Font Size: a A A

Research On Privacy Preserving And Authentication Protocols

Posted on:2024-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z X YaoFull Text:PDF
GTID:2568307124971969Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of Internet of Things(IoT)technology,more and more data acquisition devices are connected to the network,forming a huge data sharing network.Various data acquisition methods and data types have brought great convenience to human work and life.However,behind the convenience,data security issues such as privacy leakage and information tampering frequently occur,which cause huge losses to social development and personal life.Therefore,it’s significant to ensure the data security of IoT.Privacy protection and authentication protocol research are two important methods to achieve data security in the IoT.Privacy protection prevents sensitive information leakage from the perspective of data processing,and authentication protocols ensure the reliability of message from the perspective of communication.This research takes unmanned aerial vehicle(UAV)aerial photography and vehicular ad hoc networks(VANET)communication as examples to study the privacy information processing in aerial photography data and reliable authentication protocols for VANET,respectively.The research designed appropriate schemes to achieve effective privacy protection and information authentication.The specific research is as follows.(1)A GAN-based privacy-protecting method for aerial photography is proposed,called PPUP-GAN.Aerial photography technology can obtain comprehensive image information from the air,while which may contains unnecessary privacy information in the background.In most existing research,it’s difficult to preserve the utility after privacy processing.To ensure the balance between image privacy and utility,in PPUP-GAN,target objects and background information in the image are defined separately.Then,the balance of privacy protection and utility-preserving can be achieved by maintaining the content of the objects of interest while changing the content of the privacy-related background.Specifically,the image-to-image transformation method is adopted to reduce the risk of privacy leakage of background and the processed image can still be analyzed for subsequent research.We evaluate our method on a real-world UAV image dataset.Experimental results show that our methods can greatly reduce the probability of bystanders being detected in the background.And the security analysis shows that the PPUP-GAN has the ability to resist model inversion attacks(2)An VANET data authentication protocol with attribute-based proxy re-encryption is proposed.In the communication of VANET,frequent data exchange occurs between infrastructure and vehicles.Encryption and authentication are important methods to protect data privacy and security.However,only some specific vehicles could access the message with their secret keys in most encrypted communication.When other vehicles do need to access the message,there will produce many encryption redundancies for the same message.Thus,the proposed protocol adopts attribute-based proxy re-encryption to solve the encryption redundancy.By shifting the reencryption work to roadside units(RSUs)and cloud servers,the computation overhead of the trusted authority(TA)is significant reduced.Besides,pseudonym and batch verification are introduced in authentication work to ensure the security.The security analysis shows that our scheme meets the secure requirements of VANET.The simulation evaluates the cost of single phase,which demonstrated that the proposed scheme has a low computation cost and reduces the redundancy work.
Keywords/Search Tags:Privacy Protection, Message Authentication, Arial photography, Generative Adversarial Networks, Vehicular Ad Hoc Networks
PDF Full Text Request
Related items