期刊文献+

物联网空间内LBS隐私安全保护模型研究 被引量:5

Privacy-preserving model of LBS in Internet of Things
下载PDF
导出
摘要 为解决物联网空间内LBS服务的隐私安全问题,在分析物联网环境中的LBS服务框架的基础上,针对其面临的各种隐私安全威胁及安全需求,基于匿名通信原理和可计算加密思想设计了一种支持真实身份、实体位置和服务内容等LBS隐私保护的安全模型,提出采用Onion Routing算法和全同态加密算法实现该模型。模型实现算法的分析表明,该模型可实现身份匿名、位置保护、服务加密等,对物联网空间内LBS隐私具有很好的安全保护。 To solve the problem, the framework, various privacy threats and security needs of LBS in IoT are discussed, and a privacy-preserving model is designed which can protect privacy of real identity, physical location and service con-tent in IoT. The privacy security model is realized by using Onion Routing algorithm and fully homomorphic encryption algorithm. The analysis shows that this model can realize identity anonymity, position protection, service encryption, etc., and can keep safe of LBS privacy in IoT.
作者 路红 廖龙龙
出处 《计算机工程与应用》 CSCD 2014年第15期91-96,106,共7页 Computer Engineering and Applications
关键词 物联网 基于位置的服务 隐私保护 匿名通信 全同态加密 Internet of Things location based service privacy-preserving anonymous communication fully homomor-phic encryption
  • 相关文献

参考文献24

  • 1Chen Chun-Te,Lee Kun-Lin, Wu Ying-Chi, et al.Construc- tion of the enterprise-level RFID security and privacy management using role-based key management[C]//IEEE International Conference on Systems: Man and Cybernetics, 2006:3310-3317.
  • 2刘艮,蒋天发.同态加密技术及其在物联网中的应用研究[J].信息网络安全,2011(5):61-64. 被引量:11
  • 3暴磊,张代远,吴家宝.物联网与隐私保护技术[J].电子科技,2010,23(7):110-112. 被引量:14
  • 4Yao A.Protocols for secure computation[C]//Proc of the 23rd IEEE Symposium on Foundations of Computer Sci- ence, 1982: 160-164.
  • 5Li J,Wang Q, Wang C, et al.Fuzzy keyword search over encrypted data in cloud computing[C]//Proc of the 29th IEEE International Conference on Computer Communi- cations (INFOCOM 2010) , San Diego, CA, USA, 2010: 441-445.
  • 6黄汝维,桂小林,余思,张进,卿杜政.支持隐私保护的云存储框架设计[J].西安交通大学学报,2011,45(10):1-6. 被引量:12
  • 7张逢喆,陈进,陈海波,臧斌宇.云计算中的数据隐私性保护与自我销毁[J].计算机研究与发展,2011,48(7):1155-1167. 被引量:53
  • 8Beresford A R, Stajano F.Location privacy in pervasive computing[J].IEEE Pervasive Computing, 2003,2 ( 1 ) : 46-55.
  • 9张国平,樊兴,唐明,张欣雨.面向LBS应用的隐私保护模型[J].华中科技大学学报(自然科学版),2010,38(9):45-49. 被引量:6
  • 10Thomas J,Liu L.Protecting location privacy with person- alized k-anonymity: architecture and algorithms[J].IEEE Transactions on Mobile Computing, 2008,7 (1) : 1-18.

二级参考文献104

  • 1王庚,张淼.校园网的升级与改造[J].中南民族大学学报(自然科学版),2004,23(3):72-74. 被引量:5
  • 2王鑫.基于Hibernate的O/R映射数据持久化的研究[J].中南民族大学学报(自然科学版),2005,24(3):81-84. 被引量:12
  • 3朱青,王珊,丁博麟,张孝,蔡宏艳,姚佳丽.基于数据网格面向服务的查询算法[J].计算机学报,2006,29(7):1234-1240. 被引量:8
  • 4CHAUM D L.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM 1981,24(2):84-88.
  • 5DOUGLAS K.A taxonomy for and analysis of anonymous communications networks[D].Ohio:Air Force Institute of Technology,2009.
  • 6REED M G,SYVERSON P F,GOLDSCHLAG D M.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communications,1998,16(4):482-494.
  • 7BANSOD N,MALGI A,CHOI B K,et al.MuON:Epidemic based mutual anonymity[C]// Proceedings of the 13th IEEE International Conference on Network Protocol.Boston,MA:IEEE Computer Society,2005:99-109.
  • 8HAN JIN-SONG,LIU YUN-HAO.Rumor riding:Anonymizing unstructured peer-to-peer systems[C]// Proceedings of the 14th IEEE International Conference on Network Protocol.Santa Barbara,CA:IEEE Computer Society,2006:22-31.
  • 9SERJANTOV A.Anonymizing censorship resistant systems[C]// IPTPS 2002:Proceedings of the 1st International Peer to Peer Systems Workshop.London:Springer,2002:111-120.
  • 10DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:The second-generation onion router[C]// Security'04:Proceedings of the 13th USENIX Security Symposium.San Diego,CA:USENIX Press,2004:303-320.

共引文献155

同被引文献41

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部