随着网络服务的发展与人们对隐私要求的日益提高。在提供用户通信匿名的基础上,产生了保护服务器匿名性的需求。第二代洋葱路由The Second Generation Onion Router(Tor)的隐匿服务功能就完美地实现了这样的需求。然而自其提出至今已逾1...随着网络服务的发展与人们对隐私要求的日益提高。在提供用户通信匿名的基础上,产生了保护服务器匿名性的需求。第二代洋葱路由The Second Generation Onion Router(Tor)的隐匿服务功能就完美地实现了这样的需求。然而自其提出至今已逾10年,其隐匿服务技术并未得到良好的发展。近年来,随着网络服务规模的不断扩大,在Tor网络上架设大型网络服务,或将网络服务迁移至Tor网络中的需求逐渐增多。然而,在隐匿服务设计之初,由于其实现只考虑了单核单线程的情况,并未能充分利用现在流行的多核架构,也不支持负载均衡等技术。因而,其可扩展性成为了服务提供者需要解决的首要问题。本文通过使用相同的主机名与私钥运行多个隐匿服务实例来解决其可扩展性问题,并使用Shadow在离线环境下进行仿真,最终通过实验分析了这种方式对Tor隐匿服务带来的性能提升及可能存在的问题。展开更多
由于k-匿名方法不仅能降低用户的计算开销,还能提供准确的查询结果,已被广泛用于位置隐私保护。然而,现有方案在匿名区构造过程中均未考虑位置服务提供商(LSP,location-based service provider)的查询区域面积,导致LBS查询服务质量降低...由于k-匿名方法不仅能降低用户的计算开销,还能提供准确的查询结果,已被广泛用于位置隐私保护。然而,现有方案在匿名区构造过程中均未考虑位置服务提供商(LSP,location-based service provider)的查询区域面积,导致LBS查询服务质量降低。为了解决上述问题,将用户的查询范围引入到匿名区的构造中,匿名服务器首先生成满足用户隐私保护需求的初始子匿名区,再以LSP的查询区域面积为判定标准进行子匿名区合并。安全性和实验分析表明,所提方案在保护用户隐私的同时,能有效降低LSP的查询区域面积,从而提高LBS查询的服务质量。展开更多
The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable conne...The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers.The goal is the remote monitoring of a patient’s physiological data by physicians.Moreover,this system can reduce the number and expenses of healthcare centers,make up for the shortage of healthcare centers in remote areas,enable consultation with expert physicians around the world,and increase the health awareness of communities.The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process,which should maintain the privacy of patients,and the integrity of remote medical instructions.Current research results indicate the need of a flexible authentication scheme.This study proposes a scheme with enhanced security for healthcare IoT systems,called an end-to-end authentication scheme for healthcare IoT systems,that is,an E2EA.The proposed scheme supports security services such as a strong and flexible authentication process,simultaneous anonymity of the patient and physician,and perfect forward secrecy services.A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks.A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication,computation,and storage,and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems.展开更多
When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of p...When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of privacy information.To solve this problem,a new generalized k-anonymity location privacy protection scheme in location based services(LPPS-GKA)with the third trust servicer is proposed.And it can guarantee the users get good location-based services(LBS)without leaking the information of the geo-location region,which has protected the perfect privacy.Analysis shows that LPPS-GKA is more secure in protecting location privacy,including region information,and is more efficient than other similar schemes in computational and communicational aspects.It is suitable for dynamic environment for different user’s various privacy protection requests.展开更多
Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonym...Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection (L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms.展开更多
文摘随着网络服务的发展与人们对隐私要求的日益提高。在提供用户通信匿名的基础上,产生了保护服务器匿名性的需求。第二代洋葱路由The Second Generation Onion Router(Tor)的隐匿服务功能就完美地实现了这样的需求。然而自其提出至今已逾10年,其隐匿服务技术并未得到良好的发展。近年来,随着网络服务规模的不断扩大,在Tor网络上架设大型网络服务,或将网络服务迁移至Tor网络中的需求逐渐增多。然而,在隐匿服务设计之初,由于其实现只考虑了单核单线程的情况,并未能充分利用现在流行的多核架构,也不支持负载均衡等技术。因而,其可扩展性成为了服务提供者需要解决的首要问题。本文通过使用相同的主机名与私钥运行多个隐匿服务实例来解决其可扩展性问题,并使用Shadow在离线环境下进行仿真,最终通过实验分析了这种方式对Tor隐匿服务带来的性能提升及可能存在的问题。
文摘由于k-匿名方法不仅能降低用户的计算开销,还能提供准确的查询结果,已被广泛用于位置隐私保护。然而,现有方案在匿名区构造过程中均未考虑位置服务提供商(LSP,location-based service provider)的查询区域面积,导致LBS查询服务质量降低。为了解决上述问题,将用户的查询范围引入到匿名区的构造中,匿名服务器首先生成满足用户隐私保护需求的初始子匿名区,再以LSP的查询区域面积为判定标准进行子匿名区合并。安全性和实验分析表明,所提方案在保护用户隐私的同时,能有效降低LSP的查询区域面积,从而提高LBS查询的服务质量。
文摘The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers.The goal is the remote monitoring of a patient’s physiological data by physicians.Moreover,this system can reduce the number and expenses of healthcare centers,make up for the shortage of healthcare centers in remote areas,enable consultation with expert physicians around the world,and increase the health awareness of communities.The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process,which should maintain the privacy of patients,and the integrity of remote medical instructions.Current research results indicate the need of a flexible authentication scheme.This study proposes a scheme with enhanced security for healthcare IoT systems,called an end-to-end authentication scheme for healthcare IoT systems,that is,an E2EA.The proposed scheme supports security services such as a strong and flexible authentication process,simultaneous anonymity of the patient and physician,and perfect forward secrecy services.A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks.A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication,computation,and storage,and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems.
基金This work was supported in part by the National Natural Science Foundation of China(Nos.61272492 and 61572521),Shaanxi Province Natural Science Foundation of China(No.2015JM6353)and the Basic Foundation of Engineering University of CAPF(No.WJY201521).
文摘When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of privacy information.To solve this problem,a new generalized k-anonymity location privacy protection scheme in location based services(LPPS-GKA)with the third trust servicer is proposed.And it can guarantee the users get good location-based services(LBS)without leaking the information of the geo-location region,which has protected the perfect privacy.Analysis shows that LPPS-GKA is more secure in protecting location privacy,including region information,and is more efficient than other similar schemes in computational and communicational aspects.It is suitable for dynamic environment for different user’s various privacy protection requests.
基金supported by the National Natural Science Foundation of China (Nos.61370192,61432015,61428203,and 61572347)the US National Science Foundation (Nos.CNS-1319915 and CNS-1343355)
文摘Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection (L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms.