用于檢測和預(yù)防數(shù)據(jù)交易中的安全和隱私問題的密碼學(xué)模型
發(fā)布時間:2022-01-06 16:59
在數(shù)據(jù)交易市場中,各種在線應(yīng)用程序(社交網(wǎng)絡(luò))和數(shù)據(jù)庫收集了越來越多的用戶數(shù)據(jù)。在線社交網(wǎng)絡(luò)的應(yīng)用程序可以在全球范圍內(nèi)共享用戶或客戶的數(shù)據(jù)。在共享用戶數(shù)據(jù)期間,它可能涉及到用戶的隱私信息,這是保護(hù)用戶的隱私帶來了挑戰(zhàn)。因此,在數(shù)據(jù)共享期間確保用戶的隱私保護(hù)是有必要的。加密通過使用訪問控制技術(shù)來保護(hù)社交網(wǎng)絡(luò)隱私。在數(shù)據(jù)共享中,隱私保護(hù)方案主要有三種架構(gòu),包括中心化架構(gòu)、半中心化架構(gòu)和去中心化架構(gòu)。中心化體系結(jié)構(gòu):在中心化數(shù)據(jù)共享中,通常對集中式的數(shù)據(jù)使用降維和基于數(shù)據(jù)相似性的表示形式。數(shù)據(jù)保護(hù)要兼顧對未知隱私數(shù)據(jù)處理的效率及隱私性。由于該方法是專門為集中式數(shù)據(jù)而設(shè)計的,因此不能被普遍使用。缺乏這種架構(gòu),單點(diǎn)故障將導(dǎo)致整體數(shù)據(jù)的丟失。隱私中的缺陷是可能導(dǎo)致惡意的攻擊,通過使用復(fù)雜的攻擊和計算方法,這種問題更易發(fā)生。加密形式的數(shù)據(jù)需要使業(yè)務(wù)模型具有可用性并且滿足隱私需求(在數(shù)據(jù)托管的模式中,加密形式的數(shù)據(jù)是有必要的)。半中心化體系結(jié)構(gòu):中心化體系結(jié)構(gòu)和去中心化體系結(jié)構(gòu)之間的中間解決方案是半中心化數(shù)據(jù)共享體系結(jié)構(gòu)(它可兼具兩者的優(yōu)點(diǎn))。該體系結(jié)構(gòu)定義了所需數(shù)據(jù)的關(guān)鍵元素,而平臺的關(guān)鍵模塊旨在實...
【文章來源】:中國科學(xué)技術(shù)大學(xué)安徽省 211工程院校 985工程院校
【文章頁數(shù)】:141 頁
【學(xué)位級別】:博士
【文章目錄】:
Dedication
Acknowledgments
Chapter 1 Introduction
1.1 Introduction
1.2 Trade
1.2.1 Trade costs
1.2.2 Trade execution
1.2.3 Trade order
1.2.4 International trade
1.3 Trader
1.4 Trading
1.5 Data trading entities
1.5.1 Seller
1.5.2 Buyer
1.5.3 Broker
1.6 Data trading
1.6.1 Trading market
1.6.2 Data trading market
1.6.3 Mobile data trading
1.6.4 IoT data trading
1.6.5 Fair data trading
1.7 Digital Supply Chain (DSC-I) data trading
1.7.1 Prepare
1.7.2 Negotiate
1.7.3 Govern
1.8 Privacy of trading system
1.8.1 Confidentiality
1.8.2 Consent
1.8.3 Data protection
1.8.4 Threat model
1.9 Structural organization of the dissertation
1.10 Chapter summary
Chapter 2 Preliminaries
2.1 Introduction
2.2 Privacy preserving of data trading
2.2.1 Challenges
2.2.2 Problem definition
2.2.3 Privacy models
2.2.4 Technical challenges
2.2.5 Threats and attacks
2.3 Security and privacy of data trading
2.3.1 Digital data
2.3.2 Attribute based encryption
2.3.3 Data trading and differential privacy
2.3.4 Confidentiality and integrity
2.4 Miscellaneous techniques
2.5 Chapter summary
Chapter 3 Related Works
3.1 Introduction
3.2 Data trading
3.3 Symmetric and asymmetric data trading
3.4 Pairing-based cryptography and data trading
3.5 Social Networks and Data Trading (SNDT)
3.6 Cryptography and SNDT
3.7 Access strategies and signcryption schemes
3.8 Chapter summary
Chapter 4 The Design of τ-Access Policy and TTP based Signcryption Schemes
4.1 Introduction
4.2 τ-Access Policy: ABE scheme for social network in data trading
4.2.1 Social networking service
4.2.2 Social networks investment
4.2.3 Social networks with ABE
4.2.4 Attribute Based Encryption (ABE)
4.2.5 Our contribution
4.3 TTP based signcryption scheme
4.3.1 Secret key encryption
4.3.2 Signcryption
4.3.3 Our model mechanism
4.3.4 Signcryption and Unsigncryption
4.3.5 Elliptic curve points generation
4.3.6 Keys generation
4.3.7 Algorithmic design of signcryption
4.3.8 Cloud service users
4.3.9 Algorithmic design of unsigncryption
4.3.10 Verification
4.3.11 Correctness
4.4 Chapter summary
Chapter 5 Analysis
5.1 Introduction
5.2 Analysis of τ- Access Policy
5.2.1 ABE practice on social networks
5.2.2 The usage and analysis of τ-access policy
5.2.3 Attacks prevention
5.3 Performance evaluation of τ-access policy
5.4 Security properties
5.4.1 Data confidentiality
5.4.2 Data integrity
5.4.3 Authenticity
5.4.4 Non-repudiation
5.4.5 Un-forgeability
5.5 Analysis of TTP based signcryption scheme
5.6 Performance evaluation
5.7 Security properties
5.8 Chapter summary
Chapter 6 Summary, Open Problems and Future Work
6.1 Introduction
6.2 τ-access policy summary
6.3 TTP based signcryption summary
6.4 Open problems
6.5 Future work
References
Research work conducted during PhD
【參考文獻(xiàn)】:
期刊論文
[1]適用于移動應(yīng)用的口令認(rèn)證多密鑰協(xié)商協(xié)議(英文)[J]. 李文敏,溫巧燕,蘇琦,張華,金正平. 中國通信. 2012(01)
本文編號:3572833
【文章來源】:中國科學(xué)技術(shù)大學(xué)安徽省 211工程院校 985工程院校
【文章頁數(shù)】:141 頁
【學(xué)位級別】:博士
【文章目錄】:
Dedication
Acknowledgments
Chapter 1 Introduction
1.1 Introduction
1.2 Trade
1.2.1 Trade costs
1.2.2 Trade execution
1.2.3 Trade order
1.2.4 International trade
1.3 Trader
1.4 Trading
1.5 Data trading entities
1.5.1 Seller
1.5.2 Buyer
1.5.3 Broker
1.6 Data trading
1.6.1 Trading market
1.6.2 Data trading market
1.6.3 Mobile data trading
1.6.4 IoT data trading
1.6.5 Fair data trading
1.7 Digital Supply Chain (DSC-I) data trading
1.7.1 Prepare
1.7.2 Negotiate
1.7.3 Govern
1.8 Privacy of trading system
1.8.1 Confidentiality
1.8.2 Consent
1.8.3 Data protection
1.8.4 Threat model
1.9 Structural organization of the dissertation
1.10 Chapter summary
Chapter 2 Preliminaries
2.1 Introduction
2.2 Privacy preserving of data trading
2.2.1 Challenges
2.2.2 Problem definition
2.2.3 Privacy models
2.2.4 Technical challenges
2.2.5 Threats and attacks
2.3 Security and privacy of data trading
2.3.1 Digital data
2.3.2 Attribute based encryption
2.3.3 Data trading and differential privacy
2.3.4 Confidentiality and integrity
2.4 Miscellaneous techniques
2.5 Chapter summary
Chapter 3 Related Works
3.1 Introduction
3.2 Data trading
3.3 Symmetric and asymmetric data trading
3.4 Pairing-based cryptography and data trading
3.5 Social Networks and Data Trading (SNDT)
3.6 Cryptography and SNDT
3.7 Access strategies and signcryption schemes
3.8 Chapter summary
Chapter 4 The Design of τ-Access Policy and TTP based Signcryption Schemes
4.1 Introduction
4.2 τ-Access Policy: ABE scheme for social network in data trading
4.2.1 Social networking service
4.2.2 Social networks investment
4.2.3 Social networks with ABE
4.2.4 Attribute Based Encryption (ABE)
4.2.5 Our contribution
4.3 TTP based signcryption scheme
4.3.1 Secret key encryption
4.3.2 Signcryption
4.3.3 Our model mechanism
4.3.4 Signcryption and Unsigncryption
4.3.5 Elliptic curve points generation
4.3.6 Keys generation
4.3.7 Algorithmic design of signcryption
4.3.8 Cloud service users
4.3.9 Algorithmic design of unsigncryption
4.3.10 Verification
4.3.11 Correctness
4.4 Chapter summary
Chapter 5 Analysis
5.1 Introduction
5.2 Analysis of τ- Access Policy
5.2.1 ABE practice on social networks
5.2.2 The usage and analysis of τ-access policy
5.2.3 Attacks prevention
5.3 Performance evaluation of τ-access policy
5.4 Security properties
5.4.1 Data confidentiality
5.4.2 Data integrity
5.4.3 Authenticity
5.4.4 Non-repudiation
5.4.5 Un-forgeability
5.5 Analysis of TTP based signcryption scheme
5.6 Performance evaluation
5.7 Security properties
5.8 Chapter summary
Chapter 6 Summary, Open Problems and Future Work
6.1 Introduction
6.2 τ-access policy summary
6.3 TTP based signcryption summary
6.4 Open problems
6.5 Future work
References
Research work conducted during PhD
【參考文獻(xiàn)】:
期刊論文
[1]適用于移動應(yīng)用的口令認(rèn)證多密鑰協(xié)商協(xié)議(英文)[J]. 李文敏,溫巧燕,蘇琦,張華,金正平. 中國通信. 2012(01)
本文編號:3572833
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/3572833.html
最近更新
教材專著