語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Protecting Data Security and Privacy...
~
The George Washington University.
Protecting Data Security and Privacy in Internet of Things.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Protecting Data Security and Privacy in Internet of Things./
作者:
Li, Ruinian.
面頁冊數:
1 online resource (103 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9780355868876
Protecting Data Security and Privacy in Internet of Things.
Li, Ruinian.
Protecting Data Security and Privacy in Internet of Things.
- 1 online resource (103 pages)
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
Thesis (Ph.D.)--The George Washington University, 2018.
Includes bibliographical references
Internet of Things (IoT) describes the ubiquitous connection of everyday objects. With the dramatically increasing deployment of IoT devices, tremendous interactions between physical objects are enabled, which brings improved efficiency, accuracy and economic benefits while reducing human interventions. However, in IoT systems such as smart grid, smart home, and implantable medical systems, sensitive user data can be leaked to outside adversaries and the service provider. The problem is hard to solve: firstly, IoT devices are power-restricted, and traditional cryptographic mechanisms cannot be directly applied; secondly, service providers usually need to collect data from IoT devices for data aggregations, which leads to the following challenge: how to protect security and data privacy from the service providers while still maintaining the service?
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355868876Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Protecting Data Security and Privacy in Internet of Things.
LDR
:03412ntm a2200337K 4500
001
912921
005
20180608130009.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780355868876
035
$a
(MiAaPQ)AAI10792914
035
$a
(MiAaPQ)gwu:14167
035
$a
AAI10792914
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Li, Ruinian.
$3
1185499
245
1 0
$a
Protecting Data Security and Privacy in Internet of Things.
264
0
$c
2018
300
$a
1 online resource (103 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: B.
500
$a
Advisers: Xiuzhen Cheng; Timothy Wood.
502
$a
Thesis (Ph.D.)--The George Washington University, 2018.
504
$a
Includes bibliographical references
520
$a
Internet of Things (IoT) describes the ubiquitous connection of everyday objects. With the dramatically increasing deployment of IoT devices, tremendous interactions between physical objects are enabled, which brings improved efficiency, accuracy and economic benefits while reducing human interventions. However, in IoT systems such as smart grid, smart home, and implantable medical systems, sensitive user data can be leaked to outside adversaries and the service provider. The problem is hard to solve: firstly, IoT devices are power-restricted, and traditional cryptographic mechanisms cannot be directly applied; secondly, service providers usually need to collect data from IoT devices for data aggregations, which leads to the following challenge: how to protect security and data privacy from the service providers while still maintaining the service?
520
$a
In my work, data protection is considered in two aspects: data aggregation and data storage. For example, in a smart grid system, smarter meters report fine-grained data to the server for data aggregation. However, exposing user's data will leak private information of user's daily activities, and the privacy of fine-grained data should be protected. Recent works have suggested using homomorphic encryption to protect data privacy. However, homomorphic encryption consumes too much computation and is not suitable for this application. To solve this problem, we define a novel problem, and the solution to this problem leads to a secure and efficient protocol in smart grid data aggregation. Date storage is another aspect we consider. In a traditional IoT structure, sensitive patient data is collected and sent to a centralized server for storage. This indicates high storage requirement of the server, and the risk of information leakage from the server. Therefore, a secure decentralized structure is in need for IoT data storage.
520
$a
In this dissertation, smart shopping and smart home systems are also studied as two typical IoT systems. Particularly, the first secure smart shopping system is proposed, and a smart shopping cart prototype is designed and tested. Furthermore, a secure and efficient protocol based on chaotic cryptography is designed for smart home system.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
The George Washington University.
$b
Computer Science.
$3
1148676
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10792914
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入