CN103987035B - A kind of enhanced social policy management method of secret protection - Google Patents

A kind of enhanced social policy management method of secret protection Download PDF

Info

Publication number
CN103987035B
CN103987035B CN201410194898.0A CN201410194898A CN103987035B CN 103987035 B CN103987035 B CN 103987035B CN 201410194898 A CN201410194898 A CN 201410194898A CN 103987035 B CN103987035 B CN 103987035B
Authority
CN
China
Prior art keywords
requestor
clouds
friend
management
spa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410194898.0A
Other languages
Chinese (zh)
Other versions
CN103987035A (en
Inventor
韩伟力
刘亮兴
卜瑞琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CN201410194898.0A priority Critical patent/CN103987035B/en
Publication of CN103987035A publication Critical patent/CN103987035A/en
Application granted granted Critical
Publication of CN103987035B publication Critical patent/CN103987035B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention belongs to mobile Internet field of information security technology, the enhanced social policy management method of specially a kind of secret protection.The inventive method is:When user is when some sensitive management strategies are set,The user sends SPA and asks as requestor to the multiple friends being pre-selected;After each friend receives SPA requests, the management strategy existed according to itself sets and responds automatically, and the response is sent to high in the clouds according to the encryption of default cryptographic protocol;High in the clouds is merged to multiple response according to predetermined encryption agreement according to algorithm is merged, and amalgamation result is sent into requesting party;In merging process, the particular content for ensureing each friend's management strategy using Homomorphic Encryption Scheme can neither be known by high in the clouds, can not requested person know, so as to protect the privacy of friends;4. requesting party sets the sensitive management strategy of requesting party according to default rule automatically after amalgamation result is obtained.

Description

A kind of enhanced social policy management method of secret protection
Technical field
The invention belongs to mobile Internet field of information security technology, and in particular to a kind of enhanced social of secret protection Tactical management(Socialized Policy Administration, SPA)Method.
Background technology
In recent years, mobile Internet terminal equipment, such as smart mobile phone, panel computer, quantity are just being presented growth drastically. User houses the sensitive datas such as substantial amounts of privacy and confidential data on the mobile terminal device, such as contact person, short message, even Contract text etc..One big feature of these mobile terminal devices can be operation third party application, and these applications are often Need to access substantial amounts of user's sensitive data.But, the tactical management knowledge of specialty, caused consequence are lacked due to domestic consumer It is that user has carried out unsuitable management to aware policy, so as to cause privacy leakage even property loss.Such as, user is worked as When the specific address information of Android application request or contact list information is faced, whether these requests cannot be often judged Rationally, therefore ratify together, ultimately result in the Android application can easily obtain user address information user is carried out with Track knows that contacts list is collected to the social information of user.
Traditional policy management method is widely used in the catenet and complication system of enterprise, generally by professional Or working group is responsible for strategy, including security strategy formulation.In traditional tactical management model, tactical management is usual It is divided into three phases.Design phase, tactical management personnel are analyzed to the keystone resources of system, and it is modeled, So as to design system management and security strategy;Qualify Phase, after the completion of strategy design, tactical management personnel can be using formalization Analysis tool verifies to strategy, such as conflicting policies test;Deployment phase, tactical management personnel complete to policy deployment Afterwards, the maintenance of strategy is also to blame, such as, it is necessary to be modified to management strategy after system administration demand changes.
But, because the user under mobile interchange application scenarios is general lack of the tactical management knowledge of specialty, therefore often The reasonability generated strategy cannot can be judged according to traditional policy management method, there can be instrument again to the plan formulated Slightly it is analyzed and detects.With becoming increasingly complex of management system, user can be promoted to propose more and increasingly complex strategies Management is required.Therefore, it is badly in need of some new methods to solve shortcoming present in traditional policy management method, adapts to these not The tactical management mode of the domestic consumer of enough specialties.
In scientific research, there is scholar to propose the correlation technique of collaborative tactical management, using close main body to one Tactical management of the history setting of application strategy to domestic consumer provides help.This method needs tactical management person with the master that cooperates Body collaboration completes the whole flow process of tactical management.But, in this process, the privacy requirement of cooperation main body is not accounted for, be For whole main body tactical management is carried out rather than for wall scroll strategy.
The present invention is directed to propose a kind of enhanced socialization policy management method of secret protection, its essence is a kind of for single The collaborative policy management method of bar strategy setting, and taken into full account the secret protection demand of participant.
The content of the invention
It is an object of the invention to provide a kind of enhanced social tactical management of secret protection(Socialized Policy Administration, SPA)Method.
The social policy management method that the present invention is provided, when user is when some sensitive management strategies are set, by In the default friend on social networks, user is assisted to complete tactical management.Here strategy includes:The privacy policy of user, Than such as whether allowing some third-party application can to access the telephone directory book of user;The security strategy of user, such as user After wrong input error how many times PIN code, could lock-screen.
The inventive method is concretely comprised the following steps:
(1)When user is when some sensitive management strategies are set, the user is as requestor to the multiple being pre-selected Friend's transmission SPA requests, contain asking for the management strategy correlation including types such as switch setting, integer value settings in request Topic;
(2)After each friend receives SPA requests, the management strategy existed according to itself sets and responds automatically, The response is sent to high in the clouds according to the encryption of default cryptographic protocol;
(3)High in the clouds is merged according to predetermined encryption agreement to multiple response, and amalgamation result is sent into requesting party. In merging process, the particular content for ensureing each friend's management strategy using Homomorphic Encryption Scheme can neither be known by high in the clouds, It is unable to requested person to know, so as to protect the privacy of friends;
During merging,
(a)The problem identification for being proposed according to requestor and being added when being responded by friend, looks for the response for needing to merge.Work as sound Should count more than or equal to 2, can just merge operation;
(b)Merged according to the merging algorithm requirement that requestor proposes.Here merging algorithm includes that summation merges, puts down Mean merges, maximum/decimal merges;
(4)Requesting party sets the sensitive management strategy of requesting party automatically after amalgamation result is obtained, according to preset rules.This In preset rules include obeying most, a small number of priority schedulings.
The present invention is a kind of social policy management method, different from traditional policy management method.In the method, plan Slightly administrative staff need not possess the tactical management knowledge of specialty, and the user is as requestor on social networks Multiple friend's sending strategys management request of group, invites the friend on social networks to participate in the tactical management process of collaboration.
The inventive method realizes secret protection strengthens this safety requirements, and user sends SPA as requestor to friend After request, what is finally obtained is the amalgamation result of multiple SPA responses, then completes the automation setting up procedure of aware policy, often The high in the clouds that the response that individual friend makes even is calculated the user is sightless, thus protects the privacy of friends.
In the present invention, the target of management is sensitive management strategy, including switchs the management of the types such as setting, integer value setting Strategy.
The present invention can be applied carries out aware policy management on intelligent terminal, and the sensitive management strategy to user is carried out certainly The configuration of dynamicization.
The present invention can also be applied in the privacy policy management of social networking application, and these applications generally require to obtain user's The personal data such as age, sex, hobby.
Brief description of the drawings
Fig. 1 is social tactical management process of the present invention.
Specific embodiment
The present invention is further described below in conjunction with the accompanying drawings.
Such as Fig. 1, in wechat of user Zhang San, Li Si, king five, Zhao six is referred to as in the group of " classmate ".
After the Android mobile phone of Zhang San installs Sina weibo client, when he is configured into the privacy settings page, its In " GPS location service " allow him to feel puzzled, he neither knows which personal data " GPS location service " can ask, also not It is clear to open which consequence " GPS location service " bring.Therefore, just there is a following process.
(1)Li Si, king five, Zhao six in Zhang San's selection wechat " classmate " group send a SPA to them respectively to be asked (1 and 0 "ON" and "Off" state for representing GPS location service respectively):
Request numbering: req01
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Selectable value: 1 / 0.
(2)After Li Si, king five, Zhao six receive SPA requests, following response is made respectively:
Response numbering: req01_res01
Respondent:Li Si
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Choosing value: 1 ;
Response numbering: req01_res02
Respondent:King five
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Choosing value: 1 ;
Response numbering: req01_res03
Respondent:Zhao six
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Choosing value: 0 .
The value of " the choosing value " option per bar response data is operated by the homomorphic cryptography of Paillier algorithms using public key and added It is close into ciphertext.
(3)The response for needing to merge is looked in the problem identification for being proposed according to requestor and being added when being responded by friend, high in the clouds. Response numbering is req01_res01, req01_res02, req01_res03 both for the response for asking req01, therefore high in the clouds Ciphertext to " option " of this three bar responses data carries out homomorphism add operation, by the result of summation and the sound sued for peace Number is answered to be sent to Zhang San.
(4)Summed result is carried out homomorphic decryption operation by Zhang San after summed result and number of responses is obtained using private key, Plaintext after decryption is 2, and number of responses is 3, shows that SPA request of 3 friends to Zhang San is made that response, wherein 2 people The state that " the GPS location service " of Sina weibo is set to open.In this instance, if Zhang San sets to the privacy of Sina weibo The principle of " obeying most " is put, then "On" state can be set to GPS location service option automatically.

Claims (5)

1. the enhanced social policy management method of a kind of secret protection, it is characterised in that concretely comprise the following steps:
(1)User sends SPA and asks as requestor to the multiple friends being pre-selected, and SPA represents social tactical management;
(2)After each friend receives SPA requests, the management strategy existed according to friend itself sets and responds automatically, The response is sent to high in the clouds according to the encryption of default cryptographic protocol;
(3)High in the clouds is merged according to predetermined encryption agreement to multiple response, and amalgamation result is sent into requestor;Merging During, the particular content for ensureing the management strategy that each friend has been present itself using Homomorphic Encryption Scheme can neither be by cloud End knows, can not requested person know, so as to protect the privacy of friends;
(4)Requestor sets the sensitive management strategy of requestor automatically after amalgamation result is obtained, according to preset rules;
Wherein, the management strategy that the friend has been present itself includes:The privacy policy of user and the security strategy of user.
2. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(1)In Comprising the problem that the management strategy that switch is set to integer value is set is related in described SPA requests.
3. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(2)In Described SPA responses need to be sent to high in the clouds by the encryption of default cryptographic protocol, it is ensured that high in the clouds and requestor cannot obtain bright The response data of text.
4. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(3)In Described that multiple response is merged, its rule is:
(a)The problem identification for being proposed according to requestor and being added when being responded by friend, looks for the response for needing to merge;When conforming to The number of responses asked is more than or equal to 2, can just merge operation;
(b)Merged according to the merging algorithm requirement that requestor proposes;Here merging algorithm includes summation merging, average Merge or maximum/minimum number merges.
5. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(4)In The preset rules include obeying most or a small number of preferential.
CN201410194898.0A 2014-05-10 2014-05-10 A kind of enhanced social policy management method of secret protection Expired - Fee Related CN103987035B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410194898.0A CN103987035B (en) 2014-05-10 2014-05-10 A kind of enhanced social policy management method of secret protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410194898.0A CN103987035B (en) 2014-05-10 2014-05-10 A kind of enhanced social policy management method of secret protection

Publications (2)

Publication Number Publication Date
CN103987035A CN103987035A (en) 2014-08-13
CN103987035B true CN103987035B (en) 2017-07-07

Family

ID=51278837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410194898.0A Expired - Fee Related CN103987035B (en) 2014-05-10 2014-05-10 A kind of enhanced social policy management method of secret protection

Country Status (1)

Country Link
CN (1) CN103987035B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105245499B (en) * 2015-08-31 2018-05-11 南京邮电大学 A kind of cloud service privacy information exposes evidence collecting method
US20240113876A1 (en) * 2022-10-04 2024-04-04 Lndata, Inc. Method for exchanging data and non-transitory computer-readable medium and system thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238037A (en) * 2011-07-20 2011-11-09 复旦大学 Cooperative target strategy detailing method
CN103491532A (en) * 2013-09-24 2014-01-01 北京大学 Cooperative privacy protection method and system based on Android platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8423483B2 (en) * 2008-05-16 2013-04-16 Carnegie Mellon University User-controllable learning of policies

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238037A (en) * 2011-07-20 2011-11-09 复旦大学 Cooperative target strategy detailing method
CN103491532A (en) * 2013-09-24 2014-01-01 北京大学 Cooperative privacy protection method and system based on Android platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Collaborative Policy Administration;Weili Han etc.;《IEEE Transactions on Parallel and Distributed Systems》;20130523;第25卷(第2期);全文 *

Also Published As

Publication number Publication date
CN103987035A (en) 2014-08-13

Similar Documents

Publication Publication Date Title
JP7246052B2 (en) Customer relationship management system and method of handling customer service requests
KR102480096B1 (en) Methods and systems for processing an ephemeral content message
US9967245B2 (en) User authentication using unique hidden identifiers
US11238179B2 (en) Data transfer method and recording medium
EP2874369B1 (en) Trusted communication session and content delivery
WO2020220755A1 (en) Reliable user service system and method
JP2009211632A (en) Service system
CN110020526A (en) The measures and procedures for the examination and approval, device and storage medium based on block chain authentication
US10313290B2 (en) System and method for communicating electronic health information
WO2011095874A1 (en) A method and system for establishing data communication channels
CN104331329A (en) Mobile office security system and method supporting domain management
JP2014534515A5 (en)
US11228906B2 (en) Customer communication system
CN106506443B (en) A kind of information inspection method and device
JP2019087145A5 (en) Management systems, terminals, control methods, and programs
CN107086914B (en) The comprehensive distribution method of individual health data based on big data technology and system
CN103987035B (en) A kind of enhanced social policy management method of secret protection
CN106209735A (en) A kind of information processing method, device and Electronic Health Record system
WO2013000298A1 (en) Method for adding contacts
CN106254226A (en) A kind of information synchronization method and device
WO2015117362A1 (en) Method and device for sharing personal information on terminal
CN105281916B (en) A kind of portable cryptographic system
CN107566248A (en) Social contact method and device based on augmented reality
CN107038341B (en) Family health care data managing method and system
US20150242501A1 (en) Social network address book

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170707

Termination date: 20200510