基于身份加密的分布式在線社會(huì)網(wǎng)絡(luò)隱私保護(hù)方法研究
[Abstract]:In recent years, distributed online social network (DOSNs (Distributed Online Social Networks) has attracted much attention as a new online social network structure. To some extent, it overcomes the shortcomings of centralized management, but in the distributed online social network, the privacy information of users is dispersive, which leads to the privacy information more easily leaked. This paper focuses on the design of privacy protection scheme in distributed online social network, which has theoretical significance and practical value. In order to solve the problem of secure encryption in the absence of secure channels, this paper improves the ID-based encryption scheme, and proposes an ID-based online / offline scheme for distributed online social networks. Thus reducing the network burden and calculation. This paper analyzes the secret sharing SS (SecretSharing) scheme based on identity encryption IBE (Identity-based Encryption). A secret sharing online / offline privacy protection scheme based on KPA (Key Privacy Authority) and PC (Privacy Chum) is designed for the distributed online social network based on identity encryption. In this scheme, neither the key privacy agency nor the privacy confidant can obtain the user key by imitating the users in the network. In order to ensure the reliability of PC, this paper uses Byzantine fault-tolerant protocol BFT (Byzantine faulttolerance) to verify its reliability. The main idea of the new scheme is to divide the privacy protection scheme into two phases: offline and online. In the off-line phase, the user identity and plaintext are not required. The complex calculation is completed by KPA in advance to form an off-line ciphertext. After obtaining the clear text and the user identity in the online stage, the plaintext can be encrypted and the key can be published only by simple integer multiplication. This greatly reduces the network load and saves time and resources. This paper not only gives the implementation of two privacy protection schemes, but also simulates the scheme, and analyzes the simulation results in detail. The simulation results show that the proposed scheme is efficient and feasible under the premise of guaranteeing network security and can support large-scale online social networks.
【學(xué)位授予單位】:中南民族大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 田彥偉;陳寶鳳;;基于生物特征的身份加密及其安全性分析[J];安陽(yáng)工學(xué)院學(xué)報(bào);2008年04期
2 梁潘;馮朝勝;;基于分層身份加密的教務(wù)系統(tǒng)信息安全解決方案[J];桂林電子科技大學(xué)學(xué)報(bào);2010年03期
3 顧永軍;齊敬敬;王雅坤;;基于身份加密的匿名漫游無(wú)線認(rèn)證協(xié)議[J];計(jì)算機(jī)工程;2010年17期
4 張曉敏;趙永斌;劉克智;;雙系統(tǒng)加密技術(shù)下帶通配符的基于身份加密方案[J];計(jì)算機(jī)應(yīng)用研究;2012年05期
5 楊斌;熊選東;蘇克軍;;基于仲裁者的身份加密方案研究[J];計(jì)算機(jī)應(yīng)用;2008年11期
6 陳曦;馬建峰;;基于身份加密的機(jī)會(huì)網(wǎng)絡(luò)安全路由架構(gòu)[J];計(jì)算機(jī)研究與發(fā)展;2011年08期
7 趙慶;王斌;張m蟦\;;基于身份加密體制的無(wú)線網(wǎng)絡(luò)認(rèn)證授權(quán)模型[J];揚(yáng)州大學(xué)學(xué)報(bào)(自然科學(xué)版);2012年04期
8 黃勝;蔣外文;;網(wǎng)格中基于分層的身份加密系統(tǒng)研究[J];計(jì)算機(jī)應(yīng)用;2008年05期
9 石艷榮;賀永強(qiáng);;PKI和基于身份加密的比較[J];微計(jì)算機(jī)信息;2008年03期
10 彭海濤,史清華;基于身份加密的安全電子郵件系統(tǒng)[J];計(jì)算機(jī)工程;2005年13期
相關(guān)碩士學(xué)位論文 前6條
1 彭海濤;基于身份加密的安全電子郵件系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)[D];山東大學(xué);2005年
2 王金玲;基于身份的加密系統(tǒng)中PKG的實(shí)現(xiàn)及安全性分析[D];吉林大學(xué);2008年
3 陳洋榮;基于身份加密的分布式在線社會(huì)網(wǎng)絡(luò)隱私保護(hù)方法研究[D];中南民族大學(xué);2014年
4 白剛;基于身份加密應(yīng)用的安全通信研究[D];吉林大學(xué);2010年
5 戴素芬;身份加密方法應(yīng)用于組合文檔安全刪除的研究[D];福建師范大學(xué);2015年
6 趙旭東;一種基于身份加密的安全電子郵件方案研究與實(shí)現(xiàn)[D];西南交通大學(xué);2010年
本文編號(hào):2248379
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2248379.html