Font Size: a A A

Research On Privacy Protectionmodel And Methods In Network Interaction

Posted on:2012-08-12Degree:MasterType:Thesis
Country:ChinaCandidate:J XuFull Text:PDF
GTID:2178330338991438Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As network applications and services become more ubiquitous, many different ways of network interaction have emerged, and are becoming more and more complicated. All kinds of user private information are transferred and communicated during network interaction. Internet privacy issue has become a focus of publicattention and a serious threat to social networks and the Internet economy's healthydevelopment.Therefore, providing end users with the level of privacy that they can totally control in the network interaction environment has become a major research challenge.Users are oftenforced to provide their signature private or sensitive information toservice providers during network interaction. Due to many technical and administrativereasons, user's private information is often poorly managedand sometimes abused after the interaction, resulting inserious privacy violations. However, most of the netvorkinteractions are temporary and time sensitive. There is no need to provide user private information for the life time.Based on this principle and the analysis of previous work, we proposed a new method to protect user privacy. By generating temporary user information, and using temporary user information instead of signature user information during an network interaction, the proposed method can better protect user privacy.In this thesis, we describe the principle and build process of this model in detail, and display how it is used in user email address protection. Based on this new network interactive privacy protection model, consider mailbox interaction environment, we put forward a privacy protection method with anti spam, protect users email address. Then we build a platform in our laboratory environment, and we implemented the method by programming and verified the email address protection of the model.
Keywords/Search Tags:Network Interaction, Privacy Protection, Anti Spam
PDF Full Text Request
Related items