The Privacy Protection Search of Spam Firewall

被引:0
作者
Li, Kangshun [1 ]
Wen, Zhichao [1 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Guangdong, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015) | 2016年 / 575卷
关键词
Spam; Privacy-protection; Public-key-encryption; Searchable; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH;
D O I
10.1007/978-981-10-0356-1_67
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Although most of the existing encryption system takes the privacy issues of storing data into consider, the reveal of user access pattern is inevitable during the e-mail filtering. Therefore, how to protect the private data in the process of spam filtering becomes one of the urgent problems to be solved. Combined with two filtering techniques which are based on keyword and blacklist respectively, this paper achieves the goal of sorting and filtering spams. Meanwhile, given the privacy issues in sorting and filtering the spams, the paper is based on an experimental project, the Pairing Based Cryptography, which is performed by Stanford University to achieve the e-mail encryption program. It adopts a searchable public key encryption in the process of sorting and filtering, which needs no decryption and can realize searching and matching operations. By this method, it fully protects the privacy and access patterns of the mail receiver from disclosing.
引用
收藏
页码:648 / 658
页数:11
相关论文
共 10 条
  • [1] Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
  • [2] Bei Z., 2010, COMPUT ENG, V36, P155, DOI [10.3969/j.issn.1000-3428.2010.06.052, DOI 10.3969/J.ISSN.1000-3428.2010.06.052]
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [4] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [5] Dodis Y, 2002, LECT NOTES COMPUT SC, V2332, P65
  • [6] Guo-hua C., 2009, COMPUT SCI, V36, P58
  • [7] Hao-miao Y., 2006, J SICHUAN U ENG SCI, V1, P137
  • [8] Li J., 2011, J NETW, V6, P1254
  • [9] Meng X., 2009, J NE AGR U SOC SCI E, V1, P37
  • [10] Ran C., 2003, LNCS, V2656