面向服务的移动通信用户隐私保护体系架构及关键技术

项目来源

国家自然科学基金(NSFC)

项目主持人

李兴华

项目受资助机构

西安电子科技大学

立项年度

2017

立项时间

未公开

项目编号

U1708262

研究期限

未知 / 未知

项目级别

国家级

受资助金额

240.00万元

学科

信息科学-电子学与信息系统-信息系统与系统安全

学科代码

F-F01-F0102

基金类别

联合基金项目-重点支持项目-NSFC-辽宁联合基金

关键词

移动通信 ; LBS位置隐私保护 ; 匿名认证 ; 隐私保护 ; 端到端安全 ; mobile communication ; privacy protection ; anonymous authentication ; end-to-end security ; LBS location privacy protection

参与者

吕锡香;史闻博;姜奇;孙聪;姚青松;孙景昊;齐赛宇;郭晶晶;鲁宁

参与机构

东北大学

项目标书摘要:未来移动通信将服务于各垂直行业,用户在网络接入、数据传输和服务使用环节面临身份隐私、数据隐私、位置隐私泄露的风险。现有研究没从服务于垂直行业的需求来考虑,未成体系,难以满足不同行业用户差异化的隐私需求。针对该问题,我们拟采用“安全即服务”的思想,建立基于SOA的移动通信用户隐私保护体系架构。在网络接入环节,通过物理层密钥提取为认证协议提供安全信道,设计基于假名集合和具有“递进式解密”功能的KP-ABE保护身份标识的方法,保护身份隐私;在数据传输环节,构建面向安全能力开放的“三元”信任模型,并设计终端能力适配的端到端密钥协商方法和基于安全需求工程的传输数据自适应保护方法,保护数据隐私;在服务使用环节,建立位置隐私保护与QoS间的博弈模型,提出基于信任机制的分布式K匿名和抗时空关联分析的假位置隐私保护方法,保护位置隐私。本课题的研究期望为移动通信用户隐私保护提供理论依据与技术支撑。

Application Abstract: Future mobile communication will serve vertical industries.In his network access,data transmission and service enjoyment,a user's identity,data and location privacy information may be disclosed.However,existing investigations do not consider the requirements of vertical industries,and they are loosely coupled and incapable of forming an integral system,thereby failing to protect the users'privacy in mobile communication.To address this problem,we will establish an SOA-based privacy protection architecture for mobile communication users,adopting the concept of“security as a service”.Specifically,when accessing network,by employing the physical layer key extraction,a secure channel is established to protect authentication protocol exchanges.Alternatively,the users'identifiers in these protocols are protected by using a pseudonym set or KP-ABE with progressive decryption function.Furthermore,to preserve the data privacy in transit,a security-capacity-open oriented three-party trust model is established,based on which we will propose a mobile terminal capacity adaptive end-to-end key agreement method,as well as an adaptive data transmission protection method.Finally,for the service enjoyment,we will establish a game model between a user's privacy protection and QoS,and present the distributed K-anonymity privacy protection method based on trust mechanism and the dummy-based privacy protection method against spatial-temporal correlation analysis,protecting the user's location privacy.This investigation is expected to provide theoretical and technical support for privacy protection in mobile communication networks.

项目受资助省

陕西省

项目结题报告(全文)

面向服务的移动通信网络在网络接入环节、数据传输环节、服务使用环节涉及身份认证、端到端安全传输、LBS位置隐私保护等多方面内容,现有隐私保护研究之间关联性不高,未形成体系,缺乏成熟的针对面向服务的移动通信网络设计的用户隐私保护体系架构。本项目针对移动通信中用户在网络接入、数据传输、服务使用环节所面临的身份隐私、数据隐私、位置隐私泄露问题展开研究,主要围绕以下三个科学问题:①匿名认证方法与接入技术的动态组合;②业务与信任建立、安全传输方法的动态组合;③位置隐私保护方法的动态组合开展攻关,突破了匿名身份认证、端到端安全传输、LBS位置隐私保护的关键技术,构建了面向服务的用户隐私保护体系架构。具体地,在匿名身份认证方面,提出了自适应可扩展的匿名认证方法,在保证匿名性的同时完成了对用户的身份认证,并实现了匿名认证协议的可扩展和自适应选择。在端到端安全传输方面,设计了业务适配的端到端安全传输模型,对不同类型业务的数据传输进行自适应保护,满足了不同业务差异化的安全需求和QoS需求。在LBS位置隐私保护方面,提出了业务及用户动态适变的位置隐私保护方法,满足了多业务场景及用户动态变化的隐私需求,实现了隐私保护与服务质量之间的兼顾权衡。最终构建了面向SOA的移动通信用户隐私保护体系。项目发表了包括IEEE TIFS、IEEE TDSC、IEEE TMC、IEEE TKDE等顶刊在内的学术论文63篇,授权国内技术发明专利27项,获得国际PCT专利4项,申请国内技术发明专利23项、美国专利1项,多项专利实现了成果转化,转化费达200万元,出版学术专著2部,获得各类奖励7项。培养了国家杰出青年科学基金获得者1名、全国网络安全优秀教师1名、河北省青年拔尖人才1名。相关技术在中国联通、中国电信、腾讯公司、天地一体化组网、国产大飞机C919、我国四代机等得到应用,解决了移动运营、航空航天、军民融合等领域信息系统所面临的安全问题。

  • 排序方式:
  • 2
  • /
  • 1.Cross-Chain Data Auditing for Medical IoT Data Sharing

    • 关键词:
    • Blockchain;Information management;Internet of things;Patient treatment;Block-chain;Consistency verifications;Cross-chain;Data auditing;Data Sharing;Integrity management;Medical data;Medical treatment;Shared data;Traceability managements
    • Fan, Kuan;Liu, Zhuoxuan;Liu, Mingxi;Wen, Yihong;Lu, Ning;Shi, Wenbo
    • 《5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022》
    • 2023年
    • December 30, 2022 - December 31, 2022
    • Xi'an, China
    • 会议

    Secure medical IoT data sharing significantly improves medical collaboration and facilitates patients’ medical treatment. Since block chain provides integrity and traceability management for medical data, many IoT medical data choose block chain as a storage medium. However, the isolation of block chain hinders data sharing between heterogeneous chains, so how to realize the secure sharing of medical IoT data in heterogeneous block chains and allow users to obtain correct and credible shared data is still a challenge. Existing data integrity verification techniques ensure the correctness of shared data by comparing off-chain data with metadata stored on-chain. However, these schemes ignore the consistency of shared data and the correctness of cross-chain data. This paper builds a cross-chain medical IoT data-sharing framework, introduces a relay chain, and verifies the consistency between data requests and actual storage through registration, auditing, and other methods. Based on this framework, this paper uses homomorphic signature technology and batch auditing to design a cross-chain audit protocol to verify the consistency of registered data attributes and the correctness of shared data. Security analysis and simulation experiments based on security reduction demonstrate the security and effectiveness of the proposed scheme. © 2023, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

    ...
  • 2.Federated Learning-Based IDS Against Poisoning Attacks

    • 关键词:
    • Data privacy;Intrusion detection;Learning systems;Network security;Public key cryptography;Detection performance;Federated learning;Ho-momorphic encryptions;Homomorphic-encryptions;Intrusion detection scheme;Intrusion Detection Systems;Learning schemes;Objective functions;Poisoning attacks;Privacy computing
    • Xu, Mengfan;Li, Xinghua
    • 《4th EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2021》
    • 2022年
    • December 10, 2021 - December 11, 2021
    • Virtual, Online
    • 会议

    With the implementation of the General Data Protection Regulation (GDPR), the federated learning scheme has become a hot topic in the field of private computing. However, existing federated learning scheme can only encrypt the models to ensure the privacy of the data, but can not guarantee the correctness of the uploaded models, which will lead to a significant decrease in the detection performance of the global model. In this paper, we propose a federated learning-based intrusion detection scheme (IDS) against poisoning attacks. Specifically, we first design an anti-poisoning attacks algorithm based on the encryption model. Then we define the anti-attack strategy and objective function. To achieve high detection performance for the availability and concealment of attack, we introduce the poisoning rate into the objective function. The privacy preservation for local data sources also be provided while the IDS model based on knowledge sharing among islands is constructed. We leverage the Paillier public key cryptosystem to prevent data leakage for each entity. The results of security analysis show that our scheme can meet the security requirements of local data sources. In addition, the experiment results demonstrate that the proposed scheme can significantly improve the robustness of the detection model, and its accuracy rate can reach 83.11% even after being poisoned, which means the detection performance has not significantly decreased compared with non-poisoning attacks scheme.
    © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

    ...
  • 3.CAFM: Precise Classification for Android Family Malware

    • 关键词:
    • Android (operating system) ; Deep neural networks ; Malware ; Mobile security;Android malware ; Classification models ; Context information ; Continuous features ; Family ; Feature representation ; Learn+ ; Learning capabilities ; Malware classifications ; Neural network model
    • LiDan;PanRunbang;LuNing;ShiWenbo
    • 《4th EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2021》
    • 2022年
    • December 10, 2021 - December 11, 2021
    • Virtual, Online
    • 会议

    Family malware classification is becoming progressively urgent because of the increasing diversity of family malware and the different hazards it causes. There is a growing concern that classification is at a disadvantage owing to its problems. For one thing, obtaining the crucial features of innumerable families is arduous. For another, constructing a classification model that fully learns multi-class samples is intricate. To solve these problems, it proposes a precise classification for Android family malware called CAFM in this paper. It profoundly analyzes the relationship between the information implicit in features and the degree of differentiation among families. We select the features containing context information as feature representations. In addition, it employs a specially designed deep neural network model with upgraded learning capability for grasping the continuous features of family malware utterly. Experimental verification on a real-world dataset shows that the CAFM can effectively implement family classification, and the classification accuracy reaches 97.73% when the length of the opcode sequence is 700. Compared with other classifiers, the Kappa coefficient of the comprehensive evaluation indicator also reached 0.9725 and is at least 0.1225 higher than comparison classifiers. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

    ...
  • 4.Detection of global positioning system spoofing attack on unmanned aerial vehicle system

    • 关键词:
    • Aircraft detection ; Antennas ; Signal processing ; Drones ; Auxiliary equipment;Communication overheads ; Detection scheme ; Inertial measurement unit ; Position information ; Real time modeling ; Real time performance ; Signal processing capability ; Unmanned aerial vehicle systems
    • LiangChen;MiaoMeixia;MaJianfeng;YanHongyang;ZhangQun;LiXinghua
    • 2022年
    • 会议

    Most of the existing global positioning system (GPS) spoofing detection schemes are vulnerable to the generative GPS spoofing attack, or require additional auxiliary equipment and extensive signal processing capabilities, leading to defects such as low real-time performance and large communication overhead which are not available for the unmanned aerial vehicle (UAV, also known as drone) system. Therefore, we propose a novel solution which employs information fusion based on the GPS receiver and inertial measurement unit. We use a real-time model of tracking and calculating to derive the current position of the drones which are then contrasted with the position information received by the receiver to verify whether the presence or absence of spoofing attack. Subsequent experimental work shows that, the proposed method can accurately detect the spoof within 8 seconds, with a detection rate (DR) of 98.6%. Compared with the existing schemes, the performance of real-time detecting is improved while the DR is ensured. Even in our worst-case, we detect the spoof within 28 seconds after the UAV system starts its mission. © 2020 John Wiley & Sons Ltd

    ...
  • 5.NeuCheck: A more practical Ethereum smart contract security analysis tool

    • 关键词:
    • Blockchain ; Open source software ; Security systems ; Open systems ; Trees (mathematics) ; Ethereum;Financial benefits ; Intermediate representations ; Open;source libraries ; Security analysis ; Security analysis tools ; Security vulnerabilities ; Syntactical analyzers ; Trading platform
    • LuNing;WangBin;ZhangYongxin;ShiWenbo;EspositoChristian
    • 2021年
    • 会议

    Ethereum is one of the currently popular trading platform, where any one can exchange, buy, or sell cryptocurrencies. Smart contract, a computer program, can help Ethereum to encode rules or scripts for processing transactions. Because the smart contract usually handles large number of cryptocurrencies worth billions of dollars apiece, its security has gained considerable attention. In this paper, we first investigate the security of smart contracts running on the Ethereum and introduce several new security vulnerabilities that allow adversaries to exploit and gain financial benefits. Then, we propose a more practical smart contract analysis tool termed NeuCheck, in which we introduce the syntax tree in the syntactical analyzer to complete the transformation from source code to intermediate representation, and then adopt the open source library working with XML to analyze such tree. We have built a prototype of NeuCheck for Ethereum and evaluate it with over 52 000 existing Ethereum smart contracts. The results show that (1) our new documented vulnerabilities are prevalent; (2) NeuCheck improves the analysis speed by at least 17.2 times compared to other popular analysis tools (eg, Securify and Mythril; and (3) allows for cross-platform deployment. © 2019 John Wiley & Sons, Ltd.

    ...
  • 6.Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity

    • 关键词:
    • Privacy-preserving techniques;Bitcoin;Locks (fasteners);Anonymous systems;Blind signatures;Correlation analysis;Mix servers;Multisignature scheme;Privacy preserving;Test network;Transaction information
    • Bao, Zijian;Shi, Wenbo;Kumari, Saru;Kong, Zhi-yin;Chen, Chien-Ming
    • 2020年
    • 会议

    Bitcoin has attracted considerable attention from governments, banks, as well as researchers. However, Bitcoin is not a completely anonymous system. All transaction information in the Bitcoin system is published on the network and can be used to reveal the identity of the user by transaction correlation analysis. In this paper, a secure and privacy-preserving mix service for Bitcoin anonymity, Lockmix, is proposed. Lockmix introduces mix servers to provide a mix service for the user by using blind signature and multi-signature schemes to prevent attackers from linking the input address with the output address. Lockmix provides anonymity, scalability, accountability, Bitcoin compatibility and anti-theft. Lockmix has been implemented on a Bitcoin test network, and experiments show that our solution is efficient.
    © 2019, Springer-Verlag GmbH Germany, part of Springer Nature.

    ...
  • 7.BUA: A Blockchain-based Unlinkable Authentication in VANETs

    • 关键词:
    • Authentication;Cryptography;Network security;Vehicular ad hoc networks;Authentication protocols;Authentication scheme;Communication overheads;Distributed systems;Evaluation results;Ho-momorphic encryptions;Multiple interactions;Trusted third parties
    • Liu, Jiao;Li, Xinghua;Jiang, Qi;Obaidat, Mohammad S.;Vijayakumar, Pandi
    • 《2020 IEEE International Conference on Communications, ICC 2020》
    • 2020年
    • June 7, 2020 - June 11, 2020
    • Dublin, Ireland
    • 会议

    Authentication with unlinkability is one of the critical requirements for the security of VANETs. Unlinkability prevents attackers from linking multiple messages to infer vehicular privacy. Pseudonymous authentication schemes are widely adopted to achieve unlinkable authentication. However, they need multiple interactions with a trusted third-party to update pseudonym as well as the attached information. In order to address this issue and provide effective services in distributed systems, we propose a blockchain-based unlinkable authentication protocol called BUA, where Service Manager (SM) of each domain acts as the nodes of consortium blockchain to construct a distributed system. Each SM covers a certain logical area and maintains a sequence of consistent blocks, which hold vehicular registration data. Based on the system, vehicles use homomorphic encryption to self-generate any number of pseudonyms to achieve unlinkability. Pseudonymous validity and ownership can be verified locally by each SM. Performance evaluation results of the proposed scheme show that our protocol provides stronger security with less computation and communication overhead.
    © 2020 IEEE.

    ...
  • 8.Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity

    • 关键词:
    • Privacy-preserving techniques;Bitcoin;Locks (fasteners);Anonymous systems;Blind signatures;Correlation analysis;Mix servers;Multisignature scheme;Privacy preserving;Test network;Transaction information
    • Bao, Zijian;Shi, Wenbo;Kumari, Saru;Kong, Zhi-yin;Chen, Chien-Ming
    • 2020年
    • 会议

    Bitcoin has attracted considerable attention from governments, banks, as well as researchers. However, Bitcoin is not a completely anonymous system. All transaction information in the Bitcoin system is published on the network and can be used to reveal the identity of the user by transaction correlation analysis. In this paper, a secure and privacy-preserving mix service for Bitcoin anonymity, Lockmix, is proposed. Lockmix introduces mix servers to provide a mix service for the user by using blind signature and multi-signature schemes to prevent attackers from linking the input address with the output address. Lockmix provides anonymity, scalability, accountability, Bitcoin compatibility and anti-theft. Lockmix has been implemented on a Bitcoin test network, and experiments show that our solution is efficient.
    © 2019, Springer-Verlag GmbH Germany, part of Springer Nature.

    ...
  • 9.Anonymous Bitcoin Mixing Scheme Based on Semi-Trusted Supervisor

    • 关键词:
    • Bitcoin;Supervisory personnel;Blind signatures;Buyers and sellers;Flat structures;Mixing technology;Privacy protection;Security analysis;Threshold signature;Two-layer structures
    • Fei, Tianlong;Chang, Yuan;Wang, Jiaqi;Lu, Ning;Shi, Wenbo
    • 《3rd IEEE International Conference on Electronics Technology, ICET 2020》
    • 2020年
    • May 8, 2020 - May 12, 2020
    • Chengdu, China
    • 会议

    As Bitcoin users grow, the protection of the Bitcoin privacy protection becomes an important issue. Bitcoin mixing technology can cut off the connection between buyers and sellers. Now, a more effective method is used to carry out a coin mixing operation. The existing flat structure and two-layer structure have their own deficiencies. Therefore, anonymous Bitcoin mixing scheme is proposed. In order to increase the anonymity of coin mixing, group blind signature technology is used to expand the anonymous set of users. Moreover, a Supervisor for supervising Mixes is introduced to ensure the security of the system and the threshold signature is also used to ensure the security of the Mix's Bitcoin to prevent the Supervisor from stealing Bitcoin. Finally, the security analysis and experiment are given to conclude that our scheme is secure and efficient. © 2020 IEEE.

    ...
  • 10.A Survey on the Application of SGX in Blockchain Area

    • 关键词:
    • Economics;Distributed ledger;Blockchain;Internet of things;Application programs;Development and applications;Development directions;Emerging technologies;Hierarchical structures;Internet of Things (IOT);Privacy protection;Trusted computing technology;Waste of resources
    • Lei, Hong;Wang, Qinghao;Shi, Wenbo;Bao, Zijian
    • 《2nd International Conference on Blockchain and Trustworthy Systems, Blocksys 2020》
    • 2020年
    • August 6, 2020 - August 7, 2020
    • Dali, China
    • 会议

    As an emerging technology, blockchain is widely used in encrypted digital currencies and has an important impact in various fields such as finance, cloud storage, and Internet of things (IoT), etc. However, it faces various challenges in the process of its development and application: waste of resources, limited privacy protection, poor scalability, etc. Intel Software Guard Extensions (SGX), as a new trusted computing technology, brings solutions to the above challenges in the blockchain field. Based on the hierarchical structure of the blockchain, we are the first to systematically discuss the application status of SGX in the blockchian, including consensus layer, the ledger topology layer, the contract layer, and the application layer. Meanwhile, we summarize the advantages and challenges of SGX in the field of the blockchain, and look forward to the future development direction and the possible research topics.
    © 2020, Springer Nature Singapore Pte Ltd.

    ...
  • 排序方式:
  • 2
  • /