期刊文献+

移动互联网环境下终端与服务器安全交互的研究 被引量:3

Secure communication between terminal and server in the mobile internet environment
下载PDF
导出
摘要 移动互联网的飞跃式发展与智能终端成本的降低,惠及了众多的普通消费者,移动互联时代用户的隐私与信息安全变得更为重要.针对Wi Fi热点环境下用户隐私与数据容易泄露的环节,对比传统的常用加密算法与使用效果,提出了一种基于OAuth协议的令牌机制的安全交互方式,它可以在保证用户相关隐私与信息安全的同时,保证服务器的响应速度,且在用户的应用存在风险或异常时,可及时提醒并引导用户进行相关安全操作.压力测试结果表明该设计是有效可行的. The rapid development of mobile Internet and the continuing decline of intelligent terminal cost attract more and more users,thus the user's privacy and information security becomes significant in the mobile Internet era.In this paper,we analyze the weak link in user's information security in Wi Fi hotspot environment,then compare the application effect of two conventional encryption algorithms,thereafter propose a secure communication based on token mechanism in OAuth protocol,which can ensure the security of user privacy,keep the server at high response speed,even can timely remind and guide the user in case of information risk or abnormality in the user's application. Finally,this design is applied in the system,and the stress test results show that the proposed design is effective.
出处 《南京信息工程大学学报(自然科学版)》 CAS 2015年第5期422-426,共5页 Journal of Nanjing University of Information Science & Technology(Natural Science Edition)
基金 南京信息工程大学滨江学院2014届优秀本科毕业论文支持计划(BYW002063)
关键词 移动互联网 OAuth协议 安全交互 mobile internet OAuth protocol secure communication
  • 相关文献

参考文献8

  • 1IETF. The OAuth 2. 0 authorization framework [ EB/OL ].[2014-04-30] .http : // tools.ietf.org/html/rfc6749.
  • 2Stinson D H.密码学原理与实践[M].2版.冯登国,译.北京:电子工业出版社,2005.
  • 3安慧科技.OpenSSL心脏出血漏洞全回顾[EB/OL].[2014-04-25 ]. http: // www. freebuf. com/articles/network/32171. html.
  • 4Lodderstedt T,McGloin M,Hunt P. OAuth 2.0 threatmodel and security considerations [ EB/OL]. [ 2014-03-30] .http: //tools.ietf.org/html/rfc6819.
  • 5IETF.The OAuth 2.0 authorization framework : Bearertoken usage[ EB/OL]. [ 2014-04-30] .http : //self-issued,info/docs/draft-ietf-oauth-v2-bearer.html.
  • 6Shrawankar M, Shrivastava A K. Comparative study of se-curity mechanisms in multi-cloud environment [ J ]. Inter-national Journal of Computer Applications, 2013,77 (6):9-13.
  • 7Wang C,Chow S S M,Wang Q,et al.Privacy-preservingpublic auditing for secure cloud storage [ J ]. IEEE Trans-actions on Computers, 2013,62 (2) : 362-375.
  • 8Bessani A,Correia M,Quaresma B, et al. DepSky: De-pendable and secure storage in a cloud-of-clouds [ C ] //Proc of the 6th Conf on Computer System. New York:ACM,2011:31-46.

同被引文献7

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部