Font Size: a A A

Protection Strategy Of Privacy Data For The Internet Of Things

Posted on:2013-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:C L ZhouFull Text:PDF
GTID:2248330377458510Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Internet of Things (IoT) is not only based on the sensor networks but also on thefoundation of Internet, which aims to connect all the objects around the world together. Thedevelopment of IoT will lead the third revolution after the single computer era and Internetear for the information industry. The large-scale connection of things will cause much moreinformation security problems, especially the objects which are in the ubiquitous networkswill need more privacy protection. Therefore, the privacy protection in IoT is theinfrastructure services for its secure and smooth development.The technology of IoT is a new networking technology which reconciles the technologyof Internet, sensor networks, AD HOC and pervasive computing. The future IoT aims toprovide ubiquitous services, as a result of that the whole life of humans will be undersurveillance. Thus, as the popularity of IoT, a great quantity of private information willgenerate. The simple combination of original technology for privacy protection cannot meetthe requirement for the IoT which needs effective ways. Up to now, there is no precisedefinition or description for the IoT, so we need to represent the network model when studyon the issues. In this network model, we focus on how to locate, store and protect privateinformation according to the characteristics of the IoT. Research on new technique forprivacy protection is significantly important.In this thesis, we focus on three parts:(1) the hierarchical model on locating, storing andprocessing private information for the IoT;(2) the original protection methods for privacy andcharacteristics of the IoT;(3) New method for privacy protection according to thecharacteristics of the IoT. We will solve three problems:(1) access and process structureprivate data;(2) fine-grained encryption for structure private data;(3) the key managementfor fine-grained encryption. We will offer technique reference and lay a foundation for theprivacy protection strategy.
Keywords/Search Tags:Internet of things, privacy protection, fine-grained encryption, key management
PDF Full Text Request
Related items