Font Size: a A A

Cryptographic Models For Detecting And Preventing Security And Privacy Issues In Data Trading

Posted on:2021-01-01Degree:DoctorType:Dissertation
Country:ChinaCandidate:Shamsher UllahFull Text:PDF
GTID:1368330602497373Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The rapidly growing rate of user's or customer's data in the data trading market collected miscellaneous online applications(social networks)and databases.Online social networks have the applications to share the user's or customer's data across the world.During the sharing of the user's data,it also poses the privacy of the user,which is a risky task to maintains the user's privacy.There is a need to ensure users' privacy protection during data sharing.Encryption performs social network privacy by using access control techniques.In data sharing,the protection of user's privacy has three main architectures,such as centralized architecture,semi-centralized architecture,and decentralized architecture.Centralized architecture:In centralized data sharing a centralized data use dimen-sionality reduction and data similarity-based representation.The protection of data is to improve the efficiency and privacy of un-familiar data.This method cannot be commonly used because it is designed explicitly for centralized data.The lack of this architecture,a single point failure would indicate the loss of the whole data.The flaw in privacy can lead to a harmful concern,which is occurring more frequently in sophisticated methods of attack and computation.The encrypted form of data needs to make business models profitable and regain privacy.Semi-centralized architecture:An intermediary solution between centralized architec-ture and distributed architecture is semi-centralized data sharing architecture.It provides the benefits of both approaches.This architecture defines key elements of the required data,and key modules of the platform are designed to achieve an efficient and effective system of trading data.It rallies the contests of interoperability,security,privacy,maintainability,availability,and scalability,etc.Decentralized architecture:The peer-to-peer(P2P)online social network does not rely on centralized storage of user data in terms of privacy in a proposed centralized architecture.Various decentralized architectures proposed to address these privacy concerns over online social network services—the decentralized data sharing architecture designed to improve the efficiency of un-familiar data in trading system architecture.A marketplace of trading markets contains several interacting applications,which can behold as user data providers,user data consumers,and user data brokers.In such a marketplace,the users can trade its data and gain benefits from sharing.These architectures grow serious privacy concerns.It is related the data sharing,the data purpose,how long to keep the data,and who is responsible for privacy maintenance.Users need to pay attention to the basic use and control of data,the purpose and conditions of user data,the retention of data,whether data can be shared and with whom,etc.The daunting task is that users need to manage their security and privacy protection during sharing data.The proposed framework(data trading)ensures contractual flexibility by negotiating some privacy elements.The goal is to find a market where you can exchange securely,trade user data,and get decent pay.The access policies of data sharing on Online Social Networks(OSNs)have an incredible growth rate in recent years and become a de-facto portal for hundreds of millions of Internet consumers.OSNs offer digital social interactions and information sharing.Its strength is that users to constrain access to shared data because they presently do not have an effective privacy protection mechanism to enforce privacy concerns on concomitant data with multiple users.The digital social interactions and information sharing of OSNs elevate a number of security and privacy issues.The resolve these issues,Persona,EASieR,Attribute-Based Data Sharing,Attribute-Based Encryption(ABE)encryption schemes are used.In this dissertation,we study the security and privacy issues such as confidentiality protection,organization maintenance,social contract,customer deviant acts,misconception exclusion,planning and evaluation,payment and data trading demand in data sharing and social network platform.We proposed two schemes "?-access policy" and "TTP based signcryption scheme." The innovation of our proposed ?-access policy scheme is to protect customer confidentiality,to maintain the contract of the customer on behalf of a social network,to maintain the trading organization trading strategies between the sellers and buyers,to avoid the customer deviant acts(harmful acts of the seller and buyer during trading),to prevent misconception exclusion(not to transfer the sell or te buy goods to the unrelated customer),to provide plan and evaluation(at any time the trading manager to provides access to the seller and buyer with an accurate plan,which is successful for the trading market),to provide successful payment(from buyer to seller),and data trading demands(the social network increase the trading demands for seller and buyer).The rapid development of data sharing and social technology has replaced physical interaction in the data trading market.The application of this technology is to provide access to the right information at the right time.The drawback is that the eavesdropper can remove the user from the network and can create proxy participants.In our dissertation,we discuss how a social network overcome and prevent these data trading issues.We proposed a novel encryption scheme known as ?-access policy.The user can encrypt and decrypt Private Transaction Information(PTI)in a social network-based data trading.The security properties of our proposed access policy scheme are data confidentiality,data integrity,authenticity,non-repudiation,unforgeability.The efficiency of our proposed access policy scheme is 77.73%,which is more suitable for data trading markets and trading strategies.In TTP based signcryption scheme TTP becomes free from a burden of activities,like to encrypt the requests of the Cloud Service Users(CSUs)and to decrypt the services of the Cloud Service Providers(CSPs)again and again.The Effective Performance(EP)of our scheme is based on the major operations such as Elliptic Curve Point Multiplication,Hash,Inversion,Exclusive oR,Encryption,and Decryption.The security requirements of our scheme are;data integrity,data confidentiality,authenticity,non-repudiation,forward secrecy,unforgeability,and untraceability.
Keywords/Search Tags:Cryptography, Encryption, Decryption, Attribute Based Encryption, Privacy Preserving Protocol, Integrity, Data Trading, PTI, ?-access Policy
PDF Full Text Request
Related items