Mobile Database Security Assessment Against Location Detection Attacks Using Blind Signature

سال انتشار: 1386
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,891

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ISCEE10_122

تاریخ نمایه سازی: 7 آذر 1390

چکیده مقاله:

Mobile database system is an emerging research area which has recently attained considerable concerns. The idea of accessing data any where and any time, poses new security problems in mobile environments. One of these security issues is maintaining the mobile user location privacy. The objective is to prohibit deducing user location and movement through eavesdropping or accessing metadata which is stored in database tables.This paper presents a new method to protect user location privacy for mobile database based on blind signature. In addition, the proposed technique preserves confidentiality of the database content.

نویسندگان

Maede Ashoori

Computer Engineering Department, The University of Isfahan, HezarJerib.st, Isfahan, Iran

Ahmad Baraani

Computer Engineering Department, The University of Isfahan, HezarJerib.st, Isfahan, Iran,

Naser Movahedinia

Computer Engineering Department, The University of Isfahan, HezarJerib.st, Isfahan, Iran,

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • P. Bhaskar, S. I. Ahamed, Privacy in Pervasive Computing and ...
  • A. Lubinski, Security Issues in Mobile Database Access, in: Proc. ...
  • A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts, ...
  • Conference _ Internet Computing (IC'2000), Las Vegas, 2000, 395-402. ...
  • Dwayne Williams, Roger L. Davis, Principle of Computer Security security+ ...
  • M. Bishop, Introduction o Computer Security, Prentice Hall PTR, 2004. ...
  • Andrew S. Tanenbaum, Distributed Operating Systems, Prentic Hall, 1995. ...
  • H. X. Mel Doris Baker. Cryptography decrypted, Addison- Wesley, 2001. ...
  • N. Koblitz, A Course in Number Theory and Cryptography, 2nd ...
  • Location Information, in: Lecture Notes in Computer [35] N. Koblitz, ...
  • J. Silverman, The Arithmetc of Elliptic Curves, Springer- Verlag, New ...
  • A. Gorlach, A. Heinemann, W. Terpstra, Survey on [37] J. ...
  • First Workshop _ Security and Privacy at the Conference [38] ...
  • Privacy-Aware Ubiquitous Systems, in: Lecture Notes in [39] P.Bellavista, M.Cinque, ...
  • M. S. Hwang, P. C. Sung, A Study of Micro-payment ...
  • Josef Pieprzyk, Thomas Hardjono, Jennifer Sebberry, Fundamentas of Computer Security, ...
  • computing environments, in: Proc. of the 3rd Int'1 Conf _ ...
  • M. Rabin, Digitalized signatures as intractable as factorization. Technical Report ...
  • Networks, in: Proc. of the 4th ACM international [44] H. ...
  • H. Federrath, A. Jerichow, A. Pfitzmann, Mixes in Mobile [45] ...
  • A. R. Beresford and F. Stajano. Location Privacy in [46] ...
  • D. Boneh, Twenty years of attacks _ the RSA cryptosystems, ...
  • N. B. Priyantha, A. Chakraborty, H. Balakrishnan, The [48] M.J.B. ...
  • A. S. Wander, N. Gura, H. Eberle, V. Gupta, S. ...
  • H. Pietilainen, Elliptic curve cryptography on smart cards, Master Thesis, ...
  • M. Bishop, Computer Security: Art and Science, Addison Wesley Professional, ...
  • S. Pohlig and M. Hellman, An improved algorithm for computing ...
  • A. Lubinski, Database Security meets Mobile [53] A. Odlyzko, The ...
  • _ Varadharajan, Y. Mu, Design of secure end-to-end protocols for ...
  • D. Chaum, Blind Signatures for Untraceable Payments, Springer- Verlag (1998) ...
  • D. Chaum, Untraceable electronic mail, J. C ommunic ations of ...
  • A. Tanenbau. Computer Network, Prentice Hall, fourth ed.. Upper Saddle ...
  • A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied ...
  • U. Hengartner, P. Steenkiste, Protecting Access to People ...
  • Science, Springer, 2004, 25-38. ...
  • E. Pitoura, G. Samaras, Location Objects in Mobile, J. IEEE ...
  • on Pervasive Computing (SPPC), Vienna, Austria, 2004. ...
  • M. Langheinrich, Privacy by Design - Principles of ...
  • Computer Science, Springer, vol. 2201, 2001, 273-29. ...
  • M. Langheinrich, A Privacy Awareness System for Ubiquitous Computing Environments, ...
  • E. Snekkenes, Concepts for Personal Location Privacy Policies, in: Proc. ...
  • K. Henricksen, R. Wishart, T. McFadden, J. Indulska, Extending context ...
  • Pervasive Computing and C ommunications Workshops, IEEE Computer Security, 2005. ...
  • J. Kong, X. Hong, ANODR: Anonymous On Demand Routing with ...
  • symposium on Mobile ad-hoc Networking & computing, ACM Press, 2003, ...
  • C ommunication Systems: Location Management with Privacy. J. Information Hiding ...
  • Pervasive Computing. J. PERVASIVE computing, IEEE CS and IEEE C ...
  • Cricket Loc ation-Support System, J. Mobile Computing and Networking (2000) ...
  • Computing and the Place Lab Initiative, in: Proc. Of The ...
  • C ommunications Security, ACM Press, 2003, 103-111. [27] Steve Lewis, ...
  • Requirements, Computer Science Department, in: Proc. Int. Symp. Database Technology ...
  • نمایش کامل مراجع