首页 | 本学科首页   官方微博 | 高级检索  
     

隐私计算研究范畴及发展趋势
引用本文:李凤华,李 晖,贾 焰,俞能海,翁 健.隐私计算研究范畴及发展趋势[J].通信学报,2016,37(4):1-11.
作者姓名:李凤华  李 晖  贾 焰  俞能海  翁 健
作者单位:1.中国科学院信息工程研究所信息安全国家重点实验室,北京 100195; 2. 西安电子科技大学网络与信息安全学院,陕西 西安 710071;3. 国防科学技术大学计算机学院,湖南 长沙410073; 4.中国科学技术大学信息科学技术学院,安徽 合肥 230026;5. 暨南大学信息科学技术学院,广东 广州 510632
基金项目:国家自然科学基金—广东联合基金资助项目(No.U1401251);移动互联网安全学科创新引智基地(“111”计划)基金资助项目(No.B16037)
摘    要:随着移动互联网、云计算和大数据技术的广泛应用,电商、搜索、社交网络等服务在提供便利的同时,大数据分析使用户隐私泄露的威胁日益凸显,不同系统隐私保护策略和能力的差异性使隐私的延伸管理更加困难,同一信息的隐私保护需求随时间变化需要多种隐私保护方案的组合协同。目前已有的各类隐私保护方案大多针对单一场景,隐私缺乏定量化的定义,隐私保护的效果、隐私泄露的利益损失以及隐私保护方案融合的复杂性三者之间的关系刻画缺乏系统的计算模型。因此,在分析隐私保护研究现状的基础上,提出隐私计算的概念,对隐私计算的内涵加以界定,从隐私信息的全生命周期讨论隐私计算研究范畴,并从隐私计算模型、隐私保护场景适应的密码理论、隐私控制与抗大数据分析的隐私保护、基于信息隐藏的隐私保护以及支持高并发的隐私保护服务架构等方面展望隐私计算的发展趋势。

关 键 词:隐私计算  度量  形式化描述  隐私感知
收稿时间:3/1/2016 12:00:00 AM

Pricing strategy for video migration based on truthful auction mechanism
LI Feng-hua;LI Hui;JIA Yan;YU Neng-hai;WENG Jian.Pricing strategy for video migration based on truthful auction mechanism[J].Journal on Communications,2016,37(4):1-11.
Authors:LI Feng-hua;LI Hui;JIA Yan;YU Neng-hai;WENG Jian
Affiliation:School of Electronic and Information Engineering, Liaoning Technical University, Huludao 125105, China
Abstract:With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever growing due to the use of big data analytics. The differences of privacy protection strategy and ability in different systems bring more difficulties in privacy extended management. In addition, the requirements of protecting the same information at different time need the combination of various privacy protection schemes. However, nearly all the current privacy protection schemes are targeting at a single case, which lacks systematic and quantized privacy characterization. Furthermore, there is no systematic computing model describing the relationship between the protection level, profit and loss of privacy leaks and the complexity of integrated privacy protection methods. Based on the analysis on the research status of privacy protection, the concept and connotation of privacy computing is proposed and defined. Then the privacy computing research category will be discussed from the whole life cycle of information privacy protection. Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data analytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.
Keywords:
本文献已被 CNKI 等数据库收录!
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号