排序方式: 共有166条查询结果,搜索用时 46 毫秒
81.
在无线传感网络的研究中,保护隐私数据聚集算法是一个关键问题.设计高效的具有隐私保护功能的数据聚集算法,降低通信带宽,提高网络的寿命和安全性是保护私隐数据聚集研究中的热点问题.国内外现有的保护隐私数据聚集算法,除PEQ(Privacy-preserving Scheme for Exact Query Evaluation)算法外,其它算法大多是根据不同的统计数据类型来设计相应的保护隐私的数据聚集算法,这些算法只能聚集某一种数据,功能单一,应用起来具有一定的局限性.同时,PEQ算法的通信带宽和计算量都比较大.针对上述问题,设计了一种基于数据混淆的数据汇集算法.该算法通过在数据聚集前加入混淆数据,聚集结束后删除混淆数据,来达到保护隐私的目的.与现有的其它方案相比,该方案计算和通信开销较少,并且一次可以聚集多种统计数据. 相似文献
82.
利用标准模型下的单跳代理重签名技术,提出一个可追溯的车载自组网(VANET)隐私保护认证协议,其中,交通管理中心TRC授权路边单元RSU作为代理,将车载单元OBU签名的消息以TRC的名义进行代理重签名,从而防止根据签名追踪OBU,并能在TRC的协助和授权下,进一步通过RSU的配合准确快速地追溯消息签名的真实产生者。数字签名和时间戳技术的应用使协议能够抵御伪造消息和重放消息攻击。分析结果表明,该协议能够达到VANET条件隐私的目标,满足标准模型下代理重签名的安全性要求,与其他经典协议相比,存储开销更小,运行效率更高。 相似文献
83.
Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead. 相似文献
84.
针对社交网络隐私保护方案的安全性证明问题,提出了一种可证明安全的社交网络隐私保护方案。首先,通过分析社交网络中节点隐私的安全需求(不可区分的节点结构和不可区分的发送消息),分别建立其安全模型;其次,基于该安全模型运用双线性映射构造社交网络节点隐私保护方案;最后,证明了该方案是可证明安全的,并且分析和对比了该方案的安全性,分析结果表明,该方案除了具有可证明安全性外,还能抵抗再识别攻击、推理攻击和信息聚集攻击。 相似文献
85.
针对开放网络中进行指纹身份认证时的双方指纹隐私保护问题,提出了基于Fingercode和同态加密的指纹认证方案。相较传统方案,该方案中服务器端模板以加密形式保存,保护了用户指纹数据的安全性;设计了安全认证协议,使得服务器和用户可以联合计算双方指纹特征的距离而不会泄露各自特征数据的隐私。协议中采用了数据打包技术,能够明显减轻服务器与用户之间的通讯压力和计算复杂度。分析和实验结果表明,该方案具有安全性和一定的实用性。 相似文献
86.
87.
位置k-匿名技术假设匿名集内的用户具有相同的安全性,这与现实情况不符. 借鉴安全多方计算理论,提出了一种分布式结构下的无用户协作位置隐私保护方法. 该方法仍然基于时空匿名思想,利用不经意传输概念设计了隐私感知查询协议. 安全性分析和仿真实验结果表明,该方法不仅满足位置k-匿名和位置模糊的条件,而且取得了更高的隐私性. 相似文献
88.
89.
90.
The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications. 相似文献