期刊文献+

移动网络中隐私保护的付费机制 被引量:1

Privacy-preserving Payment Mechanism in Mobile Network
下载PDF
导出
摘要 由于无线网络的开放性,在移动设备和服务器的交互过程中可能存在用户身份及服务信息的隐私泄露问题。为此,提出一种保护移动网络中用户隐私的付费机制。服务器采用密文策略属性加密方法向用户发送请求结果,相比采用传统加密方法更加高效。使用假名实现多用户联合请求某一种或多种服务,在实现隐私保护同时降低用户的成本。分析结果表明,该机制能够保护用户身份隐私,实现通信安全,降低服务器端的计算和通信代价。 Due to the openness of wireless network,user identity and service information may leak in the interaction between mobile devices and servers. Therefore, this paper puts forward a payment mechanism to protect the privacy of mobile network users. In this mechanism, servers adopt the method of Ciphertext Policy Attribute Based Encryption( CP- ABE) to send results to users, which is more efficient than using the traditional encryption method. Furthermore, by using pseudonyms, multiple users can make an joint request to get one or more services, which reduces the cost for users while protecting their privacy. Analysis results show that the mechanism can protect the privacy of user identity, realize secure communication, and reduce the cost of server-side computation and communication.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第8期107-111,116,共6页 Computer Engineering
基金 国家自然科学基金资助项目(61173188) 安徽省科技攻关计划基金资助项目(1401b042015) 安徽省高校自然科学研究基金资助重点项目(KJ2013A017)
关键词 移动社交网络 移动用户 隐私保护 付费服务 属性加密 mobile social network mobile user privacy-preserving paid service attribute encryption
  • 相关文献

参考文献15

  • 1Sweeney L.K-anonymity:A Model for Protecting Privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570.
  • 2Samarati P.Protecting Respondents Identities in Microdata Release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1010-1027.
  • 3Um J H,Kim Y K,Lee H J,et al.K-nearest Neighbor Query Processing Algorithm for Cloaking Regions Towards User Privacy Protection in Location-based Services[J].Journal of Systems Architecture,2012,58(9):354-371.
  • 4Liu Xinxin,Liu Kaikai,Guo Linke,et al.A Gametheoretic Approach for Achieving K-anonymity in Location Based Services[C]//Proceedings of IEEE INFOCOM’13.Washington D.C.,USA:IEEE Press,2013:2985-2993.
  • 5Lu Rongxing,Lin Xiaodong,Shi Zhiguo,et al.PLAM:A Privacy-preserving Framework for Local-area Mobile Social Networks[C]//Proceedings of IEEE INFOCOM’14.Washington D.C.,USA:IEEE Press,2014:763-771.
  • 6Lan T.Secure Mechanism Based on Concurrent Signature for Mobile Payment Services[C]//Proceedings of the 3rd IEEE International Conference on Communication Software and Networks.Washington D.C.,USA:IEEE Press,2011:435-438.
  • 7Bethencourt J,Sahai A,Waters B.Ciphertext-policy Attribute-based Encryption[C]//Proceedings of EEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:321-334.
  • 8Goyal V,Pandey O,Sahai A,et al.Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2006:89-98.
  • 9Cheung L,Newport C.Provably Secure Ciphertext Policy ABE[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:456-465.
  • 10孙国梓,董宇,李云.基于CP-ABE算法的云存储数据访问控制[J].通信学报,2011,32(7):146-152. 被引量:64

二级参考文献32

  • 1王连强,张剑,吕述望,刘振华.一种基于密码的层次访问控制方案及其分析[J].计算机工程与应用,2005,41(33):7-10. 被引量:2
  • 2张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 3KWAK H, LEE C, PARK H, et al. What is Twitter, a social network or a news media[A]. Proceedings of the 19th International Conference on World Wide Web[C]. Raleigh, NC, USA, 2010. 591-600.
  • 4FOGEL J, NEHMAD E. Internet social network communities: risk taking, trust, and privacy concerus[J]. Computers in Human Behavior, 2009, 25(1): 153-160.
  • 5LUCAS M, BORISOV N. Flybynight: mitigating the privacy risks of social networking[A]. Proceedings of the 7th ACM Workshop on Pri- vacy in the Electronic Society[C]. Alexandria, VA, USA, 2008. 1-8.
  • 6GUHA S, TANG K, FRANCIS P. NOYB: privacy in online social networks[A]. Proceedings of the First Workshop on Online Social Networks[C]. Seattle, WA, USA, 2008.49-54.
  • 7LUO W, XIE Q, HENGARTNER U. Facecloak: an architecture for user privacy on social networking sites[A]. Proceedings of the 12th International Conference on Computational Science and Engineering (CSE 2009)[C]. Vancouver, BS, Canada, 2009.26-33.
  • 8SUN J, ZHU X, FANG Y. A privacy-preserving scheme for online social networks with efficient revocation[A]. Proceedings of the 29th International Conference on Computer Communications (INFOCOM 2010)[C]. SanDiego, CA, USA, 2010. 1-9.
  • 9BADEN R, BENDER A, SPRING N, et al. Persona: an online social network with user-defined privacy[A]. Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (SIGCOMM 2009)[C]. Barcelona, Spain, 2009. 135-146.
  • 10JAHID S, MITTAL P, BORISOV N. EASIER: encryption-based ac- cess control in social networks with efficient revocation[A]. Proceed- ings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)[C]. HungKong, China, 2011. 411-415.

共引文献76

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部