Font Size: a A A

Key Technologies Of Privacy Preservation For Information Exchange

Posted on:2017-12-29Degree:DoctorType:Dissertation
Country:ChinaCandidate:K GengFull Text:PDF
GTID:1368330542493468Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With rapid development of network technology and information technology and the widespread popularization of application system,it promotes the concept of Ubiquity Networks,which contains LAN,internet,Internet of things,mobile Internet,etc.,and has many features like open,heterogeneity,mobility,dynamic,multi-security domain,etc.The information transmission of Ubiquity Networks can be summarized as accessing the"Network of Networks" via "System of Systems".As the main entity of information exchange,information random access across systems need to face with kinds of problems,such as risks in the leakage of privacy information,the separation of data ownership and data management,untrusted transmission path,resource-constrained,great difference of the node processing power,unevenness of security defense ability of different information systems,diverse fusion of privacy protection scheme,etc.These problems make the technology of traditional network service architecture,construction of the path and private information matching fail to meet the privacy protection requirements in information exchange.To solve the security problems in information exchange crossing different systems,we make the comprehensive analysis of the proxy service architecture in information exchange,the discovery of trusted path,the exchange and matching of privacy information and focus on the security key technologies of privacy protection in information exchange by integrating the theories of probability theory,information entropy,homomorphic encryption and public key cryptography.The major contributions of this paper are as follows:(1)An agency-based mobile Internet privacy protection mechanism is proposed by discussing the service broker architecture of privacy protection in mobile internet.To satisfy the variety and real-time requirement of privacy protection of Intelligent terminal user in the mobile Internet environment,based on the inherent structure system of the current mobile Internet services,the mechanism adds different levels and types of proxy gateway on the basis of different types of services and make hierarchical classification processing of mass data with different types by taking advantage of the pretreatment of the agent.This mechanism can realize targeted private registration.In the design of proxy gateway,privacy protection module is added into different levels of proxy gateway to response user's request faster by the corresponding history query information in buffer pool.On this basis,as an example of location privacy,a background-based lightweight privacy protection scheme is designed and realized using the technology of k-anonymity and l-diversity.(2)A PKI-based trustworthy path discovery mechanism(TPDM)is proposed by discussing trusted path discovery mechanism looking on privacy information exchange.This mechanism is consisted of trusted node discovery protocol and neighbor node discovery protocol in the new service model.By this mechanism,source node can find a trusted path to destination node and each intermediate node can also find its neighbor node,which can ensure the security and reliability of communications transmission between the network device nodes and can also reduce communication delay.In the exchange of private information,Information transmission path is divided to trajectory privacy,so finding a trusted path discovery mechanism can avoid privacy risk bringing by leakage of transmission path.Further,based on reliable transmission path,we can use lightweight protect method to reduce the resource consumption of user and resource consumption when designing privacy protection scheme.(3)A private matching-based service broker found method is proposed by discussing private information matching mechanism with dynamic change of privacy measures across systems.To satisfy the requirement for performance,cost and security of agency from user in the service broker found and solve the privacy preserving problems in the demand for matching,we make the comprehensive consideration of the private data information of agency,user attribute and its preference and find the best matching job agent chain through all the job agent chains,based on Paillier homomorphic encryption algorithm.This mechanism introduce master agent to control the business type and connection status of child agent on the global level and screen all the existing and reasonable job agent chains.Also on the premise of using the semantic security of Paillier homomorphic encryption algorithm to ensure algorithm security,the master agent assumes the main computation overhead,which not only remits the calculating pressure of user terminal but also reduces the operation cost of the whole.In this mechanism,we turn the preference degree of property into bi-values before executing encryption algorithms to make a further cut of computing cost.This mechanism supports multiple attribute data matching which has preferences information to satisfy the requirement of user and agency in service performance and privacy protection by finer classification.This mechanism also combines the Euclidean distance with Paillier homomorphic encryption algorithm and guarantees the security of user and agency effectively.
Keywords/Search Tags:Privacy Information Exchange, Privacy Preservation, Service Proxy Architecture, Fain-Grained Side Information, Privacy Matching
PDF Full Text Request
Related items