面向智能移動(dòng)終端的隱私保護(hù)技術(shù)研究
本文選題:移動(dòng)互聯(lián)網(wǎng) + 智能移動(dòng)終端; 參考:《華中科技大學(xué)》2016年博士論文
【摘要】:移動(dòng)互聯(lián)網(wǎng)將信息技術(shù)的發(fā)展帶入了一個(gè)新時(shí)代,對(duì)人類的發(fā)展有著極為深刻的意義,已經(jīng)影響到了人類生產(chǎn)生活的各個(gè)領(lǐng)域。然而,人們?cè)谙硎芤苿?dòng)互聯(lián)網(wǎng)帶來便利的同時(shí),也更多地將自己的信息參與到網(wǎng)絡(luò)之中,使得個(gè)人信息的隱私度降低,從而面臨著隱私方面的安全威脅。用戶所使用的移動(dòng)終端往往包含大量的用戶隱私信息,一旦用戶隱私數(shù)據(jù)泄露,若不采取相應(yīng)的保護(hù)措施,則其產(chǎn)生的后果及造成的經(jīng)濟(jì)損失是無法估量的。隨著隱私的安全問題的漸漸凸顯,用戶對(duì)自身的隱私的關(guān)注度也逐漸提高。目前國內(nèi)外對(duì)隱私保護(hù)機(jī)制的研究方興未艾,對(duì)于智能移動(dòng)終端的隱私保護(hù)技術(shù)尚存在一些亟待深入研究的問題。首先,移動(dòng)終端應(yīng)用程序過度獲取用戶隱私的問題。傳統(tǒng)方法中允許或者阻止應(yīng)用程序或者服務(wù)訪問用戶隱私數(shù)據(jù)比較簡單直接,但是可能會(huì)對(duì)實(shí)時(shí)性和可用性產(chǎn)生影響。另外,傳統(tǒng)的移動(dòng)終端隱私保護(hù)主要研究阻止隱私泄露的方法,而缺少研究基于粒度為基礎(chǔ)的隱私策略定制問題;其次,智能移動(dòng)終端可能存在的傳感器隱私泄露問題。目前移動(dòng)終端涉及傳感器泄露隱私的方式越來越多,但是其對(duì)應(yīng)的保護(hù)方法往往治標(biāo)不治本,并且有些保護(hù)方案并不能面面俱到,可能會(huì)給移動(dòng)用戶帶來新的威脅:最后,當(dāng)前移動(dòng)終端隱私保護(hù)研究主要關(guān)注如何保護(hù)用戶隱私數(shù)據(jù),而忽視了移動(dòng)終端本身。智能移動(dòng)終端的遺失作為用戶擔(dān)心最多的隱私泄露渠道,傳統(tǒng)的追溯系統(tǒng)存在嚴(yán)重的隱私問題,持續(xù)的接收設(shè)備的位置會(huì)導(dǎo)致用戶認(rèn)為在被持續(xù)監(jiān)控,因此產(chǎn)生嚴(yán)重的心理障礙。首先,基于位置粒度的移動(dòng)終端隱私保護(hù)機(jī)制,能夠解決移動(dòng)終端應(yīng)用程序過度獲取用戶位置隱私的問題。該機(jī)制能夠根據(jù)用戶制定LBS(Location Based Services)應(yīng)用的隱私策略,將精確位置信息模糊化處理為不同精確級(jí)的位置數(shù)據(jù)并返回給上層應(yīng)用,以達(dá)到在不依賴第三方的情況下,最大限度地維持LBS應(yīng)用的可用性,并且實(shí)時(shí)高效地保護(hù)用戶位置隱私數(shù)據(jù)。其次,針對(duì)移動(dòng)終端可能存在的傳感器隱私泄露防護(hù)問題,傳感器隱私訂制策略的概念被提出來,目的在于讓用戶對(duì)智能手機(jī)中所有的感知應(yīng)用程序設(shè)置隱私策略,控制它們?cè)L問傳感器的權(quán)限。以傳感器隱私訂制策略為基礎(chǔ),基于傳感器的移動(dòng)終端隱私保護(hù)機(jī)制,能夠解決智能手機(jī)上的傳感器可能被惡意者利用來竊取用戶的隱私信息的問題。該機(jī)制其能夠讓用戶根據(jù)自己的需求為智能手機(jī)上的應(yīng)用程序定制傳感器隱私策略,并且在運(yùn)行時(shí)阻止惡意程序?qū)鞲衅鞯姆欠ㄔL問,同時(shí)維持合理的開銷。最后,基于云存儲(chǔ)的保密追溯機(jī)制能夠有效緩解智能移動(dòng)終端遺失追溯中的隱私問題,該機(jī)制不僅能讓用戶充分享受云存儲(chǔ)帶來的服務(wù),而且可以最大限度的保護(hù)用戶位置隱私信息不被泄露。在智能移動(dòng)終端引入云計(jì)算能夠解決智能移動(dòng)終端計(jì)算能力和存儲(chǔ)能力不足的問題,通過使用云存儲(chǔ)設(shè)施之一的網(wǎng)絡(luò)硬盤作為存儲(chǔ)設(shè)施,采用基于位置感應(yīng)的數(shù)據(jù)采集方式收集設(shè)備的位置信息,以及適用于移動(dòng)設(shè)備的加密算法對(duì)位置信息進(jìn)行加密發(fā)送,從而克服了對(duì)可信第三方的依賴,保護(hù)了用戶的位置隱私,節(jié)省了數(shù)據(jù)流量并且提高了位置追蹤的效率。綜上所述,通過使用面向智能移動(dòng)終端隱私保護(hù)機(jī)制,可以為智能移動(dòng)終端應(yīng)用程序提供不同粒度的隱私保護(hù),也可以根據(jù)用戶需求,為應(yīng)用程序制定隱私策略,全面保護(hù)位置信息以及傳感器信息等隱私,也可以使用基于云存儲(chǔ)的保密追溯機(jī)制在不泄露隱私的情況下找回遺失的智能移動(dòng)終端。
[Abstract]:The mobile Internet has brought the development of information technology into a new era, which has a profound significance to the development of human beings. It has already affected all fields of human production and life. However, while people are enjoying the convenience of the mobile Internet, they are also more involved in the network, making the personal information hidden. There is a security threat to privacy. The mobile terminal used by the user often contains a large number of user privacy information. Once the user's privacy data is leaked, the consequences and economic losses caused by the user's privacy data are immeasurable. With the security of privacy, the problem of security is becoming more and more important. The attention of users to their privacy is also increasing. At present, the research on the privacy protection mechanism at home and abroad is in the ascendant, and there are still some problems to be deeply studied for the privacy protection technology of the intelligent mobile terminal. First, the problem of overtaking the privacy of the users by the mobile terminal applications is allowed or prevented from the traditional methods. Accessing user privacy data with programs or services is simple and direct, but it may have an impact on real time and availability. In addition, traditional mobile terminal privacy protection mainly studies methods to prevent privacy disclosure, but lacks research on granularity based privacy policy customization. Secondly, intelligent mobile terminals may exist. At present, there are more and more ways for mobile terminals to disclose privacy of sensors, but their corresponding protection methods often do not run the rule, and some protection schemes are not available, which may bring new threats to mobile users. Finally, the current research on the privacy protection of mobile terminals is mainly concerned. How to protect the user's privacy data, but ignore the mobile terminal itself. The loss of the smart mobile terminal is the most worrying privacy leak channel for the user. The traditional traceability system has serious privacy problems. The location of the continuous receiving device will lead to the users think that it is constantly monitored. The location granularity mobile terminal privacy protection mechanism can solve the problem of excessive access to user location privacy by mobile terminal applications. This mechanism can make LBS (Location Based Services) application of privacy policy based on users, and fuzzification of precise location information into different precise level of location data and return to the upper application. To maximize the availability of LBS applications without relying on third parties, and to protect user location privacy data in real time and efficiently. Secondly, the concept of sensor privacy policy is proposed in view of the potential privacy disclosure protection problems of mobile terminals. All of the perceived applications set up privacy policies to control their access to the sensor. Based on sensor privacy reservation strategy and sensor based mobile terminal privacy protection mechanism, it can solve the problem that sensors on a smartphone may be exploited by malicious users to steal user privacy information. Users customize the privacy policy for the applications on the smartphone based on their own needs, and prevent the malicious access of the malicious program to the sensor at run time, while maintaining a reasonable cost. Finally, the secret tracing mechanism based on cloud storage can effectively alleviate the privacy problems in the traceability of the intelligent mobile terminal. It can not only allow users to fully enjoy the services brought by the cloud storage, but also maximize the protection of user location privacy information. The introduction of cloud computing in intelligent mobile terminals can solve the problem of insufficient computing power and storage capacity of intelligent mobile terminals, by using a network hard disk as one of the cloud storage facilities as a storage device. By using the location based data collection method, the location information of the equipment is collected, and the encryption algorithm suitable for mobile devices is used to encrypt the location information, thus overcoming the dependence on the trusted third party, protecting the user's location privacy, saving the data flow and improving the efficiency of location tracking. Through the use of intelligent mobile terminal privacy protection mechanism, it can provide different granularity privacy protection for intelligent mobile terminal applications. It can also make privacy policies for applications, protect location information and sensor information in an all-round way according to user needs, and can also use cloud storage based privacy tracing mechanism. Find the lost smart mobile terminal without revealing the privacy.
【學(xué)位授予單位】:華中科技大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2016
【分類號(hào)】:TP309
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 喬軍;吳瑞華;熊才平;;智能移動(dòng)終端的教學(xué)應(yīng)用及前景分析[J];現(xiàn)代遠(yuǎn)距離教育;2013年02期
2 王鳳偉;邢志紅;金龍俊;山毓俊;;智能移動(dòng)終端程序開發(fā)的研究[J];計(jì)算機(jī)與網(wǎng)絡(luò);2013年14期
3 沈明杰;鮑立威;;智能移動(dòng)終端:物聯(lián)網(wǎng)終端的新寵——淺談智能移動(dòng)終端的發(fā)展現(xiàn)狀和展望[J];射頻世界;2010年06期
4 龔潔中;陳恭亮;李建華;;智能移動(dòng)終端的信任管理技術(shù)研究[J];中國電子科學(xué)研究院學(xué)報(bào);2011年06期
5 謝世逸;葛永軍;;基于車聯(lián)網(wǎng)的智能移動(dòng)終端的設(shè)計(jì)與實(shí)現(xiàn)[J];科技創(chuàng)新與應(yīng)用;2012年34期
6 萬美芝;;基于智能移動(dòng)終端應(yīng)用于企業(yè)信息管理系統(tǒng)的研究[J];中國電業(yè)(技術(shù)版);2013年12期
7 陳奕儒;;智能移動(dòng)終端已經(jīng)邁出改變世界的兩條腿[J];電子制作;2014年06期
8 楊志;;現(xiàn)代傳播中的智能移動(dòng)終端[J];傳播與版權(quán);2014年06期
9 李強(qiáng);;智能移動(dòng)終端的數(shù)據(jù)傳輸信源加密設(shè)計(jì)[J];電子設(shè)計(jì)技術(shù);2011年01期
10 ;保障智能移動(dòng)終端安全性的8大簡單步驟[J];計(jì)算機(jī)與網(wǎng)絡(luò);2012年08期
相關(guān)會(huì)議論文 前6條
1 駱傳寶;;三維GIS在智能移動(dòng)終端的應(yīng)用[A];2013年度江蘇省測繪學(xué)會(huì)年會(huì)論文集[C];2013年
2 史漢新;王勇;;智能移動(dòng)終端在國土資源執(zhí)法監(jiān)察中的應(yīng)用[A];2013年度江蘇省測繪學(xué)會(huì)年會(huì)論文集[C];2013年
3 王卓;包杰;;嵌入式linux在智能移動(dòng)終端的開發(fā)應(yīng)用[A];第九屆全國青年通信學(xué)術(shù)會(huì)議論文集[C];2004年
4 呂煒科;;基于可信計(jì)算的智能移動(dòng)終端安全體系研究[A];2012全國無線及移動(dòng)通信學(xué)術(shù)大會(huì)論文集(下)[C];2012年
5 陳曉江;馮健;馬東海;房鼎益;;一個(gè)智能移動(dòng)終端白板系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)[A];第三屆和諧人機(jī)環(huán)境聯(lián)合學(xué)術(shù)會(huì)議(HHME2007)論文集[C];2007年
6 柴焱;李s,
本文編號(hào):2033639
本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/2033639.html