a国产,中文字幕久久波多野结衣AV,欧美粗大猛烈老熟妇,女人av天堂

面向智能移動終端的隱私保護技術(shù)研究

發(fā)布時間:2018-06-18 02:36

  本文選題:移動互聯(lián)網(wǎng) + 智能移動終端; 參考:《華中科技大學(xué)》2016年博士論文


【摘要】:移動互聯(lián)網(wǎng)將信息技術(shù)的發(fā)展帶入了一個新時代,對人類的發(fā)展有著極為深刻的意義,已經(jīng)影響到了人類生產(chǎn)生活的各個領(lǐng)域。然而,人們在享受移動互聯(lián)網(wǎng)帶來便利的同時,也更多地將自己的信息參與到網(wǎng)絡(luò)之中,使得個人信息的隱私度降低,從而面臨著隱私方面的安全威脅。用戶所使用的移動終端往往包含大量的用戶隱私信息,一旦用戶隱私數(shù)據(jù)泄露,若不采取相應(yīng)的保護措施,則其產(chǎn)生的后果及造成的經(jīng)濟損失是無法估量的。隨著隱私的安全問題的漸漸凸顯,用戶對自身的隱私的關(guān)注度也逐漸提高。目前國內(nèi)外對隱私保護機制的研究方興未艾,對于智能移動終端的隱私保護技術(shù)尚存在一些亟待深入研究的問題。首先,移動終端應(yīng)用程序過度獲取用戶隱私的問題。傳統(tǒng)方法中允許或者阻止應(yīng)用程序或者服務(wù)訪問用戶隱私數(shù)據(jù)比較簡單直接,但是可能會對實時性和可用性產(chǎn)生影響。另外,傳統(tǒng)的移動終端隱私保護主要研究阻止隱私泄露的方法,而缺少研究基于粒度為基礎(chǔ)的隱私策略定制問題;其次,智能移動終端可能存在的傳感器隱私泄露問題。目前移動終端涉及傳感器泄露隱私的方式越來越多,但是其對應(yīng)的保護方法往往治標不治本,并且有些保護方案并不能面面俱到,可能會給移動用戶帶來新的威脅:最后,當前移動終端隱私保護研究主要關(guān)注如何保護用戶隱私數(shù)據(jù),而忽視了移動終端本身。智能移動終端的遺失作為用戶擔心最多的隱私泄露渠道,傳統(tǒng)的追溯系統(tǒng)存在嚴重的隱私問題,持續(xù)的接收設(shè)備的位置會導(dǎo)致用戶認為在被持續(xù)監(jiān)控,因此產(chǎn)生嚴重的心理障礙。首先,基于位置粒度的移動終端隱私保護機制,能夠解決移動終端應(yīng)用程序過度獲取用戶位置隱私的問題。該機制能夠根據(jù)用戶制定LBS(Location Based Services)應(yīng)用的隱私策略,將精確位置信息模糊化處理為不同精確級的位置數(shù)據(jù)并返回給上層應(yīng)用,以達到在不依賴第三方的情況下,最大限度地維持LBS應(yīng)用的可用性,并且實時高效地保護用戶位置隱私數(shù)據(jù)。其次,針對移動終端可能存在的傳感器隱私泄露防護問題,傳感器隱私訂制策略的概念被提出來,目的在于讓用戶對智能手機中所有的感知應(yīng)用程序設(shè)置隱私策略,控制它們訪問傳感器的權(quán)限。以傳感器隱私訂制策略為基礎(chǔ),基于傳感器的移動終端隱私保護機制,能夠解決智能手機上的傳感器可能被惡意者利用來竊取用戶的隱私信息的問題。該機制其能夠讓用戶根據(jù)自己的需求為智能手機上的應(yīng)用程序定制傳感器隱私策略,并且在運行時阻止惡意程序?qū)鞲衅鞯姆欠ㄔL問,同時維持合理的開銷。最后,基于云存儲的保密追溯機制能夠有效緩解智能移動終端遺失追溯中的隱私問題,該機制不僅能讓用戶充分享受云存儲帶來的服務(wù),而且可以最大限度的保護用戶位置隱私信息不被泄露。在智能移動終端引入云計算能夠解決智能移動終端計算能力和存儲能力不足的問題,通過使用云存儲設(shè)施之一的網(wǎng)絡(luò)硬盤作為存儲設(shè)施,采用基于位置感應(yīng)的數(shù)據(jù)采集方式收集設(shè)備的位置信息,以及適用于移動設(shè)備的加密算法對位置信息進行加密發(fā)送,從而克服了對可信第三方的依賴,保護了用戶的位置隱私,節(jié)省了數(shù)據(jù)流量并且提高了位置追蹤的效率。綜上所述,通過使用面向智能移動終端隱私保護機制,可以為智能移動終端應(yīng)用程序提供不同粒度的隱私保護,也可以根據(jù)用戶需求,為應(yīng)用程序制定隱私策略,全面保護位置信息以及傳感器信息等隱私,也可以使用基于云存儲的保密追溯機制在不泄露隱私的情況下找回遺失的智能移動終端。
[Abstract]:The mobile Internet has brought the development of information technology into a new era, which has a profound significance to the development of human beings. It has already affected all fields of human production and life. However, while people are enjoying the convenience of the mobile Internet, they are also more involved in the network, making the personal information hidden. There is a security threat to privacy. The mobile terminal used by the user often contains a large number of user privacy information. Once the user's privacy data is leaked, the consequences and economic losses caused by the user's privacy data are immeasurable. With the security of privacy, the problem of security is becoming more and more important. The attention of users to their privacy is also increasing. At present, the research on the privacy protection mechanism at home and abroad is in the ascendant, and there are still some problems to be deeply studied for the privacy protection technology of the intelligent mobile terminal. First, the problem of overtaking the privacy of the users by the mobile terminal applications is allowed or prevented from the traditional methods. Accessing user privacy data with programs or services is simple and direct, but it may have an impact on real time and availability. In addition, traditional mobile terminal privacy protection mainly studies methods to prevent privacy disclosure, but lacks research on granularity based privacy policy customization. Secondly, intelligent mobile terminals may exist. At present, there are more and more ways for mobile terminals to disclose privacy of sensors, but their corresponding protection methods often do not run the rule, and some protection schemes are not available, which may bring new threats to mobile users. Finally, the current research on the privacy protection of mobile terminals is mainly concerned. How to protect the user's privacy data, but ignore the mobile terminal itself. The loss of the smart mobile terminal is the most worrying privacy leak channel for the user. The traditional traceability system has serious privacy problems. The location of the continuous receiving device will lead to the users think that it is constantly monitored. The location granularity mobile terminal privacy protection mechanism can solve the problem of excessive access to user location privacy by mobile terminal applications. This mechanism can make LBS (Location Based Services) application of privacy policy based on users, and fuzzification of precise location information into different precise level of location data and return to the upper application. To maximize the availability of LBS applications without relying on third parties, and to protect user location privacy data in real time and efficiently. Secondly, the concept of sensor privacy policy is proposed in view of the potential privacy disclosure protection problems of mobile terminals. All of the perceived applications set up privacy policies to control their access to the sensor. Based on sensor privacy reservation strategy and sensor based mobile terminal privacy protection mechanism, it can solve the problem that sensors on a smartphone may be exploited by malicious users to steal user privacy information. Users customize the privacy policy for the applications on the smartphone based on their own needs, and prevent the malicious access of the malicious program to the sensor at run time, while maintaining a reasonable cost. Finally, the secret tracing mechanism based on cloud storage can effectively alleviate the privacy problems in the traceability of the intelligent mobile terminal. It can not only allow users to fully enjoy the services brought by the cloud storage, but also maximize the protection of user location privacy information. The introduction of cloud computing in intelligent mobile terminals can solve the problem of insufficient computing power and storage capacity of intelligent mobile terminals, by using a network hard disk as one of the cloud storage facilities as a storage device. By using the location based data collection method, the location information of the equipment is collected, and the encryption algorithm suitable for mobile devices is used to encrypt the location information, thus overcoming the dependence on the trusted third party, protecting the user's location privacy, saving the data flow and improving the efficiency of location tracking. Through the use of intelligent mobile terminal privacy protection mechanism, it can provide different granularity privacy protection for intelligent mobile terminal applications. It can also make privacy policies for applications, protect location information and sensor information in an all-round way according to user needs, and can also use cloud storage based privacy tracing mechanism. Find the lost smart mobile terminal without revealing the privacy.
【學(xué)位授予單位】:華中科技大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2016
【分類號】:TP309

【相似文獻】

相關(guān)期刊論文 前10條

1 喬軍;吳瑞華;熊才平;;智能移動終端的教學(xué)應(yīng)用及前景分析[J];現(xiàn)代遠距離教育;2013年02期

2 王鳳偉;邢志紅;金龍俊;山毓俊;;智能移動終端程序開發(fā)的研究[J];計算機與網(wǎng)絡(luò);2013年14期

3 沈明杰;鮑立威;;智能移動終端:物聯(lián)網(wǎng)終端的新寵——淺談智能移動終端的發(fā)展現(xiàn)狀和展望[J];射頻世界;2010年06期

4 龔潔中;陳恭亮;李建華;;智能移動終端的信任管理技術(shù)研究[J];中國電子科學(xué)研究院學(xué)報;2011年06期

5 謝世逸;葛永軍;;基于車聯(lián)網(wǎng)的智能移動終端的設(shè)計與實現(xiàn)[J];科技創(chuàng)新與應(yīng)用;2012年34期

6 萬美芝;;基于智能移動終端應(yīng)用于企業(yè)信息管理系統(tǒng)的研究[J];中國電業(yè)(技術(shù)版);2013年12期

7 陳奕儒;;智能移動終端已經(jīng)邁出改變世界的兩條腿[J];電子制作;2014年06期

8 楊志;;現(xiàn)代傳播中的智能移動終端[J];傳播與版權(quán);2014年06期

9 李強;;智能移動終端的數(shù)據(jù)傳輸信源加密設(shè)計[J];電子設(shè)計技術(shù);2011年01期

10 ;保障智能移動終端安全性的8大簡單步驟[J];計算機與網(wǎng)絡(luò);2012年08期

相關(guān)會議論文 前6條

1 駱傳寶;;三維GIS在智能移動終端的應(yīng)用[A];2013年度江蘇省測繪學(xué)會年會論文集[C];2013年

2 史漢新;王勇;;智能移動終端在國土資源執(zhí)法監(jiān)察中的應(yīng)用[A];2013年度江蘇省測繪學(xué)會年會論文集[C];2013年

3 王卓;包杰;;嵌入式linux在智能移動終端的開發(fā)應(yīng)用[A];第九屆全國青年通信學(xué)術(shù)會議論文集[C];2004年

4 呂煒科;;基于可信計算的智能移動終端安全體系研究[A];2012全國無線及移動通信學(xué)術(shù)大會論文集(下)[C];2012年

5 陳曉江;馮健;馬東海;房鼎益;;一個智能移動終端白板系統(tǒng)的設(shè)計與實現(xiàn)[A];第三屆和諧人機環(huán)境聯(lián)合學(xué)術(shù)會議(HHME2007)論文集[C];2007年

6 柴焱;李s,

本文編號:2033639


資料下載
論文發(fā)表

本文鏈接:http://www.wukwdryxk.cn/shoufeilunwen/xxkjbs/2033639.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶ad361***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
欧美一级免费看| 无码喷水一区二区浪潮av| 日本成a人片在线播放| 婺源县| 国产精品久久久久久久蜜臀| 熟睡中被进了h青梅诱哄视频| 老色鬼在线精品视频在线观看| 国产成人Av片无码免费| 色窝窝无码一区二区三区成人网站| 巴林左旗| 超碰人妻在线| 最爽free日本人妖shem| 久久精品国产亚洲AV麻豆蜜芽| 影音先锋男人午夜资源站| 亚洲日韩一区二区一无码| 久久午夜夜伦鲁鲁片免费无码影视 | 国产农村一国产农村无码毛片| 欧美亚洲中文另类图片| 97无码视频在线看视频| 不卡av中文字幕手机看| 小荡货奶真大水多好紧视频| 国产av一区二区三区日韩接吻 | 99精品国产一区二区| 波多野结衣AV一区二区全免费观看| 67194日韩熟妇在线进入| 么公在厨房猛进猛出| 久久人妻AV中文字幕| 尤物网址在线观看| 亚洲中文久久精品无码1| 国产精品久久国产精品99| 无码国产福利AV私拍| 国产高清在线A视频大全| 成人午夜性A级毛片免费| 蜜臀AV无码精品人妻色欲| 被两个两个黑人吃奶4P| 亚洲综合伊人久久综合| 国产午夜激无码av毛片不| 色综合中文综合网| 亚洲六月丁香六月婷婷| 性做久久久久久久久不卡| 久精品国产欧美亚洲色aⅴ大片|