheme, the tamper-proof device in the roadside unit (RSU) is used to complete the message signature and authentication process together with the vehicle, which makes it more secure to communicate between RSU and trusted authority (TA) and faster to update system parameters and revoke the vehicle. And this is also cheaper than installing tamper-proof devices in each vehicle unit. Moreover, the scheme provide provable security proof under random oracle model (ROM), which shows that the proposed scheme can meet the security requirements such as conditional privacy, unforgeability, traceability etc. And the results of simulation experiment demonstrate that this scheme not only of achieves high efficiency, but also has low message loss rate. 相似文献