Font Size: a A A

Research On Security And Privacy Protection In Mobile Computing

Posted on:2019-07-13Degree:DoctorType:Dissertation
Country:ChinaCandidate:J W KangFull Text:PDF
GTID:1318330545996715Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless communication technologies,mobile computing has combined with popular technologies,such as Internet of Things,fog computing,and blockchain.Mobile computing has extended many emerging application scenarios about intelligent transportation area,healthcare area,and energy management area.Typical emerging scenarios include mobile cloud computing based or fog computing based vehicular networks,mobile cloud computing based smart healthcare,and blockchain based Internet of Things.Although mobile computing has high potential in the above emerging scenarios,these scenarios face many security and privacy challenges.It is because of the inherent openness of mobile computing networks,resource limitation of mobile terminals,and dynamic network topology.This brings a lot of obstacles to the design of security and privacy protection solutions in mobile cloud computing.However,traditional security and privacy protection schemes do not fit in these emerging scenarios.Security and privacy issues have gradually become a huge challenge for emerging mobile computing scenarios,and even become one of the bottlenecks in the development of mobile computing.Therefore,new security and privacy protection schemes for these emerging mobile computing scenarios have attracted widely attention from academic and industrial researchers.This thesis focuses on the security and privacy protection in several emerging mobile cloud computing scenarios.The main contributions include the following four aspects:(1)Location privacy protection in vehicular networks:In vehicular networks,vehicles need to broadcast safety messages to surrounding vehicles during driving in order to improve driving safety.There are location-related information in these safety messages,such as identity information,real-time location,and other privacy information,resulting in potential security attacks and privacy leakage.Existing researches show that anonymous broadcast of safety message using pseudonyms is an effective solution for security and privacy protection.However,vehicles need sufficient pseudonyms to meet the requirement of periodically changing their pseudonyms during driving,so as to ensure anonymity and thus protect location privacy.This thesis discusses pseudonym management issues in mobile cloud computing based vehicular networks.A three-layer on-demand pseudonym distribution and management system is also designed to ensure secure communication and privacy protection of vehicles.After that,we use a newsvendor model to address the optimal on-demand pseudonym distribution problem according to various traffic loads in different clouds for maximizing utilization efficiency of the pseudonyms.Compared with average distribution scheme,our proposed scheme has 18.3%higher benefit on average.(2)To overcome big delay and high overhead of traditionally centralized pseudonym management schemes,we propose a new paradigm named fog based vehicular networks to manage and distribute pseudonyms.In fog based vehicular networks,a pseudonym based privacy protection framework is proposed by using abundant network edge resources.In this framework,the pseudonym management in this thesis is shifted to specialized fogs at the network edge named pseudonym fogs.A context-aware pseudonym changing game and secure pseudonym management communication protocols are also proposed to enhance location privacy and reduce communication overhead for vehicles.The increase of pseudonym entropy in the proposed scheme is 8%higher than that of the existing scheme.(3)Secure data sharing in smart healthcare:For healthcare scenarios,it is very important to realize real-time healthcare monitoring and electronic medical records sharing.However,wireless body area networks in smart healthcare are vulnerable to security attacks,and electronic medical records sharing between doctors and patients is easy to leak privacy information.And traditional security protection schemes cannot guarantee the security of wireless body area networks and privacy protection.To address these problems,this thesis proposes a hierarchical mobile cloud computing framework with three layers for pervasive healthcare.The scalable and hierarchical mobile cloud framework can be used to disperse the global storage and management load.We also study the social characteristics of patients,and divide the patients into different social groups for efficient management.A secure electronic medical record sharing scheme and a real-time health information transmission scheme are proposed to guarantee secure communication and privacy protection of the patients.(4)Secure energy trading in Industrial Internet of Things(IIoT):In energy management scenarios,Peer-to-Peer(P2P)energy trading ubiquitously takes place in various IIoT scenarios,e g.,microgrids,energy harvesting networks,and vehicle-to-grid networks.However,there are common security and privacy challenges caused by untrusted and nontransparent energy markets in these scenarios.To address the security challenges,we exploit the consortium blockchain technology to propose a secure energy trading system named energy blockchain getting rid of a trusted intermediary.Besides,to reduce the transaction limitation resulted from transaction confirmation delays on the energy blockchain,we propose a credit-based payment scheme to support fast and frequent energy trading.An optimal pricing strategy using Stackelberg game for credit-based loans of the credit bank is also proposed to achieve secure and efficient energy trading in industrial Internet of things.Compared with the average allocation of loans and the random allocation schemes,the revenue of the credit bank is increased by 64.8%and 226.9%,respectively.
Keywords/Search Tags:Mobile computing, fog computing, blockchain, Internet of Things, security and privacy protection
PDF Full Text Request
Related items