Font Size: a A A

Research On Privacy Protection Policy Based On Privacy Homomorphism In IOT

Posted on:2013-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:W BaoFull Text:PDF
GTID:2248330377455277Subject:Information security
Abstract/Summary:PDF Full Text Request
Internet of things got much concern once put forward and has become one of the ten technologies which change the world. Undoubtedly, personal privacy protection is involved in the application of Internet of things.And it will severely hampert the development of Internet of things unless this problem is properly handled. At present, the research of fully homomorphism technology attracted much attention in the password. Fully homomorphism can directly compute the encrypted ciphertext to get a output. If we decrypt the output, the result will be the same with what we do the same operation on the original plaintext which is not encrypted.In this paper, we first comprehensively described the solutions of privacy protection in existing Internet of things. Then we put forward that fully homomorphisms technology could be applied to Internet of things so that services provided by network will be safer. After analysing the basic composition and system architecture in existing Internet of things, we set up a interactive model of privacy protection in which fully homomorphism is used. Next, we improved MRS algorithm which is realized by simple homomorphism, and proposed a general homomorphisms encryption theory according to some security issues in the special algorithm enhancement.In the process of constructing the homomorphism system theory, we mainly analysed the principle of the realization of fully homomorphismsthe according to three steps of constructing homomorphism encryption system in Craig Gentry. Meanwhile, we comparatively analysed the two solutions of compressing decryption functions to make homomorphisms system bootstrappable. Besides, we proposed some improvement in initial solution that is how to realize fully homomorphismskey to improve the efficiency of secret key and reduce the storage space of public key. Finally, we realized Boolean homomorphic encryption according to the results of theory research, and analyzed the relationship between safety factor value and the initialization, encryption, and the ciphertext operation time ofthe algorithm.
Keywords/Search Tags:Internet of things, individual privacy protection, MRS algorithm, fully homomorphism, bootstrappable
PDF Full Text Request
Related items