当前位置:主页 > 科技论文 > 软件论文 >

用于检测和预防数据交易中的安全和隐私问题的密码学模型

发布时间:2022-01-06 16:59
  在数据交易市场中,各种在线应用程序(社交网络)和数据库收集了越来越多的用户数据。在线社交网络的应用程序可以在全球范围内共享用户或客户的数据。在共享用户数据期间,它可能涉及到用户的隐私信息,这是保护用户的隐私带来了挑战。因此,在数据共享期间确保用户的隐私保护是有必要的。加密通过使用访问控制技术来保护社交网络隐私。在数据共享中,隐私保护方案主要有三种架构,包括中心化架构、半中心化架构和去中心化架构。中心化体系结构:在中心化数据共享中,通常对集中式的数据使用降维和基于数据相似性的表示形式。数据保护要兼顾对未知隐私数据处理的效率及隐私性。由于该方法是专门为集中式数据而设计的,因此不能被普遍使用。缺乏这种架构,单点故障将导致整体数据的丢失。隐私中的缺陷是可能导致恶意的攻击,通过使用复杂的攻击和计算方法,这种问题更易发生。加密形式的数据需要使业务模型具有可用性并且满足隐私需求(在数据托管的模式中,加密形式的数据是有必要的)。半中心化体系结构:中心化体系结构和去中心化体系结构之间的中间解决方案是半中心化数据共享体系结构(它可兼具两者的优点)。该体系结构定义了所需数据的关键元素,而平台的关键模块旨在实... 

【文章来源】:中国科学技术大学安徽省 211工程院校 985工程院校

【文章页数】:141 页

【学位级别】:博士

【文章目录】:
Dedication
Acknowledgments
Chapter 1 Introduction
    1.1 Introduction
    1.2 Trade
        1.2.1 Trade costs
        1.2.2 Trade execution
        1.2.3 Trade order
        1.2.4 International trade
    1.3 Trader
    1.4 Trading
    1.5 Data trading entities
        1.5.1 Seller
        1.5.2 Buyer
        1.5.3 Broker
    1.6 Data trading
        1.6.1 Trading market
        1.6.2 Data trading market
        1.6.3 Mobile data trading
        1.6.4 IoT data trading
        1.6.5 Fair data trading
    1.7 Digital Supply Chain (DSC-I) data trading
        1.7.1 Prepare
        1.7.2 Negotiate
        1.7.3 Govern
    1.8 Privacy of trading system
        1.8.1 Confidentiality
        1.8.2 Consent
        1.8.3 Data protection
        1.8.4 Threat model
    1.9 Structural organization of the dissertation
    1.10 Chapter summary
Chapter 2 Preliminaries
    2.1 Introduction
    2.2 Privacy preserving of data trading
        2.2.1 Challenges
        2.2.2 Problem definition
        2.2.3 Privacy models
        2.2.4 Technical challenges
        2.2.5 Threats and attacks
    2.3 Security and privacy of data trading
        2.3.1 Digital data
        2.3.2 Attribute based encryption
        2.3.3 Data trading and differential privacy
        2.3.4 Confidentiality and integrity
    2.4 Miscellaneous techniques
    2.5 Chapter summary
Chapter 3 Related Works
    3.1 Introduction
    3.2 Data trading
    3.3 Symmetric and asymmetric data trading
    3.4 Pairing-based cryptography and data trading
    3.5 Social Networks and Data Trading (SNDT)
    3.6 Cryptography and SNDT
    3.7 Access strategies and signcryption schemes
    3.8 Chapter summary
Chapter 4 The Design of τ-Access Policy and TTP based Signcryption Schemes
    4.1 Introduction
    4.2 τ-Access Policy: ABE scheme for social network in data trading
        4.2.1 Social networking service
        4.2.2 Social networks investment
        4.2.3 Social networks with ABE
        4.2.4 Attribute Based Encryption (ABE)
        4.2.5 Our contribution
    4.3 TTP based signcryption scheme
        4.3.1 Secret key encryption
        4.3.2 Signcryption
        4.3.3 Our model mechanism
        4.3.4 Signcryption and Unsigncryption
        4.3.5 Elliptic curve points generation
        4.3.6 Keys generation
        4.3.7 Algorithmic design of signcryption
        4.3.8 Cloud service users
        4.3.9 Algorithmic design of unsigncryption
        4.3.10 Verification
        4.3.11 Correctness
    4.4 Chapter summary
Chapter 5 Analysis
    5.1 Introduction
    5.2 Analysis of τ- Access Policy
        5.2.1 ABE practice on social networks
        5.2.2 The usage and analysis of τ-access policy
        5.2.3 Attacks prevention
    5.3 Performance evaluation of τ-access policy
    5.4 Security properties
        5.4.1 Data confidentiality
        5.4.2 Data integrity
        5.4.3 Authenticity
        5.4.4 Non-repudiation
        5.4.5 Un-forgeability
    5.5 Analysis of TTP based signcryption scheme
    5.6 Performance evaluation
    5.7 Security properties
    5.8 Chapter summary
Chapter 6 Summary, Open Problems and Future Work
    6.1 Introduction
    6.2 τ-access policy summary
    6.3 TTP based signcryption summary
    6.4 Open problems
    6.5 Future work
References
Research work conducted during PhD


【参考文献】:
期刊论文
[1]适用于移动应用的口令认证多密钥协商协议(英文)[J]. 李文敏,温巧燕,苏琦,张华,金正平.  中国通信. 2012(01)



本文编号:3572833

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/3572833.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户15cbc***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com