共查询到20条相似文献,搜索用时 31 毫秒
1.
针对云计算环境中数字内容安全和用户隐私保护的需求,提出了一种云计算环境中支持隐私保护的数字版权保护方案。设计了云计算环境中数字内容版权全生命周期保护和用户隐私保护的框架,包括系统初始化、内容加密、许可授权和内容解密4个主要协议;采用基于属性基加密和加法同态加密算法的内容加密密钥保护和分发机制,保证内容加密密钥的安全性;允许用户匿名向云服务提供商订购内容和申请授权,保护用户的隐私,并且防止云服务提供商、授权服务器和密钥服务器等收集用户使用习惯等敏感信息。与现有的云计算环境中数字版权保护方案相比,该方案在保护内容安全和用户隐私的同时,支持灵活的访问控制,并且支持在线和超级分发应用模式,在云计算环境中具有较好的实用性。 相似文献
2.
3.
The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed. 相似文献
4.
5.
随着移动互联网、云计算和大数据技术的广泛应用,电商、搜索、社交网络等服务在提供便利的同时,大数据分析使用户隐私泄露的威胁日益凸显,不同系统隐私保护策略和能力的差异性使隐私的延伸管理更加困难,同一信息的隐私保护需求随时间变化需要多种隐私保护方案的组合协同。目前已有的各类隐私保护方案大多针对单一场景,隐私缺乏定量化的定义,隐私保护的效果、隐私泄露的利益损失以及隐私保护方案融合的复杂性三者之间的关系刻画缺乏系统的计算模型。因此,在分析隐私保护研究现状的基础上,提出隐私计算的概念,对隐私计算的内涵加以界定,从隐私信息的全生命周期讨论隐私计算研究范畴,并从隐私计算模型、隐私保护场景适应的密码理论、隐私控制与抗大数据分析的隐私保护、基于信息隐藏的隐私保护以及支持高并发的隐私保护服务架构等方面展望隐私计算的发展趋势。 相似文献
6.
Hui Lin Jia Hu Jianfeng Ma Li Xu Atulya Nagar 《Wireless Personal Communications》2014,75(3):1611-1633
Wireless Mesh Networks (WMNs) have drawn much attention for emerging as a promising technology to meet the challenges in next generation networks. Security and privacy protection have been the primary concerns in pushing towards the success of WMNs. There have been a multitude of solutions proposed to ensure the security of the routing protocol and the privacy information in WMNs. However, most of them are based on the assumptions that all nodes cooperate with routing and forwarding packets and the attacks are from outside. In order to defend against the internal attacks and to achieve better security and privacy protection, this paper proposes a role based privacy-aware secure routing protocol (RPASRP), which combines a new dynamic reputation mechanism with the role based multi-level security technology and a hierarchical key management protocol. Simulation results show that RPASRP implements the security and privacy protection against the inside attacks more effectively and efficiently and performs better than the classical hybrid wireless mesh protocol in terms of packet delivery ratio and average route length. 相似文献
7.
云计算作为新的IT应用模式,数据安全和隐私保护是云用户最为关心和重视的,其重要性对云计算的安全至关重要。文章详细阐述和分析了云计算带来的数据安全和隐私泄露风险,研究了在云计算环境下的数据安全和隐私保护手段,从云计算数据和隐私的产生、使用、存储和销毁全生命周期阐述和分析了其安全防护手段,并给出了数据安全和隐私保护模型,并对该模型做了详细阐述,对云计算的具体应用和推广具有一定的指导意义。 相似文献
8.
9.
云计算数据安全研究 总被引:1,自引:0,他引:1
李清玉 《信息安全与通信保密》2012,(11):62-65
随着云计算的快速发展和推广应用,在云计算环境中数据安全和隐私保护成为云计算研究中的关键问题。以数据全生命周期模型为基础,提出云计算环境中的数据安全和隐私保护框架,对云计算环境中数据安全和隐私保护的若干关键研究问题,包括密文检索、完整性验证和持有性证明、隐私保护及查询隐私进行了阐述,详细综述了全同态加密的发展、原理、意义及其在云计算数据安全和隐私保护中的应用,并指明了未来的研究方向。 相似文献
10.
随着宽带无线接入技术和移动终端技术的飞速发展,人们迫切希望能够随时随地从互联网获取信息和服务,移动互联网应运而生并迅猛发展。然而,由于云计算平台、移动通信网络和移动终端的开放性,传统互联网服务中信息传播和管控机制不再适应于移动互联网,信息安全和用户隐私保护已经成为移动互联网用户迫切关心和亟待解决的问题。结合国内外移动互联网发展的最新趋势,对移动互联网服务和隐私保护方面的研究进行了展望。首先对当前移动互联网服务模型和移动互联网服务架构进行了评述;其次对当前的移动互联网数据传播控制机制以及隐私保护机制进行了分析和讨论;最终给出了一些潜在的研究热点,为未来研究工作指明方向。 相似文献
11.
Yu-liang Shi Yu Chen Zhong-min Zhou Li-zhen Cui 《Journal of Signal Processing Systems》2017,89(1):27-39
Nowadays big data security plays a major issue in cloud computing. Chunk-confusion-based privacy protection mechanism (CCPPM) protects the privacy of the tenants in plaintext. But both multi-tenant applications’ data and tenants’ privacy requirements are dynamically changing, which will have a great effect on the underlying storage model of cloud data. Moreover, the tenants’ business processing will change the data distribution and destroy the distribution balance of privacy data, which makes the data stored in the cloud face the risk of leakage of privacy. Therefore, the paper proposed a privacy protection evaluation mechanism for dynamic data based on CCPPM. The paper firstly introduces three kinds of the privacy leakages due to unbalanced data under the CCPPM, and analyzes two methods used for attacking. Aiming at the privacy leakages and the attack methods, we proposed a dynamic data processing algorithm to record the tenants’ operation sequence and set up the corresponding evaluation formula. Next, we evaluated the effect of privacy protection from two aspects of simple attack and background-knowledge-based attack, and used the data distribution similarity privacy preserving dynamic evaluation algorithm presented in this paper to obtain the measurement results of privacy leakages. Finally, according to the evaluation results, the defense strategies are given to prevent data privacy leakages. The experimental evaluation proves that rationality of dynamic the evaluation mechanism proposed in this paper has better feasibility and practicality for big data privacy protection. 相似文献
12.
13.
由于社会分工和资源共享的必然,公共云平台必将成为和电网、互联网等同等重要的国家基础设施。云计算面临的安全问题制约着云计算的广泛使用。数据安全在云计算中尤为重要,如何保证数据的安全性是云计算安全的核心。从数据的隐私保护计算、数据处理结果的完整性认证、数据访问权限控制以及数据的物理安全4个方面对已有研究工作进行了分类和总结,为后续云计算中数据的安全性研究提供参照。 相似文献
14.
15.
众包交通监测利用移动终端上传的GPS位置信息实时感知交通状况,具有广阔的应用前景。然而,上传的GPS信息会泄露用户隐私。该文基于博弈论分析用户上传行为,提出隐私保护的优化上传机制。首先建立用户上传行为与路况服务质量和隐私泄露之间的关系,据此构建不完全信息博弈模型,以便分析用户上传行为;然后,根据用户上传博弈纳什均衡,提出用户终端可控的隐私保护优化上传机制。理论分析表明,该文提出的上传机制最大化用户效用,具有激励相容特性;通过真实数据实验验证,上传机制能够提高用户的隐私保护度,以及算法的激励相容特性。 相似文献
16.
随着云计算、大数据、智慧城市、5G等新兴技术的快速发展,电子政务的体系架构、系统实施与安全保障技术迎来了新的机遇与挑战。同时,云计算在提供服务的同时也面临着诸多安全问题,信息资源的安全存储与用户隐私保护即是其中之一。本文首先基于云计算技术,设计了"互联网+电子政务"云平台的框架体系,然后针对电子政务服务体系中的云存储安全展开研究,提出了平台中信息资源全生命周期安全存储模型,以便保护信息资源在整个生命周期中都不会被攻击者获得。安全性分析表明,方案能够隐藏存储在云端的电子政务资源的特征,保障数据安全存储,并能对用户个人信息提供有效保护。 相似文献
17.
18.
Nowadays, cloud computing has many benefits to accessibility, scalability, and cost‐effectiveness, leading to network security risks and vulnerabilities. Cloud computing is gaining in popularity with the advances and growth of its systems. Therefore, the security of this system and the identification of vulnerable data centers are more complicated than the past. Definitely discovering vulnerable data centers that are vulnerable to attacks can help to strengthen these data centers and provide a safer and more secure network structure. This paper examines the vulnerability of malware data centers in the infrastructure and cloud computing network structure. Based on the analysis of the cloud computing system in the field of game theory, we introduce a developed model for identifying vulnerable data centers in cloud computing. The developed model in this paper is based on the game theory as a mathematical tool. According to the game theory, we introduce a measure of the degree of vulnerability of data centers in the cloud computing network. 相似文献
19.
随着云计算技术的快速发展和广泛应用,数据安全、隐私保护和访问控制方面的信息安全需求和挑战,成为云服务提供商和用户面临的主要问题。针对该问题,文中提出了基于云计算的信息安全策略和技术,包括先进的数据加密方法、强化的身份认证机制、精细化的访问控制策略以及基于云环境的入侵检测和防御系统,旨在全面提升云计算环境中的数据保护和系统安全性。实验结果表明,该安全策略和技术在云计算环境中提高了数据保护水平和系统安全性,降低了安全威胁和风险,增强了整个云服务体系的安全性和用户信任度。 相似文献