Font Size: a A A

Scheme On Sensitive Information Protection Using Attribute-based Ring Signcryption For Named Data Networking

Posted on:2018-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:N N LiuFull Text:PDF
GTID:2348330536980377Subject:Internet of Things works
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology,the communication way for the host can't deal with the content centric user 's requirement effectively.Named Data Networking(NDN)takes the content as the first entity,which is the most competitive Internet architecture.In the initial designing of the NDN architecture,designers embedding security into the protocol stack,which has some advantages compared with the TCP/IP network.However,in the process of transmission and verification of packet,there are still some problems about the leakage of sensitive information.Aiming at the above problems,this thesis designs a kind of sensitive information protection model in NDN network,and explains the model's system structure and working principle in detail.At the same time,this thesis gives the security definition and formal description.Under the condition of specific security assumption,the using of attribute-based ring-signcryption,a sensitive information protection scheme in NDN is implemented.The safety is analyzed from the aspects of publishers,consumers,NDN routers and multi-authorities.And this thesis analyzed the leakage problem of sensitive information for package under the basic service model about NDN network.This scheme uses attribute ring-signcryption algorithm to guarantee the anonymity of the publishers and the receivers,and induce the length of ciphertext.The publisher only needs ring-signcryption algorithm to complete the sending of the same message to multi-authorities users at the same time.So that will greatly improve the transmission rate of the contents of packet.Multi-authorities generate public keys for the publisher,and generate private keys for consumers and routers.The publisher makes use of public key to make ring-signcrypt,and consumers use private key to unsigncrypt.Routers can use private key to verify data packets which will store in CS,and all routers are trusted.Finally,in this thesis,in order to verify whether our scheme can protect participants' sensitive information effectively,we prove adaptive chosen ciphertext attack,unforgeability and indistinguishability under the random oracle model.Compared with the existing schemes,this scheme has some advantages in security and efficiency,and can induce the length of ciphertext in a way.
Keywords/Search Tags:Sensitive Information Protection, Named Data Networking(NDN), Attribute Ring Signcrypt, privacy leakage, Date packets
PDF Full Text Request
Related items