[1]邵必林,蔡 婷,边根庆,等.增强隐私保护度的数据混淆机制研究[J].西安建筑科技大学学报:自然版,2016,48(01):36-40,46.[doi:10.15986/j.1006-7930.2016.01.006]
 SHAO Bilin,CAI Ting,BIAN Genqing,et al.Research of enhancing privacy protection on confused data[J].J.Xi’an Univ. of Arch. & Tech.:Natural Science Edition,2016,48(01):36-40,46.[doi:10.15986/j.1006-7930.2016.01.006]
点击复制

增强隐私保护度的数据混淆机制研究()
分享到:

西安建筑科技大学学报:自然版[ISSN:1006-7930/CN:61-1295/TU]

卷:
48
期数:
2016年01期
页码:
36-40,46
栏目:
出版日期:
2016-02-28

文章信息/Info

Title:
Research of enhancing privacy protection on confused data
文章编号:
1006-7930(2016)01-0036-05
作者:
邵必林1蔡 婷1边根庆12王小飞2
1.西安建筑科技大学管理学院,陕西 西安 710055;2.西安建筑科技大学信息与控制工程学院,陕西 西安 710055
Author(s):
 SHAO Bilin1 CAI Ting1 BIAN Genqing12 WANG Xiaofei2
 1. School of Management, Xi′an Univ. of Arch. & Tech., Xi′an 710055,China; 2. School of Information and Control Engineering, Xi′an Univ. of Arch. & Tech., Xi′an 710055, China
关键词:
隐私保护数据混淆非固定位置置换随机正交矩阵
Keywords:
 privacy protection data confusion random location replacement random orthogonal matrix
分类号:
TP309
DOI:
10.15986/j.1006-7930.2016.01.006
文献标志码:
A
摘要:
针对数据隐私保护的安全问题,提出了一种基于数据混淆的隐私数据保护机制.首先介绍了相关背景及理论基础,然后论述了所采取的隐私保护二次数据混淆方法,即先基于非固定位置置换的数据混淆进行第一次简易混淆,再基于随机正交矩阵思想进行第二次数据混淆,并通过混淆可逆变换,准确地把原始数据提供给使用者.通过实验表明,该机制在有效保护隐私数据的同时,能明显提高其安全保护系数和等级.
Abstract:
Aiming at the security of data privacy protection, the paper puts a protective mechanisms of private data based on the data confusion. Firstly, it introduces the relevant background and theoretical foundation. It then, discusses the adopted secondary data confusion method of privacy protection, which proceeds the first simple confusion on the basis of random location replacement. The second data confusion in view of the random orthogonal matrix idea. It provides the user with the accurate raw data through confusing reversible transformation. The experiment showed that the mechanism provides the effective protection for private data and increases the protective grades obviously. 

参考文献/References:

[1] KISSERLI Nessim, PRENEEL Bart. A taxonomy of selfmodifying code for obfuscation[J].Computers & Security,2011, 30(8): 679-691.
[2] 周晓斌, 许勇, 张凌. 一种开放式PKI 身份认证模型的研究[J].国防科技大学学报,2013,35(1):169-174.
ZHOU Xiaobin, XU Yong, ZHANG Ling. Research on open identity authentication model for PKI[J]. Journal of National University of Defense Technology, 2013,35(1):169-174.
[3] 刘莉苹. 基于属性的空间数据访问控制研究[J].计算机工程与设计,2014,35(3):803-808.
LIU Liping. Research of attributed based spatial data access control[J].Computer Engineering and Design,2014,35 (3): 803-808.
[4] GREESHMA Sarath, JAYAPRIYA R. Securing database server using homomorphism encryption and reencryption[J]. Communications in Computer and Information Science, 2015, 536(8):277-289.
[5] ZUNERA Jalil, ANWAR M Mirza. An invisible text watermarking algorithm using image watermark[C]//Tarek Sobh, Khaled Elleithy. Innovations in Computing Sciences and Software Engineering.New York: Springer, 2010:147-152.
[6] VAN der Sloot. Do privacy and data protection rules apply to legal persons and should they? A proposal for a two-tiered system[J].Computer Law & Security Review,
2015, 31(1): 26-45.
[7] VIVEK Balachandran, SABU Emmanuel. Software protection with obfuscation and encryption[J]. Lecture Notes in Computer Science, 2013,7863: 309-320.
[8] 李新良, 罗戈夕. 基于Java 的代码混淆算法研究[J]. 湖南文理学院学报:自然科学版,2010,22(3): 64-69.
LI Xinliang, LUO Gexi. The study of Java code obfuscation algorithm[J]. Journal of Hunan University of Arts and Science(Natural Science Edition), 2010,22(3):64-69.
[9] 王志. 二进制代码路径混淆技术研究[D].天津: 南开大学,2012.
WANG Zhi. Research on binary code path obfuscation[D].Tianjin: Nankai University, 2012.
[10] 程小刚, 郭韧. GB18030 与Unicode 编码转换算法[J].华侨大学学报(自然科学版),2009,30(1):39-41.
CHENG Xiaogang, GUO Ren. Transcoding algorithm between GB18030 and unicode[J]. Journal of HuaQiao University(Natural Science Edition), 2009, 30(1):39-41.
[11] 徐小龙, 周静岚, 杨庚. 一种基于数据分割与分级的云存储数据隐私保护机制[J].计算机科学,2013,40(2):98-102.
XU Xiaolong, ZHOU Jinglan, YANG Geng. Data privacy protection mechanism for cloud storage based on data partition and classification[J]. Computer Science, 2013,
40(2): 98-102.
[12] STEWART GW. The efficient generation of random orthogonal matrices with an application to condition estimators[J]. SIAM Journal on Numerical Analysis, 1980,17(3): 403-409.

备注/Memo

备注/Memo:
收稿日期:2015-08-12 修改稿日期:2016-01-29
基金项目:国家自然科学基金项目(61272458);陕西省自然科学基础研究计划项目(2014JM2-6119);榆林市科技计划项目(2014CXY-12)
作者简介:邵必林(1965-),男,教授,主要从事信息安全管控技术,云计算技术以及动态存储安全技术方面研究.E-mail:sblin0462@sina.com
更新日期/Last Update: 2016-04-01