期刊文献+

云环境下LBS的对称和非对称混合加密方案 被引量:2

HYBRID SYMMETRICAL AND ASYMMETRIC ENCRYPTION SCHEME FOR LBS IN CLOUD ENVIRONMENT
下载PDF
导出
摘要 针对目前云环境下LBS的应用,在敏感身份信息和实时位置信息两方面存在的安全隐患,提出对称和非对称混合的加密方案,建立基于该保护方案的LBS安全模型。该模型利用移动用户IMSI的假名标识作为用户唯一身份,避免了敏感身份信息以明文形式传输和存储。在不引入第三方CA的前提下,通信双方采取相异的加密方法,保证了身份和位置信息在无线网络传输和云端存储的安全。最后,通过安全性分析和方案指标比较验证了方案的可行性和有效性。 Aiming at the security pitfall of LBS applications in cloud environment in two aspects of sensitive identity information and real- time position information, we put forward a hybrid symmetrical and asymmetric encryption scheme, and establish the LBS security model based on the protection of that scheme. This model uses the pseudonym logo of IMSI as the only identity of a user, which avoids the transmission and storage of sensitive identity information in plain texts form. In the premise of not introducing the third party CA, both sides in communication take different encryption methods, this guarantees the safety of identity and location information transmitted in wireless network and stored on cloud. Finally, the feasibility and effectiveness of the method is validated through security analysis and scheme indexes comparison.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第8期73-77,共5页 Computer Applications and Software
基金 国家高技术研究发展计划项目(2009AA012201)
关键词 基于位置的服务(LBS) 云存储 国际移动用户识别码(IMSI) 假名 公钥版本号 身份和位置信息 加密 Location based service(LBS) Cloud storage International mobile subscriber identification(IMSI) Pseudo Public key version number Identity and location information Encryption
  • 相关文献

参考文献12

  • 1Emmanouil M,Panayiotis K.A distributed privacy-preserving schemefor location-based queries [C]//2010 IEEK International Symposiumon A World of Wireless,Mobile and Multimedia Networks(WoW-MoM).Montreal:IEEE Computer Society,2010.
  • 2Yu Jia C,Li Chun W.A security framework of group location-based mo-bile applications in cloud coniputing[C]//TntemationaI Conference onParallel Processing Workshops.Taipei:International Association ofComputing and Communication(IACC),2011.
  • 3曾勇.一种基于非对称密钥密码体制的IMSI保护方案[J].通信技术,2008,41(9):152-154. 被引量:7
  • 4张毅,崔天喜,唐红.基于ECC组合公钥的GSM双向认证[J].计算机工程与应用,2008,44(19):109-111. 被引量:1
  • 5赵源超,李道本.移动通信用户身份保密的增强方法[J].电子与信息学报,2005,27(9):1459-1462. 被引量:1
  • 6黄汝维,桂小林,余思,庄威.云环境中支持隐私保护的可计算加密方法[J].计算机学报,2011,34(12):2391-2402. 被引量:61
  • 7张国平,樊兴,唐明,张欣雨.面向LBS应用的隐私保护模型[J].华中科技大学学报(自然科学版),2010,38(9):45-49. 被引量:6
  • 8Wen Jing L,Kui H.Security,privacy,and accountability in wireless ac-cess networks [J].IEEE Wireless Communications,2009,16(8).
  • 9Yi Ting L,Li Chun W,Rung Hung G.Implementation issues of loca-tion-based group scheduling for cloud applications[C]//IEEE VTS A-sia Pacific Wireless Communications SymposiumConference(APWCS2010).Taiwan:IEEE Computer Society,2010.
  • 10Ning Hui L,Tian Cheng L,Venkatasubramanian S.T-closeness:priva-cy beyond k-anonymity and 1-diversity [C]//International Conferenceon Data Enginering(ICDE).Istanbul:IEEE Press,2007:106-115.

二级参考文献44

  • 1粟栗,王小非,郑明辉,崔国华.基于RSA体制的数字移动通信系统用户认证方案[J].华中科技大学学报(自然科学版),2007,35(4):11-13. 被引量:1
  • 23GPP TS 03.20 V8.5.0.GSM[S/OL]. (2007-09.14).http ://www.3gpp. org/ftp/Specs/archive/03%5Fseries/03.20.
  • 3Kahate A.Cryptography and network security[M].北京:清华大学出版社,2005.
  • 4Ammayappan K,Saxena A,Negi A.Mutual authentication and key agreement based on elliptic curve cryptography for GSM[C]//International Conference on Advanced Computing and Communications, 2006 : 183-186.
  • 53GPP TS 23.003 V5.11. O, Technical Specification Group Core Network: Numbering, addressing and identification[S]. (Release 6), 20106-06.
  • 63GPP TS 33.102 V5.0. O, Technical Specification Group Services and System Aspects : 3G Security: Security Architecture[S]. (Release 5), 2002-06.
  • 73GPP TSG SA WG 3 (Security), S3-000115: Related CRs and documents on EUIC from other groups, T-Mobile[S]. 2000-02.
  • 83GPP TR 33.821YO. 3.0, Technical Specification Group Services and System Aspects: Rationale and track of security decisions in Long Term Evolved (LTE) RAN / 3GPP System Architecture Evolution (SAE) [S]. (Release 8), 2007-05.
  • 9Merike Kaeo.网络安全性设计[M].北京:人民邮电出版社,2000.
  • 10Chow C Y, Mokbel M F. Enabling private continuous queries for revealed user locations[C]//10th International Symposium. Berlin: Spinger, 2007:258 -275.

共引文献71

同被引文献23

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部