Journal on Communications ›› 2016, Vol. 37 ›› Issue (8): 167-184.doi: 10.11959/j.issn.1000-436x.2016167
• Comprehensive Review • Previous Articles Next Articles
Jin-bo XIONG1,2,Feng-hua LI1,Yan-chao WANG1,Jian-feng MA3,Zhi-qiang YAO2
Online:
2016-08-25
Published:
2016-09-01
Supported by:
Jin-bo XIONG,Feng-hua LI,Yan-chao WANG,Jian-feng MA,Zhi-qiang YAO. Research progress on cloud data assured deletion based on cryptography[J]. Journal on Communications, 2016, 37(8): 167-184.
"
方案 | 数据加密方式 | 密钥管理方式 | 细粒度安全访问 | 确定性删除触发机制 | 方案安全性 |
Perlman[ | DK加密数据,Ephemerizer公钥加密DK | 可信Ephemerizer服务器管理 | 不支持 | 到 达 期 限,删 除Ephemerizer私钥 | 无安全性证明,存在中间人攻击 |
Nair [ | DK加密数据,身份加密机制加密DK | 可信Ephemerizer服务器管理 | 不支持 | 满 足 条 件 时,Ephemerizer 才会产生私钥 | 可证明安全,能够避免中间人攻击 |
FADE[ | DK加密数据,CK加密DK | 可信密钥管理者 | 支持,布尔表达式描述访问策略,策略与CK关联 | 撤销策略,删除CK | 通过盲加/解密增强系统安全性,但存在单点失效问题 |
Tang[ | DK加密数据,CK加密DK | 通过秘密分享,多个可信密钥管理者 | 支持,布尔表达式描述访问策略,策略与CK关联 | 撤销策略,删除CK | 通过盲加/解密增强系统安全性,避免单点失效问题 |
"
方案 | 数据加密方式 | 密钥加密方式 | 密文封装 | 细粒度安全访问 | 确定性删除触发机制 |
Vanish[ | 对称密钥 | 无 | 完整密文 | 无 | DHT节点自更新 |
SafeVanish[ | 对称密钥 | RSA | 完整密文 | 无 | DHT节点自更新 |
SSDD[ | 对称密钥 | 无 | 部分密文 | 无 | DHT节点自更新 |
ISDS[ | 对称密钥 | IBE | 部分密文 | 身份控制访问粒度 | DHT节点自更新 |
ISS[ | 对称密钥 | IBE | 部分密文 | 多安全等级+身份控制访问粒度 | DHT节点自更新 |
FullPP[ | 对称密钥 | IB-TRE | 部分密文 | 身份+时间控制粒度 | 预设时间+节点自更新 |
ESITE[ | 对称密钥 | IB-TRE | 部分密文 | 身份+时间控制粒度 | 预设时间+节点自更新 |
SelfDoc[ | 对称密钥 | ABE | 部分密文 | 多安全等级+访问结构控制粒度 | DHT节点自更新 |
"
攻击类型方案 | DHT网络安全性 | 算法安全性 | 系统安全性同时攻击 | |||
跳跃攻击 | 嗅探攻击 | 蛮力攻击 | 密码分析 | |||
Vanish[ | 密钥定长且较短,不能抵抗 | 密钥缺乏二次加密保护,不能抵抗 | 密文完整,不能抵抗 | 密文完整,不能抵抗 | 不能抵抗 | |
SafeVanish[ | 添加随机值增加密钥长度,具有一定抵抗能力 | 密钥有二次加密,抵抗能力较强 | 密文完整,不能抵抗 | 密文完整,不能抵抗 | 不能抵抗 | |
SSDD[ | 添加抽取密文增加密钥长度,具有一定抵抗能力 | 密钥缺乏二次加密,不能抵抗 | 密文不完整,PPT内具有抵抗能力 | 密文不完整,PPT内具有抵抗能力 | 不能抵抗 | |
ISDS[ | 密钥经IBE加密,再添加抽取密文,抵抗能力较强 | 密钥有二次加密,抵抗能力较强 | 密文不完整,PPT内具有抵抗能力 | 密文不完整,PPT内具有抵抗能力 | 不能抵抗 | |
ISS[ | 密钥经IBE加密,再添加抽取密文,抵抗能力较强 | 密钥有二次加密,抵抗能力较强 | 密文不完整,PPT内具有抵抗能力 | 密文不完整,PPT内具有抵抗能力 | 能抵抗 | |
FullPP[ | 密钥经IB-TRE加密,再添加抽取密文,抵抗能力较强 | 密钥有二次加密,抵抗能力较强 | 密文不完整,PPT内具有抵抗能力 | 密文不完整,PPT内具有抵抗能力 | 能抵抗 | |
ESITE[ | 密钥经IB-TRE加密,再添加抽取密文,抵抗能力较强 | 密钥有二次加密,抵抗能力较强 | 密文不完整,PPT内具有抵抗能力 | 密文不完整,PPT内具有抵抗能力 | 能抵抗 | |
SelfDoc[ | 密钥经 ABE 加密,再添加抽取密文,抵抗能力强 | 密钥有二次加密,抵抗能力强 | 密文不完整,PPT内具有抵抗能力 | 密文不完整,PPT内具有抵抗能力 | 能抵抗 |
"
方案 | 密钥管理 | 密文管理 | 授权期限 | 是否需要额外基础设施 | 确定性删除触发机制 |
Reimann[ | WWW随机网页 | WWW随机网页或半可信服务器 | 长达数个月 | 否 | 随机网页删除或更新 |
X-pire[ | 密钥管理服务器 | 社交网络或者WWW静态网页 | 用户动态调整,可延长至数个月 | 可信服务器 | 社交网络或网页删除或更新 |
X-pire 2.0[ | 密钥管理服务器 | 社交网络或者WWW静态网页 | 用户自主设置 | 可信执行环境,包括可信软/硬件 | 预设时间到期或网页删除 |
FaceCloak[ | 用户自己管理 | 可信服务器、社交网络 | 用户自主设置 | 可信服务器 | 预设时间到期 |
Flickr[ | 密钥管理服务器 | 社交网络或者WWW静态网页 | 用户自主设置 | 可信服务器 | 预设时间到期或网页删除 |
"
确定性删除方法 | 数据外包与安全问题 | 数据迁移与多副本问题 | 数据残留与销毁问题 | 确定性删除效果 | 适合的应用场景 |
基于可信执行环境 | 数据加密后外包到远程服务器或云端,可保护数据机密性 | 对数据迁移与多副本问题考虑较少 | 可信执行环境中存储的数据残留可以得到有效销毁,服务器或云端仍存在密文残留 | 对可信执行环境中所存隐私数据的确定性删除效果好 | 适合数据保密性要求高、信息隐私程度高的应用 |
基于密钥管理 | 数据加密后外包到远程服务器或云端,可保护数据机密性 | 对数据迁移与多副本问题考虑较少 | 密钥分散管理中,DHT网络节点自更新可对密钥残留实施销毁,但云端无法处理 | 集中服务器方案容易单点故障,DHT 网络的密钥信息删除效果较好 | 适合中、低等数据保密要求、信息隐私保护的应用,大规模的云存储服务 |
基于访问控制策略 | 数据加密后外包到远程服务器或云端,可保护数据机密性 | 对数据迁移与多副本问题考虑较少 | 存在密钥残留,云端还存在密文残留无法销毁 | 确定性删除的触发时间比较好控制,密钥信息删除效果较好 | 适合中、低等数据保密要求、信息隐私保护的应用,大规模的云存储服务 |
[1] | 冯朝胜, 秦志光, 袁丁 . 一云数据安全存储技术[J]. 计算机学报, 2015,38(1):150-163. FENG Z S , QIN Z G , YUAN D . Techniques of secure storage for cloud data[J]. Chinese Journal of Computers, 2015,38(1):150-163. |
[2] | 李晖, 孙文海, 李凤华 , 等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014,51(7):1397-1409. LI H , SUN W H , LI F H , et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014,51(7):1397-1409. |
[3] | 谭霜, 贾焰, 韩伟红 . 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015,38(1):164-176. TAN Z S , JIA Y , HAN W H . Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015,38(1):164-176. |
[4] | 傅颖勋, 罗圣美, 舒继武 . 安全云存储系统与关键技术综述[J]. 计算机研究与发展, 2013,50(1):136-145. FU Y X , LUO S M , SHU J W . Survey of secure cloud storage system and key technologies[J]. Journal of Computer Research and Devel-opment, 2013,50(1):136-145. |
[5] | 李晖, 李凤华, 曹进 , 等. 移动互联服务与隐私保护的研究进展[J]. 通信学报, 2014,35(11):1-11. LI H , LI F H , CAO J , et al. Survey on security and privacy preserving for mobile Internet service[J]. Journal on Communications, 2014,35(11):1-11. |
[6] | 丁滟, 王怀民, 史佩昌 , 等. 可信云服务[J]. 计算机学报, 2015,38(1):133-149. DING Y , WANG H M , SHI P C , et al. Trusted cloud services[J]. Chi-nese Journal of Computers, 2015,38(1):133-149. |
[7] | DIESBURG S M , WANG A I A . A survey of confidential data storage and deletion methods[J]. ACM Computing Surveys(CSUR), 2010,43(1): 1-37. |
[8] | JOUKOV N , PAPAXENOPOULOS H , ZADOK E . Secure deletion myths,issues,and solutions[C]// The Second ACM Workshop on Stor-age Security and Survivability (StorageSS). Alexandria,VA,USA c2006:61-66. |
[9] | WEI M Y C , GRUPP L M , SPADA F E . Reliably erasing data from flash-based solid state drives[C]// USENIX Conference on File and Stor-age Technologies (FAST). Berkeley,CA,USA c2011:105-117. |
[11] | P?PPER C , BASIN D , ?APKUN S . Keeping data secret under full compromise using porter devices[C]// 26th Annual Computer Se-curity Applications Conference (ACM SAC). Austin,Texas,USA c2010:241-250. |
YU S , WANG C , REN K , et al. Achieving secure,scalable,and fine-grained data access control in cloud computing[C]// 29th Confer-ence on Computer Communications (IEEE INFOCOM). San Diego,CA,USA c2010:1-9. | |
[12] | PERLMAN R . File system design with assured delete[C]// Third IEEE International Security in Storage Workshop (SISW). San Francisco,CA,USA c2005:83-88. |
[13] | PERLMAN R . File system design with assured delete[C]// The 14th Annual Network & Distributed System Security (ISOC NDSS). San Diego,CA,USA c2007:1-7. |
[14] | MO Z , XIAO Q , ZHOU Y , et al. On deletion of outsourced data in cloud computing[C]// The 7th International Conference on Cloud Computing (IEEE CLOUD). Alaska,USA c2014:344-351. |
[15] | JREARDON J , BASIN D , CAPKUN S , et al. Sok:secure data dele-tion[C]// The 34th IEEE Symposium on Security &Privacy (IEEE S&P). San Francisco,CA,USA c2013:301-315. |
[16] | REARDON J , RITZDORF H , BASIN D , et al. Secure data deletion from persistent media[C]// The 2013 ACM SIGSAC Conference on Computer & Communications Security (ACM CCS). New York,NY,USA c2013:301-315. |
[17] | ZHAO L , MANNAN M . The 22th Annual Network & Distributed System Security (ISOC NDSS)[C]// The 22th Annual Network & Distributed System Security (ISOC NDSS). San Diego,CA,USA c2015:1-13. |
[18] | 张逢喆, 陈进, 陈海波 , 等. 云计算中的数据隐私性保护与自我销毁[J]. 计算机研究与发展, 2011,48(7):1155-1167. ZHANG F Z , CHEN J , CHEN H B , et al. Lifetime privacy and self-destruction of data in the cloud[J]. Journal of Computer Research and Development, 2011,48(7):1155-1167. |
[19] | PERLMAN R . The ephemerizer:making data disappear[J]. Journal of Information Systems Security, 2005,1(11): 21-32. |
[20] | TANG Q , MANNAN M . Timed-ephemerizer:make assured data appear and disap-pear[C]// The Public Key Infrastructures,Services and Applications. Springer Berlin Heidelberg c2010:195-208. |
[21] | TANG Q . From ephemerizer to timed-ephemerizer:achieve assured lifecycle enforcement for sensitive data[J]. The Computer Journal, 2014: 1-18. |
[22] | NAIR S K , DASHTI M T , CRISPO B , et al. A hybrid PKI-IBC based ephemerizer system[C]// The International Information Security Con-ference.Sandton. South Africa c2007:251-252. |
[23] | TANG Y , LEE P P , LUI J C , et al. FADE:secure overlay cloud storage with file assured deletion[C]// The Security and Privacy in Communica-tion Networks (SecureComm). River Valley,Singapore c2010:380-397. |
[24] | BADRE R . Cloud storage with improved access control and assured deletion[J]. International Journal of Innovations in Engineering and Technology (IJIET), 2014,3(3): 92-97. |
[25] | TANG Y , LEE P P , LUI J C . Secure overlay cloud storage with access control and assured deletion[J]. IEEE Transactions on De-pendable and Secure Computing, 2012,9(6): 903-916. |
[26] | SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613. |
[27] | GEAMBASU R , KOHNO T , LEVY A , et al. Vanish:increasing data privacy with self-destructing data[C]// The 18th USENIX Security Symposium. Montreal,Canada c2009:299-315. |
[28] | WANG G , YUE F , LIU Q . A secure self-destructing scheme for elec-tronic data[J]. Journal of Computer and System Sciences, 2013,79(2): 279-290. |
[29] | WOLCHOK S , HOFMANN O S , HENINGER N , et al. Defeating vanish with low-cost sybil attacks against large DHTs[C]// The 17th Annual Network & Distributed System Security Conference (ISOC NDSS). San Diego,CA,USA c2010:1-15. |
[30] | ZENG L , SHI Z , XU S , et al. SafeVanish:an improved data self-destruction for protecting data privacy[C]// The IEEE Second In-ternational Conference on Cloud Computing Technology and Science (CloudCom). Athens,Greece c2010:521-528. |
[3] | 熊金波, 姚志强, 马建峰 , 等. 基于行为的结构化文档多级访问控制[J]. 计算机研究与发展, 2013,50(7):1399-1408. XIONG J B , YAO Z Q , MA J F , et al. Action-based multilevel access control for structured document[J]. Journal of Computer Research and Development, 2013,50(7):1399-1408. |
[32] | BONEH D , FRANKLIN M . Identity-based encryption from the weil pairing[J]. SIAM Journal on Computing, 2003,32(3): 586-615. |
[33] | XIONG J , YAO Z , MA J , et al. secure document self-destruction scheme with identity based encryption[C]// The 5th International Con-ference on Intelligent Networking and Collaborative Systems (IEEE INCoS). Xi'an,China c2013:239-243. |
[34] | 熊金波, 姚志强, 马建峰 , 等. 面向网络内容隐私的基于身份加密的安全自毁方案[J]. 计算机学报, 2014,37(1):139-150. XIONG J B , YAO Z Q , MA J F , et al. A secure self-destruction scheme with IBE for the internet content privacy[J]. Chinese Journal of Com-puters, 2014,37(1):139-150. |
[35] | LIU X , MA J , XIONG J , et al. Threshold attribute based encryption with attribute hierarchy for lattices in the standard model[J]. IET In-formation Security, 2014,8(4): 217-223. |
[36] | LI Q , MA J , LI R , et al. Secure,efficient and revocable multi-authority access control system in cloud storage[J]. Computers & Security, 2016,59(6): 45-59. |
[37] | XIONG J , YAO Z , MA J , et al. A secure document self-destruction scheme:an ABE approach[C]// The 10th International Conference on High Performance Computing and Communications & IEEE Interna-tional Conference on Embedded and Ubiquitous Computing (HPCC_EUC). Zhangjiajie,China c2013:59-64. |
[38] | 熊金波, 姚志强, 马建峰 , 等. 基于属性加密的组合文档安全自毁方案[J]. 电子学报, 2013,42(2):366-376. XIONG J B , YAO Z Q , MA J F , et al. A secure self-destruction scheme for composite documents with attribute based encryption[J]. Acta Electronica Sinica, 2013,42(2):366-376. |
[39] | CHAN A F , BLAKE I F . Scalable,server-passive,user-anonymous timed release cryptography[C]// The 25th International Conference on Distributed Computing Systems. Piscataway,USA c2005:504-513. |
[40] | 姚志强, 熊金波, 马建峰 , 等. 云计算中一种安全的电子文档自毁方案[J]. 计算机研究与发展, 2014,51(7):1417-1423. YAO Z Q , XIONG J B , MA J F , et al. A secure electronic document self-destructing scheme in cloud computing[J]. Journal of Computer Research and Development, 2014,51(7):1417-1423. |
[41] | XIONG J , LI F , MA J , et al. A full lifecycle privacy protection scheme for sensitive data in cloud computing[J]. Peer-to-Peer Networking and Applications, 2015,8(6): 1025-1037. |
[42] | REIMANN S , DüRMUTH M . Timed revocation of user data:long expiration times from existing infrastructure[C]// The 2012 ACM Workshop on Privacy in the Electronic Society (WPES),Raleigh. NC,USA c2012:65-74. |
[43] | ROESNER F , GILL B T , KOHNO T , et al. Sex,lies,or kittens? Investigating the use of snapchat's self-destructing messages[C]// The 18th International Conference on Financial Cryptography and Data Security (FC). Springer Berlin Heidelberg,Christ Church,Barbados c2014:64-76. |
[44] | BACKES J , BACKES M , DüRMUTH M , et al. X-pire!-a digital expiration date for images in social networks[C]// arXiv preprint arXiv:1112.2649, 2011:1-22. |
[45] | BACKES M , GERLING S , LORENZ S , et al. X-pire 2.0:a user-controlled expiration date and copy protection mecha-nism[C]// The 29th Annual ACM Symposium on Applied Computing (ACM SAC). Gyeongju,Korea c2014:1633-1640. |
[46] | LUO W , XIE Q , HENGARTNER U , et al. Facecloak:an architecture for user privacy on social networking sites[C]// The International Conference on Computational Science and Engineering (IEEE CSE). Van-couver,Canada c2009:26-33. |
[47] | SIGURBJ?RNSSON B , VAN ZWOL R . Flickr tag recommendation based on collective knowledge[C]// The 17th International Conference on World Wide Web (ACM WWW). Beijing,China c2008:327-336. |
[48] | CASTELLUCCIA C , DE CRISTOFARO E , FRANCILLON A , et al. Ephpub:toward robust ephemeral publishing[C]// he 19th IEEE In-ternational Conference on Network Protocols (IEEE ICNP). Vancou-ver,BC Canada c2011:165-175. |
[49] | ZENG L , CHEN S , WEI Q , et al. Sedas:a self-destructing data system based on active storage framework[J]. IEEE Transactions on Magnet-ics, 2013,49(6): 2548-2554. |
[50] | ATALLAH M J , BLANTON M , FAZIO N , et al. Dynamic and effi-cient key management for access hierarchies[J]. ACM Transactions on Information and System Security (TISSEC), 2009,12(3): 1-43. |
[51] | WANG W , LI Z , OWENS R , et al. Secure and efficient access to outsourced data[C]// The ACM Workshop on Cloud Computing Secu-rity. Chicago,IL,USA c2009:55-56. |
VIANA W , ANDRADE R , MONTEIRO A J . PEARL:a performance evaluator of cryptographic algorithms for mobile devices[C]// The In-ternational Workshop on Mobility Aware Technologies and Applica-tions (MATA). Florianopolis,Brazil c2004:275-284. | |
[53] | 王丽娜, 任正伟, 余荣威 , 等. 一种适于云存储的数据确定性删除方法[J]. 电子学报, 2012,40(2):266-272. WANG L N , REN Z W , YU R W , et al. A data assured deletion ap-proach adapted for cloud storage[J]. Acta Electronica Sinica, 2012,40(2):266-272. |
[54] | MO Z , QIAO Y , CHEN S . Two-party fine-grained assured deletion of outsourced data in cloud systems[C]// The 34th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS). Ma-drid,Spain c2014:308-317. |
[55] | LI C , CHEN Y , ZHOU Y . A data assured deletion scheme in cloud storage[J]. China Communications, 2014,11(4): 98-110. |
[56] | CACHIN C , HARALAMBIEV K , HSIAO H C , et al. Policy-based secure deletion[C]// The ACM SIGSAC Conference on Computer &Communications Security (ACM CCS). New York,NY,USA c2013:259-270. |
[57] | LI Q , MA J , LI R , et al. Large universe decentralized key-policy at-tribute-based encryption[J]. Security and Communication Networks, 2015,8(3): 501-509. |
[58] | KASAMATSU K , MATSUDA T , EMURA K , et al. Time-specific encryption from forward-secure encryption[C]// The 8th Conference on Security and Cryptography for Networks (SCN). Amalfi,Italy c2012:184-204. |
[59] | XIONG J , LIU X , YAO Z , et al. A secure data self-destructing scheme in cloud computing[J]. IEEE Transactions on Cloud Computing, 2014,2(4): 448-458. |
[60] | ZENG L , WANG Y , FENG D . CloudSky:a controllable data self-destruction system for untrusted cloud storage networks[C]// The 15th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing (CCGrid). Shenzhen,China c2015:352-361. |
[61] | 张坤, 杨超, 马建峰 , 等. 基于密文采样分片的云端数据确定性删除方法[J]. 通信学报, 2015,36(11):108-117. ZHANG K , YANG C , MA J F , et al. Novel cloud data assured deletion approach based on ciphertext sample slice[J]. Journal on Communica-tions, 2015,36(11):108-117. |
[62] | 熊金波, 沈薇薇, 黄阳群 , 等. 云环境下的数据多副本安全共享与关联删除方案[J]. 通信学报, 2015,36(z1):136-140. XIONG J B , SHEN W W , HUANG Y Q , et al. Security sharing and associated deleting scheme for multi-replica in cloud[J]. Journal on Communications, 2015,36(z1):136-140. |
[63] | 李凤华, 李晖, 贾焰 , 等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4):1-11. LI F H , LI H , JIA Y , et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4):1-11. |
[64] | LIU J , ASOKAN N , PINKAS B . Secure deduplication of encrypted data without additional independent servers[C]// 22nd ACM SIGSAC Conference on Computer and Communications Security (ACM CCS). Colorado,USA c2015:874-885. |
[65] | ARMKNECHT F , BOHLI J M , KARAME G O , et al. Transparent data deduplication in the cloud[C]// The 22nd ACM SIGSAC Confer-ence on Computer and Communications Security (ACM CCS). Colo-rado,USA c2015:886-900. |
[66] | ZAYCHIK M V , STOYANOVICH J , ABITEBOUL S , et al. Collabo-rative access control in webdamlog[C]// The 2015 ACM SIGMOD In-ternational Conference on Management of Data (ACM SIGMOD). Melbourne,Australia c2015:197-211. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[6] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[7] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[8] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[9] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[10] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[11] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[12] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[13] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[14] | Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU. Android application privacy protection mechanism based on virtual machine bytecode injection [J]. Journal on Communications, 2021, 42(6): 171-181. |
[15] | Youhuizi LI, Yuyu YIN, Honghao GAO, Yi JIN, Xinheng WANG. Survey on privacy protection in non-aggregated data sharing [J]. Journal on Communications, 2021, 42(6): 195-212. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|