Font Size: a A A

Research And Implementation Of Privacy Protection Based On Man-machine-object Collaboration

Posted on:2021-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:S S WuFull Text:PDF
GTID:2438330647958907Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Data security and privacy protection is a major concern in today's society.In some emergency situations,it is necessary to obtain authorization for temporary access to related privacy data by breaking through conventional methods.This phenomenon is called " break the glass ".In daily life and work,although this emergency measure is simple and effective,it brings hidden security risks to private data.Therefore,how to protect the security of private data in the case of " break the glass " is an urgent problem to be solved.Based on the definition of the policy space,this thesis uses formal tools to perform bigraph modeling of the policies in each space,and gives a specific access request evaluation process in the policy space.And when an "break the glass" situation occurs,specific countermeasures and solutions are given.This article then models a real-life scenario in a hospital to verify whether the strategies defined in each space have potential risks.Finally,this thesis implements a prototype tool to transform the hospital topology into an initial model and transform the access control policy into reaction rules.The main contents are:First of all,to address the issue of privacy protection,the access control strategy and its combination of description method are proposed from the perspective of human-machine-trinity integration.Then,the strategy of each space is exemplified separately and use the formal method to perform bigraph modeling.Finally,for a specific access request,the evaluation process in the strategy space is given.Secondly,for the problem that the defined access control strategy has ambiguity that will lead to the leakage of user privacy data,a formal modeling method is proposed to verify the strategy space.And taking a small scene in a hospital as an example,a method for modeling with formal tools(Bigraph)is given.First of all,the physical environment and network environment must be statically modeled.After having the initial model,you must also define the reaction rules that make the model forward.For reasons of space,this thesis only introduces a few common operations,including login,logout,read,write and other seven operations,and use Bigraph to represent.The most important thing is to define the nature of the need for model checking.Here we mainly check whether authorization in the policy space will cause information leakage in the hospital system.If a loophole is detected,relevant personnel can make timely corrections to prevent the hospital from causing major losses.Finally,a prototype tool is designed in this thesis.This prototype tool can convert the network and physical topology environment to the initial model of the bigraph,and convert the access control policy into reaction rules.Thereby greatly reducing the requirements of practitioners related to bigraph modeling.
Keywords/Search Tags:Privacy protection, access control, bigraph modeling, property detection, prototyping tool
PDF Full Text Request
Related items