基于身份加密的分布式在线社会网络隐私保护方法研究
[Abstract]:In recent years, distributed online social network (DOSNs (Distributed Online Social Networks) has attracted much attention as a new online social network structure. To some extent, it overcomes the shortcomings of centralized management, but in the distributed online social network, the privacy information of users is dispersive, which leads to the privacy information more easily leaked. This paper focuses on the design of privacy protection scheme in distributed online social network, which has theoretical significance and practical value. In order to solve the problem of secure encryption in the absence of secure channels, this paper improves the ID-based encryption scheme, and proposes an ID-based online / offline scheme for distributed online social networks. Thus reducing the network burden and calculation. This paper analyzes the secret sharing SS (SecretSharing) scheme based on identity encryption IBE (Identity-based Encryption). A secret sharing online / offline privacy protection scheme based on KPA (Key Privacy Authority) and PC (Privacy Chum) is designed for the distributed online social network based on identity encryption. In this scheme, neither the key privacy agency nor the privacy confidant can obtain the user key by imitating the users in the network. In order to ensure the reliability of PC, this paper uses Byzantine fault-tolerant protocol BFT (Byzantine faulttolerance) to verify its reliability. The main idea of the new scheme is to divide the privacy protection scheme into two phases: offline and online. In the off-line phase, the user identity and plaintext are not required. The complex calculation is completed by KPA in advance to form an off-line ciphertext. After obtaining the clear text and the user identity in the online stage, the plaintext can be encrypted and the key can be published only by simple integer multiplication. This greatly reduces the network load and saves time and resources. This paper not only gives the implementation of two privacy protection schemes, but also simulates the scheme, and analyzes the simulation results in detail. The simulation results show that the proposed scheme is efficient and feasible under the premise of guaranteeing network security and can support large-scale online social networks.
【学位授予单位】:中南民族大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08
【相似文献】
相关期刊论文 前10条
1 田彦伟;陈宝凤;;基于生物特征的身份加密及其安全性分析[J];安阳工学院学报;2008年04期
2 梁潘;冯朝胜;;基于分层身份加密的教务系统信息安全解决方案[J];桂林电子科技大学学报;2010年03期
3 顾永军;齐敬敬;王雅坤;;基于身份加密的匿名漫游无线认证协议[J];计算机工程;2010年17期
4 张晓敏;赵永斌;刘克智;;双系统加密技术下带通配符的基于身份加密方案[J];计算机应用研究;2012年05期
5 杨斌;熊选东;苏克军;;基于仲裁者的身份加密方案研究[J];计算机应用;2008年11期
6 陈曦;马建峰;;基于身份加密的机会网络安全路由架构[J];计算机研究与发展;2011年08期
7 赵庆;王斌;张m蟦\;;基于身份加密体制的无线网络认证授权模型[J];扬州大学学报(自然科学版);2012年04期
8 黄胜;蒋外文;;网格中基于分层的身份加密系统研究[J];计算机应用;2008年05期
9 石艳荣;贺永强;;PKI和基于身份加密的比较[J];微计算机信息;2008年03期
10 彭海涛,史清华;基于身份加密的安全电子邮件系统[J];计算机工程;2005年13期
相关硕士学位论文 前6条
1 彭海涛;基于身份加密的安全电子邮件系统的设计与实现[D];山东大学;2005年
2 王金玲;基于身份的加密系统中PKG的实现及安全性分析[D];吉林大学;2008年
3 陈洋荣;基于身份加密的分布式在线社会网络隐私保护方法研究[D];中南民族大学;2014年
4 白刚;基于身份加密应用的安全通信研究[D];吉林大学;2010年
5 戴素芬;身份加密方法应用于组合文档安全删除的研究[D];福建师范大学;2015年
6 赵旭东;一种基于身份加密的安全电子邮件方案研究与实现[D];西南交通大学;2010年
本文编号:2248379
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2248379.html