Font Size: a A A

Application Research Of Privacy-preserving Data Security Sharing And Exchange

Posted on:2022-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:D LiFull Text:PDF
GTID:2518306533950019Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the development of the Internet,users have an increasing demand for network security,and a large amount of data such as online payments and social activities are generated almost all the time in life.In different industries,complex interactive business scenarios of multiple fields and multiple enterprises,it also involves the aggregation of multi-party data.These massive amounts of heterogeneous data do not only contain great value,but also contain a large amount of personal privacy,which in turn leads to multiparty trust issues such as data ownership and data security.In the process of data sharing and exchange,there are more and more direct or indirect data privacy leakage problems.As encryption technology becomes more and more mature,some researchers use the characteristics of encryption technology to provide a strong guarantee for data security and reduce the risk of data leakage.However,some of these encryption technologies need too much time cost,and some of them may not be able to resist all kinds of attacks.Therefore,it is particularly important to design a data security sharing and exchange scheme that can resist all kinds of attacks with less time costs.Based on the above problems,this paper designs a novel and efficient data security sharing and exchange platform in the field of self-service medical diagnosis and locationbased service.The specific contributions are as follows:(1)The self-serviced medical diagnosis data security sharing and exchange platform is proposed.The platform uses “Internet + Intelligent Medical” to aggregate the best diagnosis results of various diseases in the hospital server,which is convenient for patients to obtain their desired query results efficiently and accurately.In addition,using the decentralized feature of secure multi-party computation can solve the problem of relying on trusted third party in real life.The feature of homomorphic encryption technology is that the result of ciphertext processing is consistent with that of plaintext processing,so homomorphic encryption technology can solve the security problem in the process of data sharing and exchange.Moreover,using the similarity to define by Euclidean distance to quantify the disease situation of patients and set a disease prediction threshold,so that patients can further understand their own disease and get the best diagnosis results.(2)The data security sharing and exchange system in location-based services is proposed.The system constructs a new user query model,which can be dynamically updated according to the real-time change of users' data,so that the users can search more conveniently.In addition,matrix encryption technology is used to encrypt the data in the system.This method can ensure that the data in the system cannot be leaked.It is difficult for external attackers to obtain and analyze the data by using the previous knowledge in a limited time.According to the proposed inner product encryption algorithm,the cloud server can use it without decrypting the users' encrypted query request and return the most accurate query results,because only the first K most relevant query results need to be returned,so it can greatly save bandwidth and improve query efficiency.In this system,the cloud server does not need to be completely trusted,it is just a tool to process encrypted data,it cannot infer the users' privacy data according to the information obtained,which can solve the problem of completely relying on trusted third party in real life.(3)In the above two areas,a two-way identity authentication scheme based on BLS signature technology is constructed,which can effectively prevent unauthorized data demander and data provider from stealing data stored in the other party or cloud server.In addition,the security of the proposed data sharing and exchange system platform is analyzed from various security threats,and the ideal results are obtained.In the performance evaluation stage,the computational complexity and the cost of time and space of the system platform are also analyzed,and good experimental results are obtained.
Keywords/Search Tags:Secure multi-party computation, Homomorphic encryption, Data sharing and exchange, Matrix encryption, Privacy-preserving, Security
PDF Full Text Request
Related items