HTIME: A Hash-Based Terminal Identification Method in Cloud Environment

被引:0
作者
Liu, Bowen [1 ,2 ]
Jiang, Xutong [1 ,2 ]
Song, Zhang [1 ,2 ]
Liu, Jiabang [1 ,2 ]
Dou, Wanchun [1 ,2 ]
机构
[1] Northeastern Univ, Dept Software, Shenyang, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Peoples R China
来源
2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA) | 2019年
基金
中国国家自然科学基金;
关键词
cloud environment; terminal verify; privacy security; hash algorithm; BIG-DATA;
D O I
10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00035
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In mobile computing environment, it is a key issue to ensure the security of a user when he/she visits a cloud service by his/her smart terminal. Generally speaking, the existing techniques, e.g. biometric technique, human activity recognition, focus on protecting users' security through collecting a large number of users' behavior data. It often results in a risk of privacy disclosure. In view of this challenge, a Hash-based Terminal Identification Method, named HTIME, is proposed in this paper, which is deployed with a few user behavior data. At last, a real and typical scenario is discussed to verify the feasibility and efficiency of the approach.
引用
收藏
页码:74 / 81
页数:8
相关论文
共 23 条
[1]   Biometric touchstroke authentication by fuzzy proximity of touch locations [J].
Alpar, Orcan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :71-80
[2]  
Androulidakis I, 2011, ICDT 2011: THE SIXTH INTERNATIONAL CONFERENCE ON DIGITAL TELECOMMUNICATIONS, P18
[3]  
[Anonymous], 2014, CORR
[4]  
[Anonymous], 2005, TECH REP
[5]  
[Anonymous], INT J MATH COMPUT SC
[6]  
Dai Zovi D. A., 2011, BLACK HAT US, V24, P37
[7]  
Felt Adrienne Porter, 2011, P 1 ACM WORKSH SEC P, P3, DOI DOI 10.1145/2046614.2046618
[8]   Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment [J].
Feng, Qi ;
He, Debiao ;
Zeadally, Sherali ;
Wang, Huaqun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :239-251
[9]  
Hassan M. M., 2011, FUTURE GENER COMP SY, V81, P307
[10]   Hiding biometric data [J].
Jain, AK ;
Uludag, U .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (11) :1494-1498