CN103987035B - A kind of enhanced social policy management method of secret protection - Google Patents
A kind of enhanced social policy management method of secret protection Download PDFInfo
- Publication number
- CN103987035B CN103987035B CN201410194898.0A CN201410194898A CN103987035B CN 103987035 B CN103987035 B CN 103987035B CN 201410194898 A CN201410194898 A CN 201410194898A CN 103987035 B CN103987035 B CN 103987035B
- Authority
- CN
- China
- Prior art keywords
- requestor
- clouds
- friend
- management
- spa
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The invention belongs to mobile Internet field of information security technology, the enhanced social policy management method of specially a kind of secret protection.The inventive method is:When user is when some sensitive management strategies are set,The user sends SPA and asks as requestor to the multiple friends being pre-selected;After each friend receives SPA requests, the management strategy existed according to itself sets and responds automatically, and the response is sent to high in the clouds according to the encryption of default cryptographic protocol;High in the clouds is merged to multiple response according to predetermined encryption agreement according to algorithm is merged, and amalgamation result is sent into requesting party;In merging process, the particular content for ensureing each friend's management strategy using Homomorphic Encryption Scheme can neither be known by high in the clouds, can not requested person know, so as to protect the privacy of friends;4. requesting party sets the sensitive management strategy of requesting party according to default rule automatically after amalgamation result is obtained.
Description
Technical field
The invention belongs to mobile Internet field of information security technology, and in particular to a kind of enhanced social of secret protection
Tactical management(Socialized Policy Administration, SPA)Method.
Background technology
In recent years, mobile Internet terminal equipment, such as smart mobile phone, panel computer, quantity are just being presented growth drastically.
User houses the sensitive datas such as substantial amounts of privacy and confidential data on the mobile terminal device, such as contact person, short message, even
Contract text etc..One big feature of these mobile terminal devices can be operation third party application, and these applications are often
Need to access substantial amounts of user's sensitive data.But, the tactical management knowledge of specialty, caused consequence are lacked due to domestic consumer
It is that user has carried out unsuitable management to aware policy, so as to cause privacy leakage even property loss.Such as, user is worked as
When the specific address information of Android application request or contact list information is faced, whether these requests cannot be often judged
Rationally, therefore ratify together, ultimately result in the Android application can easily obtain user address information user is carried out with
Track knows that contacts list is collected to the social information of user.
Traditional policy management method is widely used in the catenet and complication system of enterprise, generally by professional
Or working group is responsible for strategy, including security strategy formulation.In traditional tactical management model, tactical management is usual
It is divided into three phases.Design phase, tactical management personnel are analyzed to the keystone resources of system, and it is modeled,
So as to design system management and security strategy;Qualify Phase, after the completion of strategy design, tactical management personnel can be using formalization
Analysis tool verifies to strategy, such as conflicting policies test;Deployment phase, tactical management personnel complete to policy deployment
Afterwards, the maintenance of strategy is also to blame, such as, it is necessary to be modified to management strategy after system administration demand changes.
But, because the user under mobile interchange application scenarios is general lack of the tactical management knowledge of specialty, therefore often
The reasonability generated strategy cannot can be judged according to traditional policy management method, there can be instrument again to the plan formulated
Slightly it is analyzed and detects.With becoming increasingly complex of management system, user can be promoted to propose more and increasingly complex strategies
Management is required.Therefore, it is badly in need of some new methods to solve shortcoming present in traditional policy management method, adapts to these not
The tactical management mode of the domestic consumer of enough specialties.
In scientific research, there is scholar to propose the correlation technique of collaborative tactical management, using close main body to one
Tactical management of the history setting of application strategy to domestic consumer provides help.This method needs tactical management person with the master that cooperates
Body collaboration completes the whole flow process of tactical management.But, in this process, the privacy requirement of cooperation main body is not accounted for, be
For whole main body tactical management is carried out rather than for wall scroll strategy.
The present invention is directed to propose a kind of enhanced socialization policy management method of secret protection, its essence is a kind of for single
The collaborative policy management method of bar strategy setting, and taken into full account the secret protection demand of participant.
The content of the invention
It is an object of the invention to provide a kind of enhanced social tactical management of secret protection(Socialized
Policy Administration, SPA)Method.
The social policy management method that the present invention is provided, when user is when some sensitive management strategies are set, by
In the default friend on social networks, user is assisted to complete tactical management.Here strategy includes:The privacy policy of user,
Than such as whether allowing some third-party application can to access the telephone directory book of user;The security strategy of user, such as user
After wrong input error how many times PIN code, could lock-screen.
The inventive method is concretely comprised the following steps:
(1)When user is when some sensitive management strategies are set, the user is as requestor to the multiple being pre-selected
Friend's transmission SPA requests, contain asking for the management strategy correlation including types such as switch setting, integer value settings in request
Topic;
(2)After each friend receives SPA requests, the management strategy existed according to itself sets and responds automatically,
The response is sent to high in the clouds according to the encryption of default cryptographic protocol;
(3)High in the clouds is merged according to predetermined encryption agreement to multiple response, and amalgamation result is sent into requesting party.
In merging process, the particular content for ensureing each friend's management strategy using Homomorphic Encryption Scheme can neither be known by high in the clouds,
It is unable to requested person to know, so as to protect the privacy of friends;
During merging,
(a)The problem identification for being proposed according to requestor and being added when being responded by friend, looks for the response for needing to merge.Work as sound
Should count more than or equal to 2, can just merge operation;
(b)Merged according to the merging algorithm requirement that requestor proposes.Here merging algorithm includes that summation merges, puts down
Mean merges, maximum/decimal merges;
(4)Requesting party sets the sensitive management strategy of requesting party automatically after amalgamation result is obtained, according to preset rules.This
In preset rules include obeying most, a small number of priority schedulings.
The present invention is a kind of social policy management method, different from traditional policy management method.In the method, plan
Slightly administrative staff need not possess the tactical management knowledge of specialty, and the user is as requestor on social networks
Multiple friend's sending strategys management request of group, invites the friend on social networks to participate in the tactical management process of collaboration.
The inventive method realizes secret protection strengthens this safety requirements, and user sends SPA as requestor to friend
After request, what is finally obtained is the amalgamation result of multiple SPA responses, then completes the automation setting up procedure of aware policy, often
The high in the clouds that the response that individual friend makes even is calculated the user is sightless, thus protects the privacy of friends.
In the present invention, the target of management is sensitive management strategy, including switchs the management of the types such as setting, integer value setting
Strategy.
The present invention can be applied carries out aware policy management on intelligent terminal, and the sensitive management strategy to user is carried out certainly
The configuration of dynamicization.
The present invention can also be applied in the privacy policy management of social networking application, and these applications generally require to obtain user's
The personal data such as age, sex, hobby.
Brief description of the drawings
Fig. 1 is social tactical management process of the present invention.
Specific embodiment
The present invention is further described below in conjunction with the accompanying drawings.
Such as Fig. 1, in wechat of user Zhang San, Li Si, king five, Zhao six is referred to as in the group of " classmate ".
After the Android mobile phone of Zhang San installs Sina weibo client, when he is configured into the privacy settings page, its
In " GPS location service " allow him to feel puzzled, he neither knows which personal data " GPS location service " can ask, also not
It is clear to open which consequence " GPS location service " bring.Therefore, just there is a following process.
(1)Li Si, king five, Zhao six in Zhang San's selection wechat " classmate " group send a SPA to them respectively to be asked
(1 and 0 "ON" and "Off" state for representing GPS location service respectively):
Request numbering: req01
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Selectable value: 1 / 0.
(2)After Li Si, king five, Zhao six receive SPA requests, following response is made respectively:
Response numbering: req01_res01
Respondent:Li Si
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Choosing value: 1 ;
Response numbering: req01_res02
Respondent:King five
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Choosing value: 1 ;
Response numbering: req01_res03
Respondent:Zhao six
Requestor:Zhang San
Application program:Sina weibo
Setting option:GPS location is serviced
Choosing value: 0 .
The value of " the choosing value " option per bar response data is operated by the homomorphic cryptography of Paillier algorithms using public key and added
It is close into ciphertext.
(3)The response for needing to merge is looked in the problem identification for being proposed according to requestor and being added when being responded by friend, high in the clouds.
Response numbering is req01_res01, req01_res02, req01_res03 both for the response for asking req01, therefore high in the clouds
Ciphertext to " option " of this three bar responses data carries out homomorphism add operation, by the result of summation and the sound sued for peace
Number is answered to be sent to Zhang San.
(4)Summed result is carried out homomorphic decryption operation by Zhang San after summed result and number of responses is obtained using private key,
Plaintext after decryption is 2, and number of responses is 3, shows that SPA request of 3 friends to Zhang San is made that response, wherein 2 people
The state that " the GPS location service " of Sina weibo is set to open.In this instance, if Zhang San sets to the privacy of Sina weibo
The principle of " obeying most " is put, then "On" state can be set to GPS location service option automatically.
Claims (5)
1. the enhanced social policy management method of a kind of secret protection, it is characterised in that concretely comprise the following steps:
(1)User sends SPA and asks as requestor to the multiple friends being pre-selected, and SPA represents social tactical management;
(2)After each friend receives SPA requests, the management strategy existed according to friend itself sets and responds automatically,
The response is sent to high in the clouds according to the encryption of default cryptographic protocol;
(3)High in the clouds is merged according to predetermined encryption agreement to multiple response, and amalgamation result is sent into requestor;Merging
During, the particular content for ensureing the management strategy that each friend has been present itself using Homomorphic Encryption Scheme can neither be by cloud
End knows, can not requested person know, so as to protect the privacy of friends;
(4)Requestor sets the sensitive management strategy of requestor automatically after amalgamation result is obtained, according to preset rules;
Wherein, the management strategy that the friend has been present itself includes:The privacy policy of user and the security strategy of user.
2. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(1)In
Comprising the problem that the management strategy that switch is set to integer value is set is related in described SPA requests.
3. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(2)In
Described SPA responses need to be sent to high in the clouds by the encryption of default cryptographic protocol, it is ensured that high in the clouds and requestor cannot obtain bright
The response data of text.
4. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(3)In
Described that multiple response is merged, its rule is:
(a)The problem identification for being proposed according to requestor and being added when being responded by friend, looks for the response for needing to merge;When conforming to
The number of responses asked is more than or equal to 2, can just merge operation;
(b)Merged according to the merging algorithm requirement that requestor proposes;Here merging algorithm includes summation merging, average
Merge or maximum/minimum number merges.
5. the enhanced social policy management method of secret protection according to claim 1, it is characterised in that step(4)In
The preset rules include obeying most or a small number of preferential.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410194898.0A CN103987035B (en) | 2014-05-10 | 2014-05-10 | A kind of enhanced social policy management method of secret protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410194898.0A CN103987035B (en) | 2014-05-10 | 2014-05-10 | A kind of enhanced social policy management method of secret protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103987035A CN103987035A (en) | 2014-08-13 |
CN103987035B true CN103987035B (en) | 2017-07-07 |
Family
ID=51278837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410194898.0A Expired - Fee Related CN103987035B (en) | 2014-05-10 | 2014-05-10 | A kind of enhanced social policy management method of secret protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103987035B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105245499B (en) * | 2015-08-31 | 2018-05-11 | 南京邮电大学 | A kind of cloud service privacy information exposes evidence collecting method |
US20240113876A1 (en) * | 2022-10-04 | 2024-04-04 | Lndata, Inc. | Method for exchanging data and non-transitory computer-readable medium and system thereof |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102238037A (en) * | 2011-07-20 | 2011-11-09 | 复旦大学 | Cooperative target strategy detailing method |
CN103491532A (en) * | 2013-09-24 | 2014-01-01 | 北京大学 | Cooperative privacy protection method and system based on Android platform |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8423483B2 (en) * | 2008-05-16 | 2013-04-16 | Carnegie Mellon University | User-controllable learning of policies |
-
2014
- 2014-05-10 CN CN201410194898.0A patent/CN103987035B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102238037A (en) * | 2011-07-20 | 2011-11-09 | 复旦大学 | Cooperative target strategy detailing method |
CN103491532A (en) * | 2013-09-24 | 2014-01-01 | 北京大学 | Cooperative privacy protection method and system based on Android platform |
Non-Patent Citations (1)
Title |
---|
Collaborative Policy Administration;Weili Han etc.;《IEEE Transactions on Parallel and Distributed Systems》;20130523;第25卷(第2期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN103987035A (en) | 2014-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7246052B2 (en) | Customer relationship management system and method of handling customer service requests | |
KR102480096B1 (en) | Methods and systems for processing an ephemeral content message | |
US9967245B2 (en) | User authentication using unique hidden identifiers | |
US11238179B2 (en) | Data transfer method and recording medium | |
EP2874369B1 (en) | Trusted communication session and content delivery | |
WO2020220755A1 (en) | Reliable user service system and method | |
JP2009211632A (en) | Service system | |
CN110020526A (en) | The measures and procedures for the examination and approval, device and storage medium based on block chain authentication | |
US10313290B2 (en) | System and method for communicating electronic health information | |
WO2011095874A1 (en) | A method and system for establishing data communication channels | |
CN104331329A (en) | Mobile office security system and method supporting domain management | |
JP2014534515A5 (en) | ||
US11228906B2 (en) | Customer communication system | |
CN106506443B (en) | A kind of information inspection method and device | |
JP2019087145A5 (en) | Management systems, terminals, control methods, and programs | |
CN107086914B (en) | The comprehensive distribution method of individual health data based on big data technology and system | |
CN103987035B (en) | A kind of enhanced social policy management method of secret protection | |
CN106209735A (en) | A kind of information processing method, device and Electronic Health Record system | |
WO2013000298A1 (en) | Method for adding contacts | |
CN106254226A (en) | A kind of information synchronization method and device | |
WO2015117362A1 (en) | Method and device for sharing personal information on terminal | |
CN105281916B (en) | A kind of portable cryptographic system | |
CN107566248A (en) | Social contact method and device based on augmented reality | |
CN107038341B (en) | Family health care data managing method and system | |
US20150242501A1 (en) | Social network address book |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170707 Termination date: 20200510 |