Font Size: a A A

Symmetrical And Asymmetric Hybrid Encryption Scheme Of Lbs In Cloud Environment

Posted on:2014-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:A ChenFull Text:PDF
GTID:2248330398976908Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the vigorous development of the mobile intelligent terminal and the third-generation mobile communication technology,LBS technology which can meet users real-time to enjoy a variety of information services related to the location,has been rapid development.Mobility and uncertainty of the users’location have brought new markets and challenges for mobile communication,but also the business opportunities for the development and prosperity of the development of mobile location service.But while users enjoy the convenience of LBS, the user’s privacy information also is facing many security issues, which has become the new concerns.Especially with the advent and popularization of the concept of cloud, the LBS services in the cloud environment is facing more complex safety hidden hazards than traditional LBS platform.This paper, based on the study of the principle and architecture of LBS, analyzes safety hidden hazards of LBS in the identity and location,and learns the domestic and foreign scholars in the study of the security protection about the identity privacy, the location privacy,the trajectory privacy and so on.In order to protect the security of LBS.,the paper decides to consider the security about the idenity and location privacy information in wireless network transmission and cloud storage.And then I have studied the cryptography theory,from which focus on the principle of symmetric encryption and AES algorithm,the principle of asymmetric encryption and ECC algorithms, and the PKI mechanism.As Mentioned Above,symmetrical and asymmetric hybrid encryption scheme is putted forward,and LBS security model based on the protection of the scheme is constructed.This model uses the pseudonym logo of IMSI as a user only identity,which can avoid the plain texts of sensitive identity information are transferred and storaged.Using key factor matrix and the random number ensures key update respectively in different encryption system,which not only implements the key updated during a certain period of time, but also makes the updated key have the characteristics of uniqueness and randomness.In the premise of not all process referred to the third party CA,both sides of communication take different encryption methods,which guarantees the safety of identity and location information on cloud storage and wireless network transmission.Finally, through the analysis and comparision with other schemes, this article shows the security of the scheme;and through testing and analysis the encryption algorithm, the feasibility and effectiveness of the scheme is validated.
Keywords/Search Tags:LBS, cloud storage, IMSI, pseudo, combined Public Key, identityand location information, encryptio
PDF Full Text Request
Related items