期刊文献+

物联网隐私保护研究进展 被引量:38

Advances of Privacy Preservation in Internet of Things
下载PDF
导出
摘要 物联网被越来越广泛地应用于各种不同的新型网络环境中.在物联网密文数据访问控制方面,要求对授权方实现细粒度的密文访问控制策略.然而,传统的信道安全无法满足"一对多"、"多对多"环境下抵抗密钥共享攻击等基于应用的安全与隐私保护需求.物联网隐私保护外包计算可在加密域上,保护单个数据隐私及外包计算结果隐私的前提下实现对数据的聚合和信号处理等运算,并验证其正确性.但现有工作多基于(全)同态加密技术来实现,效率低下,且不符合混合加密的基本原则.针对上述2方面问题,介绍了国际上近年来利用密码学技术的具体的解决方案,特别是阐述了该团队提出的同时满足可追踪与可撤销性的多机构属性基加密方法和在不得不使用公钥加密进行数据隐私保护的前提下,仅使用一次公钥加密来高效实现对n个数据轻量级隐私保护外包聚合的新方法.同时,对当前热门的智能电网、无线体域网和无线车载网等中的隐私保护研究进展进行了综述,给出了国内外在该领域的最新研究进展和对该领域具有挑战性的公开问题的研究情况. Internet of things(IoT)has been increasingly applied to kinds of new network environments.In the ciphertext access control of IoT,it is required to achieve fine-grained access control policy on the authorized entities.Unfortunately,the traditional communication channel security cannot well satisfy the security and privacy requirements from the"one-to-many"and "many-to-many"scenarios such as resisting the secret key sharing attack.Privacy preserving outsourced computation in IoT can realize secure data aggregation and signal processing in the encrypted domain,protect the individual data privacy and the aggregation result privacy,and verify the correctness of computation.However,most of the existing work exploited(fully)homomorphic encryption directly on data themselves,incurring inefficiency and significantly deviating from the principle of hybrid encryption.To address the issues outlined above,in this paper, we introduce recent concrete solutions exploiting cryptographic techniques,especially presenting the following two results proposed by our research team:a new mechanism of traceable and revocable attribute-based encryption and a new method of lightweight privacy preserving aggregating n data by executing the public key encryption only once.On the meanwhile,we also give a survey on the privacy preserving techniques in popular network services such as smart grid,wireless body area network and wireless vehicular ad hoc network,and suggest the recent advances and results with respect to the challenging open problems in this research field all over the world.
作者 董晓蕾
出处 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2341-2352,共12页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展计划基金项目(2012CB723401) 国家自然科学基金创新群体项目(61321064) 国家自然科学基金项目(61373154) 国家自然科学基金A3前瞻计划项目(61411146001)
关键词 物联网 隐私保护 密文数据访问控制 安全外包计算 可追踪 可撤销 轻量化 Internet of things(IoT) privacy preserving ciphertext access control secure outsource computation traceable revocable lightweight
  • 相关文献

参考文献61

  • 1Li X, Lu R, Liang X, et al. Smart Community: An Internet of Things Application [J]. IEEE Communications Magzine, 2011, 49(11):68-75.
  • 2Cao Zhenfu. New Directions of Modern Cryptography [M]. Boca Raton, FL: CRC Press Inc, 2012:1-400.
  • 3Mershad K, Artail H, A framework for secure and efficient data acquisition in vehicular ad hoc networks [J].IEEE Trans on Vehicular Technology, 201a ,62(2), 536-551.
  • 4Dong Xiaolei, Wei L, Zhu H, et al. An efficient privacy- preserving data-forwarding scheme for service-oriented vehicular Ad Hoe networks[J].IEEE Trans on Vehicular Technology, 2011, 60(2): 580-591.
  • 5Mershad K, Artail H, A framework for secure and efficient data acquisition in vehicular ad hoc networks [J]. IEEE Trans on Vehicular Technology, 2013, 62(2): 536-551.
  • 6Jinila Y B, Komathy K. A privacy preserving authentication framework for safety messages in VANET [C] //Proc of SEISCON 2013. Berlin: IET, 2013:456-461.
  • 7Guo P, Wang J, Zhu J Z, et al. Intrusion tolerant-based lightweight CA model for wireless mesh networks [J]. International Journal of Multimedia and Ubiquitous Engineering, 2013, 8(6): 19-30.
  • 8SONG Jun,HE Chunjiao,ZHANG Lei,TANG Shanyu,ZHANG Huanguo.Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs[J].China Communications,2014,11(9):93-103. 被引量:5
  • 9Dillema F W, Lupetti S. Rendezvous-based Access Control for Medical Records in the Pre-hospital Environment [C] // Proc of HealthNet. New York: ACM, 2007:1-6.
  • 10Yu S, Ren K, Lou W. FDAC: Toward fine-grained distributed data access control in wireless sensor networks [C] //Proc of IEEE INFOCOM 2009. Piscataway, NJ: IEEE, 2009:963-971.

二级参考文献21

  • 1Weigle M. Standards: WAVE/DSRC/802.11 p [J]. Vehicular Networks CS, 2008, 795-895.
  • 2Song J, Zhuang Y, Pan J, et al. Certificateless Secure Upload for Drive-thru Internet[C]//Com- munications (ICC), 2011 IEEE International Con- ference on Communications. Kyoto, Japan, June 2011.1-6.
  • 3Lippold G, Boyd C, Nieto J G. Strongly secure certificateless key agreement[M]//Pairing-Based Cryptography-Pairing 2009. Springer Berlin Heidelberg. Palo Alto, CA, USA, August 2009, 206-230.
  • 4Dong X, Wei L, Zhu H, et al. : An Efficient Pri- vacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks[J]. Vehicular Technology, IEEE Transactions on, 2011, 60(2): 580-591.
  • 5Shamir A. Identity-based cryptosystems and signature schemes[C]//Advances in cryptology. Springer Berlin Heidelberg, 1985: 47-53.
  • 6Huang H, Cao Z. An ID-based authenticated key exchange protocol based on bilinear Dif- fie-Hellman problem[C]//Proceedings of the 4th international Symposium on Information, Computer, and Communications Security. ACM, 2009: 333-342.
  • 7AI-Riyami S S, Paterson K G. CBE from CL-PKE: A generic construction and efficient schemes[M]// Public Key Cryptography-PKC 2005. Springer Berlin Heidelberg, 2005: 398-415.
  • 8Dent A W. A survey of certificateless encryption schemes and security models[J]. International Journal of Information Security, 2008, 7(5): 349- 377.
  • 9Yang G, Tan C H. Strongly secure certificateless key exchange without pairing[C]//Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011: 71-79.
  • 10Hartenstein H, Laberteaux K P. A tutorial survey on vehicular ad hoc networks[J]. Communica- tions Magazine, IEEE, 2008, 46(6): 164-171.

共引文献30

同被引文献295

引证文献38

二级引证文献548

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部