作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2010, Vol. 36 ›› Issue (12): 149-152. doi: 10.3969/j.issn.1000-3428.2010.12.051

• 安全技术 • 上一篇    下一篇

基于信任的普适计算隐私保护方法

辛 艳,罗长远,霍士伟,应一舟   

  1. (解放军信息工程大学电子技术学院,郑州 450004)
  • 出版日期:2010-06-20 发布日期:2010-06-20
  • 作者简介:辛 艳(1983-),女,助理工程师、硕士研究生,主研方向:普适计算安全;罗长远,副教授、博士;霍士伟、应一舟,硕士研究生

Trust-based Privacy Protecting Method in Pervasive Computing

XIN Yan, LUO Chang-yuan, HUO Shi-wei, YING Yi-zhou   

  1. (School of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004)
  • Online:2010-06-20 Published:2010-06-20

摘要: 普适计算访问控制中对敏感信息的交换,会给恶意的交互对方提供盗取隐私信息的机会。针对该问题,提出一种基于信任的普适计算隐私保护方法,通过对用户属性进行分级,运算获取资源提供方的信任值并划分其安全等级,对高于安全等级的属性利用秘密比较协议进行加密验证。结果表明,该方法能保护用户的隐私属性,根据属性敏感程度的不同有选择性地进行加密,降低计算复杂度,适应普适计算中能力限制的设备

关键词: 普适计算, 隐私保护, 信任, 秘密比较协议

Abstract: The exchange of sensitive information in pervasive computing access control offers opportunity for vicious opposite entity to purloining private information. This paper presents trust-based privacy protecting method in pervasive computing. Taking trust of resource provider, user measures off security grade based on trust worth. For the attributes higher than the security grade, user and resource provider use private comparison protocol validating encrypted attributes. Experimental result shows that the method can protect private attributes effectively and encrypt attributes selectively based on different user attributes sensitivity, and reduce the complexity of computing. It adapts the equipments of capability limitative in pervasive computing.

Key words: pervasive computing, privacy protecting, trust, private comparison protocol

中图分类号: