基于物联网和云计算的RFID个人消费数据隐私保护系统研究

Ningning Du, Chongxu Chen
{"title":"基于物联网和云计算的RFID个人消费数据隐私保护系统研究","authors":"Ningning Du, Chongxu Chen","doi":"10.1504/ijics.2021.116930","DOIUrl":null,"url":null,"abstract":"Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing\",\"authors\":\"Ningning Du, Chongxu Chen\",\"doi\":\"10.1504/ijics.2021.116930\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.\",\"PeriodicalId\":164016,\"journal\":{\"name\":\"Int. J. Inf. Comput. Secur.\",\"volume\":\"86 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Inf. Comput. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijics.2021.116930\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Inf. Comput. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijics.2021.116930","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网和云计算对社会学、法学和伦理学的传统观念造成了颠覆。为了提高个人消费数据的隐私保护水平,利用物联网和云计算技术构建隐私保护模型。首先,对RFID中个人隐私数据保护的法律解释。其次,提出了基于云计算的隐私保护模型,并设计了相应的算法。第三,设计了RFID个人消费数据的隐私保护认证协议。最后,在仿真分析的基础上,对传统隐私保护系统和所提出的隐私保护系统的协议搜索耗时进行了比较。结果表明,该模型能够有效地保护个人消费数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing
Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Vulnerability discovery modelling: a general framework Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework Empirical risk assessment of attack graphs using time to compromise framework Fault-based testing for discovering SQL injection vulnerabilities in web applications Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1