首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
在物联网中的认证和密钥协商过程中,如果用户的身份信息以明文的形式传输,攻击者可能追踪用户的行动轨迹,从而造成信息泄漏。针对大多数基于身份的认证和密钥协商协议不能保护用户隐私的问题,提出一个基于身份的匿名认证和密钥协商协议。在设计的认证和密钥协商方案中,用户的身份信息以密文的形式传输,解决了用户的隐私问题。  相似文献   

2.
车联网可有效提高交通的效率和安全性,但通信过程中存在的隐私泄露问题严重阻碍了其应用落地。提出一种面向车联网V2X通信的条件隐私保护认证协议。针对现有协议大多仅支持车辆认证的局限性,基于用户身份和车辆身份信息生成车与用户绑定的生物密钥,使协议支持单车多用户或单用户多车认证。在保护用户和车辆身份的条件下完成对消息发送方的身份认证,并在特定情况下追溯车辆和用户的真实身份,从而实现对车辆和用户的条件隐私保护。同时,在协议中添加批量验证功能以提高验证效率。形式化的安全性分析和性能评估结果表明,该协议是安全且高效的。  相似文献   

3.
量子隐私查询可以同时保证用户和数据库提供商的隐私安全,量子身份认证可以在通信过程中实现更加可靠的身份认证。提出一种基于BELL态的多功能量子密码协议。基于非对称QKD的思想,又提出一种量子隐私查询方案。该方案可以帮助用户安全高效地实现隐私查询,同时严格保证数据库的安全性。为了提高量子资源的利用效率和增加量子资源的实际用途,完成非对称QKD过程后,该协议可以完成一次双向的身份认证过程。最后给出了严格的协议安全性证明过程。  相似文献   

4.
针对开放网络中进行指纹身份认证时的双方指纹隐私保护问题,提出了基于Fingercode和同态加密的指纹认证方案。相较传统方案,该方案中服务器端模板以加密形式保存,保护了用户指纹数据的安全性;设计了安全认证协议,使得服务器和用户可以联合计算双方指纹特征的距离而不会泄露各自特征数据的隐私。协议中采用了数据打包技术,能够明显减轻服务器与用户之间的通讯压力和计算复杂度。分析和实验结果表明,该方案具有安全性和一定的实用性。  相似文献   

5.
王震  范佳  成林  安红章  郑海彬  牛俊翔 《软件学报》2019,30(6):1705-1720
随着互联网中隐私保护技术的发展,身份认证已成为保护计算机系统和数据安全的一道重要屏障.然而,信息技术的快速发展使传统身份认证手段暴露出一些弊端,例如,区块链技术的兴起对身份认证提出了更高的要求,在认证身份的同时需要保护用户的身份隐私等.采用匿名认证技术可解决用户身份隐私泄露的问题,但目前大多数方案未考虑可监管的问题,一旦用户出现不诚信行为,很难进行追责,因此,需要在匿名认证过程中建立监管机制.针对以上问题和需求,主要设计了一种可监管的匿名认证方案,通过匿名证书的方式确定用户的资源访问权限和使用权限,同时,用户在出示证书时可选择性地出示属性,确保用户的隐私信息不过度暴露;此外,方案中引入监管机制,可信中心(CA)对匿名认证过程进行监管,一旦出现欺诈行为,可对相关责任人进行追责.该方案主要采用安全的密码学算法构建,并通过了安全性的分析证明,能够高效实现可监管的匿名身份认证,适宜在区块链(联盟链)和其他具有匿名认证需求和可监管需求的系统中使用.  相似文献   

6.
基于区块链的身份认证系统大多基于公有区块链平台,本质上仍是传统的中心式身份管理和验证方式,难以满足微电网中可信接入、细粒度访问控制等需求。因此,基于 FISCO BCOS 联盟区块链技术,设计了一个支持多中心的分布式身份认证系统,提出了基于 DID 的身份管理协议,实现了用户身份的自主控制;研究了微网中终端节点的分布式可信接入技术,设计了基于零知识证明的隐私保护凭证,为用户和上层应用构建一个公开透明可信的底层身份架构,满足了不同的隐私安全场景下用户身份的可信可验证的需求,实现了实体身份的自主控制、细粒度访问控制和可信数据交换。通过系统实验和性能分析证明了所设计系统的可用性和有效性。  相似文献   

7.
针对低功耗蓝牙协议栈安全机制中缺乏用户身份合法性认证的问题,首先分析并指出了已有蓝牙用户认证协议无法抵抗假冒和窃听攻击,且无法适用于低功耗蓝牙协议;其次结合低功耗蓝牙协议层次设计了用户认证模型,构建了基于二次剩余的低功耗蓝牙用户认证方案。通过中国剩余定理求解二次剩余,完成用户身份双向认证,同时满足用户匿名要求。安全性分析表明方案可以有效地抵御用户口令泄露、从设备丢失、假冒及窃取用户隐私等攻击方式。理论分析及实验结果表明具有较高的计算效率和较小的存储开销,适用于资源受限的低功耗蓝牙可穿戴设备应用场景。  相似文献   

8.
基于Kerberos协议的典型系统为单点登录身份认证系统,即单域身份认证系统,而关于用户到用户的身份认证系统,多采用NTLM协议.为了研究基于Kerberos协议的用户到用户认证系统,在充分研究Kerberos协议的体系结构和工作流程的基础上,对用户到用户的Kerberos身份认证系统的认证过程进行了详细的设计,分析了用户到用户的Kerberos身份认证系统的典型结构.研究表明,当一个客户端需要访问另一个客户端中运行的服务时,Kerberos身份认证协议支持在两个客户端之间的身份认证.  相似文献   

9.
随着区块链技术的不断发展与广泛应用,去中心化身份验证模型逐渐替代了传统的中心化身份验证模型。然而,在用户链下信息认证方面仍然存在诸如隐私保护不足和链下身份验证效率低下等问题。提出了一种采用灵魂绑定代币进行用户链下信息认证的创新策略。首先,引入分布式身份标识作为用户身份认证体系的核心;其次,通过将用户信息加密存储在灵魂绑定代币链上,确保了用户信息的隐私和安全性;最后,采用零知识证明技术实现个人信息隐私验证的高效处理。经实验验证,该方案提升了链下信息的可信度、安全性和认证效率。  相似文献   

10.
通过对单点登陆系统的身份认证协议进行分析,给出了一种基于公钥的双向身份认证协议,该协议结合用户授权的认证模式,实现了用户、认证服务(身份提供者)和应用服务三方的双向认证,增强了现有单点登录系统中身份认证协议的安全性和可扩展性。  相似文献   

11.
Efficient utilisation of new mobility data-based services and promotion of acceptance of data collection from vehicles and people demand an understanding of mobility data privacy concerns, associated with increasing use of tracking technologies, diverse data usages and complex data collection environments. Understanding privacy concerns enables improved service and system development and identification of appropriate data management solutions that contribute to data subjects’ privacy protection, as well as efficient utilisation of the collected data. This study aimed to explore earlier research findings on privacy concerns evaluation and investigate their validity in mobility data collection. Explorative multimethod research was conducted in a mobility service pilot through data controller interviews, user interviews and a user survey. The study's results indicated the need to revise and complement existing privacy concerns evaluation in mobility data collection contexts. The primary findings were as follows: (1) Privacy concerns specific to the mobility data collection context exist. (2) Privacy concerns may change during the service use. (3) Users are not necessarily personally worried about their privacy although they ponder on privacy issues. (4) In contrast to traditional ‘privacy calculus’ thinking, users’ expected benefits from data disclosure may also be driven by altruistic motives.  相似文献   

12.
Tsai  Yu-Chuan  Wang  Shyue-Liang  Ting  I-Hsien  Hong  Tzung-Pei 《World Wide Web》2020,23(4):2391-2406

In recent years, privacy breaches have been a great concern on the published data. Only removing one’s personal identification information is not sufficient to protect individual’s privacy. Privacy preservation technology for published data is devoted to preventing re-identification and retaining the useful information in published data. In this work, we propose a novel algorithm to deal with sensitive and quasi-identifier items, respectively, in transactional data. The proposed algorithm maintains at least the same or a stronger privacy level for transactional data with 1/k. In numerical experiments, our proposed algorithm shows better running time and better data utility.

  相似文献   

13.
14.
Quality of service (QoS) can be a critical element for achieving the business goals of a service provider, and accepting a service by the customer. The criticality is more pronounced when the service provider handles the non-functional QoS attribute of privacy, i.e., privacy related to the customer’s personal data. In this regard, the customer needs some guarantee(s) from the service provider about confidentiality management, leading to overall quality characterization of the provided service. A service level agreement (SLA) is primarily intended to specify (in terms of clauses) the level of such non-functional QoS delivered to the customer. The aim is to provide customers with tools that show the fulfillment of QoS guarantees, through SLA monitoring process. In this paper, we address the problem of usage control of private data in service based applications ensuring end-to-end QoS capabilities. We propose a query containment based approach to support the monitoring of privacy-aware SLA compliance, that spells out a customer’s privacy rights, and shows how the customer’s private information must be handled by a Web service provider. We introduce the private data usage flow model upon which the monitoring is performed to observe the data usage flow, and capture the privacy vulnerabilities that may lead to non-compliance. The model is built on top of (i) properties and time-related privacy requirements to be monitored, and (ii) a set of identified privacy violations. As proof of concept, a privacy aware SLA monitoring system, which is an easy-to-use, and efficient tool for observing the dynamic private data usage flow is developed. Experiment results indicate the relevance and applicability of the proposed approach.  相似文献   

15.
移动社交网络为人们的生活带来了极大的便利,但用户在享受这些服务带来便利的同时,个人位置隐私受到了严重威胁。首先对用户位置隐私保护需求进行了形式化描述,继而针对用户的敏感兴趣点泄露问题,提出了一种情景感知的隐私保护方法。该方法将位置信息、社交关系、个人信息引入到知识构建算法中以计算兴趣点间的相关性,并利用该相关性及时空情景实时判断发布当前位置是否会泄露用户隐私,进而实现了隐私保护与服务可用性间的平衡。最后通过仿真实验验证了该方法的有效性。  相似文献   

16.
Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy ...  相似文献   

17.
社交网络用户隐私泄露的量化评估有利于帮助用户了解个人隐私泄露状况,提高公众隐私保护和防范意识,同时也能为个性化隐私保护方法的设计提供依据.针对目前隐私量化评估方法主要用于评估隐私保护方法的保护效果,无法有效评估社交网络用户的隐私泄露风险的问题,提出了一种社交网络用户隐私泄露量化评估方法.基于用户隐私偏好矩阵,利用皮尔逊相似度计算用户主观属性敏感性,然后取均值得到客观属性敏感性;采用属性识别方法推测用户隐私属性,并利用信息熵计算属性公开性;通过转移概率和用户重要性估计用户数据的可见范围,计算数据可见性;综合属性敏感性、属性公开性和数据可见性计算隐私评分,对隐私泄露风险进行细粒度的个性化评估,同时考虑时间因素,支持用户隐私泄露状况的动态评估,为社交网络用户了解隐私泄露状况、针对性地进行个性化隐私保护提供支持.在新浪微博数据上的实验结果表明,所提方法能够有效地对用户的隐私泄露状况进行量化评估.  相似文献   

18.
在位置隐私保护中,现有的方法很多都是针对用户单个位置的隐私保护,而现实情况是,用户始终处在一个连续运动的状态中,在每一个地点都有可能发出位置查询服务,由此可以产生一个用户运动的轨迹。因此如何保证这条轨迹不被攻击者识别出来就是连续查询条件下要解决的问题。针对轨迹隐私保护问题,文章提出一种基于假轨迹的轨迹隐私保护方法,在用户连续查询形成运行轨迹的同时,算法根据用户自身设定的隐私度参数要求,生成符合要求的假位置和假轨迹,通过降低攻击者的识别概率来提高轨迹隐私保护度。模拟仿真实验结果证明,与随机生成假轨迹的方法相比,在隐私保护度较高的情形下,文章方法在时间消耗和假轨迹的生成数目上都有一定的优势。  相似文献   

19.
Several types of individual information privacy beliefs have been studied in literature, but their distinctions, relationships, and behavioral impacts have yet been systematically analyzed, causing difficulties in comparing and consolidating results across literature. Based on a review on various types of privacy beliefs, this study develops a multi-level model to strengthen this concept. The model consists of three levels of privacy beliefs, including: disposition to privacy, representing a person’s fundamental beliefs and overall propensity to value privacy across contexts; online privacy concern, representing a person’s overall perception of privacy risks in the online environment; and website privacy concern, representing a person’s perception of privacy risks on a particular website. An empirical test reveals that disposition to privacy has a positive impact on both online privacy concern and website privacy concern, and website privacy concern is the only significant predictor of intentions to disclose information and transact on a website. The study helps to synthesize individual information privacy beliefs and assists in understanding their impacts on online behavior.  相似文献   

20.
A consistent finding reported in online privacy research is that an overwhelming majority of people are ‘concerned’ about their privacy when they use the Internet. Therefore, it is important to understand the discourse of Internet users’ privacy concerns, and any actions they take to guard against these concerns. A Dynamic Interviewing Programme (DIP) was employed in order to survey users of an instant messaging ICQ (‘I seek you’) client using both closed and open question formats. Analysis of 530 respondents’ data illustrates the importance of establishing users’ privacy concerns and the reasoning behind these concerns. Results indicate that Internet users are concerned about a wider range of privacy issues than surveys have typically covered. The results do not provide final definitions for the areas of online privacy, but provide information that is useful to gain a better understanding of privacy concerns and actions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号