通信学报 ›› 2016, Vol. 37 ›› Issue (4): 1-11.doi: 10.11959/j.issn.1000-436x.2016078

• 学术论文 •    下一篇

隐私计算研究范畴及发展趋势

李凤华1,李晖2,贾焰3,俞能海4,翁健5   

  1. 1 中国科学院信息工程研究所信息安全国家重点实验室,北京100195
    2 西安电子科技大学网络与信息安全学院,陕西 西安710071
    3 国防科学技术大学计算机学院,湖南 长沙410073
    4 中国科学技术大学信息科学技术学院,安徽 合肥230026
    5 暨南大学信息科学技术学院,广东 广州510632
  • 出版日期:2016-04-25 发布日期:2016-04-26
  • 基金资助:
    国家自然科学基金—广东联合基金资助项目;移动互联网安全学科创新引智基地(“111”计划)基金资助项目

Privacy computing:concept, connotation and its research trend

Feng-hua LI1,Hui LI2,Yan JIA3,Neng-hai YU4,Jian WENG5   

  1. 1 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100195, China
    2 School of Cyber Engineering, Xidian University, Xi'an 710071, China
    3 College of Computer, National University of Defense Technology, Changsha 410073, China
    4 School of Information Science and Technology, University of Science and Technology of China, Hefei 230026, China
    5 College of Information Science and Technology,Jinan University, Guangzhou 510632, China
  • Online:2016-04-25 Published:2016-04-26
  • Supported by:
    The National Natural Science Foundation of China-Guangdong Joint Program;111 Project

摘要:

随着移动互联网、云计算和大数据技术的广泛应用,电商、搜索、社交网络等服务在提供便利的同时,大数据分析使用户隐私泄露的威胁日益凸显,不同系统隐私保护策略和能力的差异性使隐私的延伸管理更加困难,同一信息的隐私保护需求随时间变化需要多种隐私保护方案的组合协同。目前已有的各类隐私保护方案大多针对单一场景,隐私缺乏定量化的定义,隐私保护的效果、隐私泄露的利益损失以及隐私保护方案融合的复杂性三者之间的关系刻画缺乏系统的计算模型。因此,在分析隐私保护研究现状的基础上,提出隐私计算的概念,对隐私计算的内涵加以界定,从隐私信息的全生命周期讨论隐私计算研究范畴,并从隐私计算模型、隐私保护场景适应的密码理论、隐私控制与抗大数据分析的隐私保护、基于信息隐藏的隐私保护以及支持高并发的隐私保护服务架构等方面展望隐私计算的发展趋势。

关键词: 隐私计算, 度量, 形式化描述, 隐私感知

Abstract:

s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever growing due to the use of big data analytics. The differences of privacy protection strategy and ability in different systems bring more difficulties in privacy extended management. In addition, the requirements of pro-tecting the same information at different time need the combination of various privacy protection schemes. However, nearly all the current privacy protection schemes are ing at a single case, which lacks systematic and quantized pri-vacy characterization. Furthermore, there is no systematic computing model describing the relationship between the pro-tection level, profit and loss of privacy leaks and the complexity of integrated privacy protection methods. Based on the analysis on the research status of privacy protection, the concept and connotation of privacy computing is proposed and defined. Then the privacy computing research category will be discussed from the whole life cycle of information privacy protection. Finally, some research directions of privacy computing are given, including privacy computing model, context adaptive cryptology for privacy protection, big data a lytics resisted privacy control and protection, privacy protection based on information hiding and system architecture for high concurrent privacy preserving services.

Key words: privacy computing, quantification, formal description, privacy awareness

No Suggested Reading articles found!