期刊文献+

移动云计算环境下动态数据隐私密码机制仿真 被引量:4

Dynamic Data Privacy Password Mechanism Simulation in Mobile Cloud Computing Environment
下载PDF
导出
摘要 数据加密是当前保障数据隐私安全的主要途径,针对现有隐私保护机制的加密过程中,部分加密数据特征明显易被破解,以及加密过程耗时长等问题,提出一种基于随机树的动态数据隐私密码机制。以云计算动态数据的定义域、值域以及所设密钥为依据,构建数据随机树;通过随机树父节点随机分解完成动态数据的区域划分,根据得到的与数据点对应的子节点的值域计算父节点之间的条件熵。结合条件熵值进行数据重构,利用模糊函数对重构数据进行映射,得到数据伪随机序列,完成动态数据加密。仿真证明,所提数据隐私保护机制的加密与解密时间更少,隐私保护效果更好。 The data encryption is the main way to ensure data privacy and data security. The encryption process of existing privacy protection mechanisms need to take a long time. Therefore,we focus on a dynamic data privacy password mechanism based on random tree. Based on the definition domain,value domain and secret key of cloud computing dynamic data,we built a data random tree. According to the parent node of random tree,we carried out the random decomposition to complete regional division of dynamic data. According to the range of values of sub nodes corresponding to data points,we calculated the conditional entropy between parent nodes. Combined with the conditional entropy,we reconstructed the data. Finally,we used the fuzzy function to map the reconstructed data and obtained the data pseudo-random sequence. Thus,we could complete the dynamic data encryption. Simulation proves that the proposed data privacy protection mechanism needs less time for encryption and decryption. Meanwhile,it has better privacy protection.
作者 殷小虹 胡丹 胡全连 YIN Xiao-hong;HU Dan;HU Quan-lian(Nanehang Institute of Science & Technology,Nanehang Jiangxi 330108, China;Jiangxi NormalUniversity,Jiangxi Nanehang 330022,China)
出处 《计算机仿真》 北大核心 2019年第1期222-225,共4页 Computer Simulation
基金 江西省教育厅科学技术研究项目(GJJ161679)
关键词 云计算 动态数据 隐私密码 数据加密 Cloud computing Dynamic data Privacy password Data encryption
  • 相关文献

参考文献10

二级参考文献85

  • 1翁健,陈泯融,杨艳江,邓慧杰,陈克非,鲍丰.无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案[J].中国科学:信息科学,2010,40(2):298-312. 被引量:8
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3YANG D J, XUE G L, FANG X, et al. Incentive mechanisms for crowdsensing: crowdsourcing with smartphones[J]. IEEE/ A CM Transactions on Networking, 2015, 99: 1-13.
  • 4GAO S, MA J F, SHI W S, et al. TrPF: A trafectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887.
  • 5MOHAN P, PADMANABHAN V N, and RAMJEE R. Nericelh rich monitoring of road and traffic conditions using mobile smartphones[C]. Proceedings of the ACM Conference on Embedded Networked Sensor Systems, North Carolina, 2008: 323-336.
  • 6MONTJOYE Y A, HIDALGO C A, VERLEYSEN M, et al. Unique in the crowd: The privacy bounds of human mobility[R]. Nature Science Report, Cambridge, 2013.
  • 7CHRIS M, DAVID Y, and NUNG Y. Privacy vulnerability of published anonymous mobility traces[J]. IEEE Transactions on Networking, 2013, 21(3): 720-733.
  • 8孙利民,李红,王笑寒,等.物联网位置隐私保护综述[J].软件学报,2014,25(s1):1-10.
  • 9SHI E, CHANT H, RIEFFEL E, et al. Privacy-preserving aggregation of time-series data[C]. Proceedings of 18th Network & Distributed System Security Symposium, California, 2011: 1-17.
  • 10HOH B, GRUTESER M, XIONG H, et al. Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking [J]. IEEE Transactions on Mobile Computing, 2010, 9(8): 1089-1107.

共引文献109

同被引文献78

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部