期刊文献+

SecureWeb: Protecting Sensitive Information Through the Web Browser Extension with a Security Token 被引量:2

SecureWeb: Protecting Sensitive Information Through the Web Browser Extension with a Security Token
原文传递
导出
摘要 The leakage of sensitive data occurs on a large scale and with increasingly serious impact. It may cause privacy disclosure or even property damage. Password leakage is one of the fundamental reasons for information leakage, and its importance is must be emphasized because users are likely to use the same passwords for different Web application accounts. Existing approaches use a password manager and encrypted Web application to protect passwords and other sensitive data; however, they may be compromised or lack accessibility. The paper presents SecureWeb, which is a secure, practical, and user-controllable framework for mitigating the leakage of sensitive data. SecureWeb protects users' passwords and aims to provide a unified protection solution to diverse sensitive data. The efficiency of the developed schemes is demonstrated and the results indicate that it has a low overhead and are of practical use. The leakage of sensitive data occurs on a large scale and with increasingly serious impact. It may cause privacy disclosure or even property damage. Password leakage is one of the fundamental reasons for information leakage, and its importance is must be emphasized because users are likely to use the same passwords for different Web application accounts. Existing approaches use a password manager and encrypted Web application to protect passwords and other sensitive data; however, they may be compromised or lack accessibility. The paper presents SecureWeb, which is a secure, practical, and user-controllable framework for mitigating the leakage of sensitive data. SecureWeb protects users' passwords and aims to provide a unified protection solution to diverse sensitive data. The efficiency of the developed schemes is demonstrated and the results indicate that it has a low overhead and are of practical use.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期526-538,共13页 清华大学学报(自然科学版(英文版)
基金 supported by the National Key Basic Research Program of China (No. 2013CB834204) the National Natural Science Foundation of China (Nos. 61672300 and 61772291) the Natural Science Foundation of Tianjin, China (Nos. 16JCYBJC15500 and 17JCZDJC30500) the Open Project Foundation of Information Security Evaluation Center of Civil Aviation, and Civil Aviation University of China (No. CAACISECCA-201702)
关键词 password manager data privacy format-preserving encryption Shadow Document Object Model(DOM) password manager data privacy format-preserving encryption Shadow Document Object Model(DOM)
  • 相关文献

参考文献2

二级参考文献14

  • 1Spies T. Format preserving encryption [EB/OL]. [2012-01-13]. http ://15 7.2 38.212. 4 5/pdf/Voltage-Security- WhitePaper-For mat-Preserving-Encryption.pdf.
  • 2Spies T. Feistel finite set encryption mode [EB/OL]. [2012-01-13 ]. http ://csrc. nist.gov/groups/ST/toolkit/BCM/ docments/ proposedmodes/ffsem/ ffsem-spec.
  • 3FIPS Pub 74. Guidelines for Implementing and Using the NBS Data Encryption Standard [S]. USA: U.S. National Bureau, 1981.
  • 4Brightwell M, Smith H E. Using datatype-preserving en- cryption to enhance data warehouse security [C]// Proceed- ing of National Information Systems Security Conference. Baltimore: National Institute of Standards and Technology, 1997: 141-149.
  • 5Black J, Rogaway P. Ciphers with arbitrary finite domains [C]//Proceeding of Topics in Cryptology CT-RSA 2002. San Jose: Springer-Verlag, 2002:185-203.
  • 6Bellare M, Ristenpart T, Rogaway P, et al. Format preserving encryption [C]// Proceeding of the Selected Areas in Cryp- tography 2009. Calgary: Springer-Verlag, 2009: 295- 312.
  • 7Liskov M, Rivest R L, Wagner D. Tweakable block ciphers [C]//Proceeding of Advances in Cryptology CRYPTO 2002. Santa Barbara: Springer-Verlag, 2002:31-46.
  • 8Schneier B, Kelsey J. Unbalanced feistel networks and block cipher design [C]//Proceeding of Fast Software Encryption 1996. Cambridge: Springer-Verlag, 1996: 121-144.
  • 9Bellare M, Rogaway P, Spies T. The FFX mode of operation for format-preserving encryption [EB/OL]. [2012-07-14]. http://www.csrc.nist.gov/groups/ST/toolkit/BCM/documents/p roposedmodes/ffx/ffx-spec.pdf.
  • 10Bellare M, Rogaway P, Spies T. Addendum to the 'The FFX mode of operation for format-preserving encryption' [EB/OL]. [2012-01 - 13 ]. http://csrc, ncsl. nist.gov/groups/ST/toolkit/BCM/ documents/proposedmodes/ffx/ffx-spec2.pdf .

共引文献12

同被引文献7

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部