期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
改进区块链的移动网络敏感数据防篡改仿真 被引量:4
1
作者 高珍 张国伟 《计算机仿真》 北大核心 2023年第3期409-412,430,共5页
针对敏感数据在移动网络传输中易受到篡改的问题,提出基于区块链的移动网络敏感数据防篡改方法。采用数据挖掘技术提取移动网络数据中的敏感数据集,根据得到的信息建立敏感数据集合有效关联规则,结合最小范数和全局搜索匹配算法认证敏... 针对敏感数据在移动网络传输中易受到篡改的问题,提出基于区块链的移动网络敏感数据防篡改方法。采用数据挖掘技术提取移动网络数据中的敏感数据集,根据得到的信息建立敏感数据集合有效关联规则,结合最小范数和全局搜索匹配算法认证敏感数据;通过同态加密算法聚合敏感数据,引入区块链技术加密聚合后的敏感数据,实现移动网络敏感数据防篡改传输。实验结果表明,所提方法能够有效地降低信息损失度、附加信息损失度和隐匿度,缩短运行时间。 展开更多
关键词 区块链 移动网络敏感数据 防篡改 敏感数据提取 敏感数据加密
下载PDF
基于区块链的畜牧养殖资产监管身份认证研究 被引量:11
2
作者 杨信廷 王杰伟 +3 位作者 邢斌 罗娜 于华竟 孙传恒 《农业机械学报》 EI CAS CSCD 北大核心 2021年第11期170-180,共11页
针对畜牧养殖资产监管系统数据采集源头设备不可信,牲畜个体身份标识识别复杂,养殖敏感数据机密性差等问题,提出一种基于区块链技术和聚合签名算法的畜牧资产身份认证方案,实现资产监管系统中数据采集源头、数据存证展示的全流程真实可... 针对畜牧养殖资产监管系统数据采集源头设备不可信,牲畜个体身份标识识别复杂,养殖敏感数据机密性差等问题,提出一种基于区块链技术和聚合签名算法的畜牧资产身份认证方案,实现资产监管系统中数据采集源头、数据存证展示的全流程真实可信,以及监管系统各节点、各物联网设备间身份验证的可信可溯,有效保障了畜牧资产监管系统从区块链网络到节点及物联网设备间细粒度的身份验证。在此基础上对方案进行混淆性分析和通信数据量分析,结果表明,加密过程的扩散性测试密文改变率平均为93.61%,相关性测试密文改变率平均为93.28%,具有较高的混淆性,并将通信量由线性级降低为常量级,验签耗时平均节省40.01%,有效降低数据传输通信量和系统验证开销,具有高效的批量身份验证性能,满足畜牧资产监管过程中设备身份认证需求。 展开更多
关键词 畜牧养殖 畜牧资产监管 身份认证 聚合签名 区块链 敏感数据加密
下载PDF
MobiGemini:Sensitive-Based Data and Resource Protection Framework for Mobile Device 被引量:1
3
作者 Shuangxi Hong Chuanchang Liu +2 位作者 Bo Cheng Bingfei Ren Junliang Chen 《China Communications》 SCIE CSCD 2017年第7期67-77,共11页
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. I... With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP(Ali Pay) on mobile device. Therefore, only encryption cannot protect sensitive APP and privacy data stored on user's smartphone. To address these obstacles, we design a protection system called Mobi Gemini. It enables automatic uninstalling service that can immediately uninstall multiple APP at same time, and also enabling plausibly deniable encryption(PDE) on mobile devices by hiding encrypted volume within random data in free space of cache partition. We improve the key store way of previous PDE schemes on mobile device. The evaluation results show that the scheme introduces a few overhead compared with original android system enabling full disk encryption. 展开更多
关键词 mobile security privacy protection storage encryption deniable encryption
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
4
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部