移動社交網(wǎng)絡(luò)中一種朋友發(fā)現(xiàn)的隱私安全保護策略
發(fā)布時間:2019-07-22 21:24
【摘要】:在移動社交網(wǎng)絡(luò)中分享用戶特征屬性配置文件能夠迅速找到與用戶特征屬性相同的朋友。然而,配置文件通常包含用戶的敏感隱私信息,如果被惡意攻擊者截獲將有可能造成不可預(yù)計的后果。該文提出一種基于用戶偽身份匿名與哈希值比對認證的雙重握手機制的隱私保護方案,結(jié)合身份權(quán)限認證、單向哈希散列函數(shù)、密鑰協(xié)商等技術(shù)保證惡意攻擊者無法通過身份欺騙、偽造特征屬性、竊聽安全信道等方式獲取用戶配置文件的真實內(nèi)容,從而保證用戶的個人隱私不被泄漏。依靠可信第三方服務(wù)器強大的計算和抗攻擊能力,減輕智能用戶終端計算負擔(dān)和安全風(fēng)險。安全分析和實驗分析表明,該方案更具有隱私性、消息不可抵賴性和可驗證性,比傳統(tǒng)的解決方案更有效。
[Abstract]:Sharing user feature profiles in mobile social networks can quickly find friends with the same user characteristics. However, the configuration file usually contains sensitive privacy information of the user, and if intercepted by a malicious attacker, it may have unpredictable consequences. In this paper, a privacy protection scheme based on user pseudo identity anonymity and hash value comparison authentication is proposed. Combined with identity authority authentication, one-way hash function, key agreement and other techniques, malicious attackers can not obtain the real content of user configuration files through identity spoofing, falsifying feature attributes, eavesdropping security channels and so on, so as to ensure that users' personal privacy is not leaked. Relying on the powerful computing and anti-attack ability of trusted third-party server, the computing burden and security risk of intelligent user terminal are reduced. Security analysis and experimental analysis show that the scheme is more privacy, message non-repudiation and verifiability, and is more effective than the traditional solution.
【作者單位】: 中南大學(xué)信息科學(xué)與工程學(xué)院;湖南科技學(xué)院電子與信息工程學(xué)院;廣州大學(xué)計算機科學(xué)與教育軟件學(xué)院;
【基金】:國家自然科學(xué)基金(61472451,61402543,61272151,61502163) 湖南省教育廳科研項目(2015C0589) 中南大學(xué)中央高;究蒲袠I(yè)務(wù)費專項資金(2016zzts060,2016zzts058)~~
【分類號】:TP309
[Abstract]:Sharing user feature profiles in mobile social networks can quickly find friends with the same user characteristics. However, the configuration file usually contains sensitive privacy information of the user, and if intercepted by a malicious attacker, it may have unpredictable consequences. In this paper, a privacy protection scheme based on user pseudo identity anonymity and hash value comparison authentication is proposed. Combined with identity authority authentication, one-way hash function, key agreement and other techniques, malicious attackers can not obtain the real content of user configuration files through identity spoofing, falsifying feature attributes, eavesdropping security channels and so on, so as to ensure that users' personal privacy is not leaked. Relying on the powerful computing and anti-attack ability of trusted third-party server, the computing burden and security risk of intelligent user terminal are reduced. Security analysis and experimental analysis show that the scheme is more privacy, message non-repudiation and verifiability, and is more effective than the traditional solution.
【作者單位】: 中南大學(xué)信息科學(xué)與工程學(xué)院;湖南科技學(xué)院電子與信息工程學(xué)院;廣州大學(xué)計算機科學(xué)與教育軟件學(xué)院;
【基金】:國家自然科學(xué)基金(61472451,61402543,61272151,61502163) 湖南省教育廳科研項目(2015C0589) 中南大學(xué)中央高;究蒲袠I(yè)務(wù)費專項資金(2016zzts060,2016zzts058)~~
【分類號】:TP309
【相似文獻】
相關(guān)期刊論文 前10條
1 ;美國:印刷企業(yè)青睞社交網(wǎng)絡(luò)營銷新方式[J];中國包裝工業(yè);2010年Z1期
2 樓向英;高春玲;;移動社交網(wǎng)絡(luò)在圖書館中的應(yīng)用初探[J];圖書館雜志;2013年12期
3 勞倫·考克斯;;請在工作時更新你的狀態(tài)[J];科技創(chuàng)業(yè);2011年05期
4 吳炳;鄭淵;;基于社交禮品網(wǎng)站淺談社交網(wǎng)絡(luò)營銷[J];北方經(jīng)貿(mào);2014年03期
5 Puting;;用心聆聽,從點滴做起[J];成功營銷;2011年07期
6 吳勇毅;;大數(shù)據(jù)熱涌背后的冷思考[J];信息化建設(shè);2013年01期
7 于光媚;;社交網(wǎng)絡(luò)成安全“重災(zāi)區(qū)” 用戶需加強自主防護[J];通信世界;2014年13期
8 ;英國 初創(chuàng)企業(yè)如何應(yīng)用社交網(wǎng)絡(luò)營銷[J];中國制衣;2013年08期
9 吳文昊;范春曉;;一種基于社交網(wǎng)絡(luò)模式的公共交通服務(wù)[J];軟件;2012年12期
10 路榮;張e,
本文編號:2517905
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2517905.html
最近更新
教材專著