Computer Science ›› 2019, Vol. 46 ›› Issue (3): 217-220.doi: 10.11896/j.issn.1002-137X.2019.03.032

• Information Security • Previous Articles     Next Articles

Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication

ZHANG Jian-an   

  1. (Kunming Branch,No.3 College,PLA Information Engineering University,Kunming 650231,China)
  • Received:2018-04-09 Revised:2018-08-22 Online:2019-03-15 Published:2019-03-22

Abstract: In order to ensure the security of users’ sensitive information,it’s essential to transmit the users’ sensitive information in a covert manner.When the current method is used to hide the users’ sensitive information in the hierarchical heterogeneous network,the obtained information has low integrity and low information security.This paper proposed a users’ sensitive information hiding method in hierarchical heterogeneous networks based on mobile swit-ching authentication.It uses the embedded unit scrambling algorithm to scramble the sensitive information of users and disrupts the normal ordering of users’ sensitive information in hierarchical heterogeneous networks.Then,combined with the HSI model,the optimal users’ sensitive information embedding position is obtained within the scrambled users’ sensitive information sorting sequence according to the character brightness encoding mechanism.And the vector-based manipulation method is used to set the embedding unit of users’ sensitive information in the hierarchical heterogeneous network.According to the analysis results,users’ sensitive information is embedded in the optimal embedding position,and the users’ sensitive information hiding in the hierarchical heterogeneous network is completed.The experimental results show that the information obtained by the proposed method has high integrity and security.

Key words: Mobile switching authentication, Layered heterogeneous network, User information, Sensitive information hiding

CLC Number: 

  • TP309
[1] WU M T,ZHAN J,LIN C W.Ant Colony System Sanitization Approach to Hiding Sensitive Itemsets[J].IEEE Access,2017,PP(99):1
[2] XIANG L,PENG J X,ZHANG L.Network Clustering Algo-rithm Based on Energy Time Competition Mechanism in Hete-rogeneous Network Environment[J].Bulletin of Science and Technology,2017,33(8):185-188.(in Chinese)向岚,彭进香,张莉.异构网络环境中基于能量时间竞争机制的网络分簇算法研究[J].科技通报,2017,33(8):185-188.
[3] LUO C,FYLAKIS A,PARTALA J,et al.A data hiding approach for sensitive smartphone data[C]∥ACM International Joint Conference on Pervasive and Ubiquitous Computing.ACM,2016:557-568.
[4] ZHANG X,ZHANG Y,JIN C F,et al.A Dynamic Almost Blank Subframes Allocation for Interference Coordination in Heterogeneous Networks[J].Computer Measurement & Control,2016,24(7):215-218.(in Chinese)张新,张艳,金春凤,等.异构网络动态配置空白子帧干扰协调算法[J].计算机测量与控制,2016,24(7):215-218.
[5] SHARMA S,TOSHNIWAL D.Scalable two-phase co-occurring sensitive pattern hiding using MapReduce[J].Journal of Big Data,2017,4(1):4-14.
[6] LI S B,WANG L R,LIU P,et al.A HEVC Information Hiding Approach Based on Motion Vection Space Encoding[J].Chinese Journal of Computers,2016,39(7):1450-1463.(in Chinese)李松斌,王凌睿,刘鹏,等.一种基于运动矢量空间编码的HEVC信息隐藏方法[J].计算机学报,2016,39(7):1450-1463.
[7] LIN C W,LIU Q,FOURNIER-VIGER P,et al.A sanitizationapproach for hiding sensitive itemsets based on particle swarm optimization[J].Engineering Applications of Artificial Intelligence,2016,53(C):1-18.
[8] GAO B,ZHAI J T,DAI Y W.Information hiding method based on Have messages in BitTorrent protocol[J].Journal of Computer Applications,2017,37(1):200-205.(in Chinese)高斌,翟江涛,戴跃伟.基于BitTorrent协议Have消息的信息隐藏方法[J].计算机应用,2017,37(1):200-205.
[9] KHEDEKAR L S.Security:An effective technique to protectingsensitive information using quick response code[C]∥International Conference on Communication and Signal Processing.IEEE,2016:1185-1188.
[10] PENG Y B,XIE X T.The adaptive Web information extraction based on single DOM tree characteristics and classification[J].Electronic Design Engineering,2017,25(19):56-59.(in Chinese)彭艳兵,谢馨庭.基于单DOM树特征预分类的自适应Web信息抽取方法[J].电子设计工程,2017,25(19):56-59.
[11] YANG M J,SHAO D,LIU K Y.Vertical handoff for heterogeneous wireless network based on mobile terminal priority[J].Journal of Dalian Polytechnic University,2018,20(1):73-78.(in Chinese)杨明极,邵丹,刘恺怿.移动终端在异构无线网络中的接入方法[J].大连工业大学学报,2018,20(1):73-78.
[12] FEI H H.Research on Optimal Detection Method of User Infor-mation Resources In Network[J].Computer Simulation,2017(12):318-320.(in Chinese)费宏慧.导构网络中用户信息资源优化检测方法研究[J].计算机仿真,2017(12):318-320.
[13] Innowireless Co.L.Method of switching connection to femtocell and wifi ap in sdn[J].New Patents & Technology,2016,21(3):12.
[14] MA B,DENG H,XIE X Z.Two-sided Matching Model BasedVertical Handover Algorithm in Heterogeneous Wireless Networks[J].Journal of Electronics & Information Technology,2018,40(2):421-429.(in Chinese)马彬,邓红,谢显中.基于双向匹配模型的异构网络垂直切换算法[J].电子与信息学报,2018,40(2):421-429.
[15] LI X W,WANG X J,TIAN F X,et al.Analysis and Implementation of Handover Process of Dual Connectivity Technology based on Heterogeneous Networks[J].Study on Optical Communications,2017,43(2):68-70.(in Chinese)李小文,王晓娟,田凤仙,等.基于异构网双连接技术切换流程的分析与实现[J].光通信研究,2017,43(2):68-70.
[16] WU W G,ZHANG Z W,WANG Q S.A Information Security Risk Assesment Model Based on AHP and Fuzzy Comprehensive Evaluation.Journal of Chongqing University of Technology(Natural Science),2017,31(7):162-167.(in Chinese)吴文刚,张志文,王庆生.基于模糊综合评判和AHP信息安全风险评估模型.重庆理工大学学报(自然科学),2017,31(7):162-167.
[1] XIE Zhi-jie, ZHANG Min, LI Zhen-han, WANG Hong-jun. Analysis of Large-scale Real User Password Data Based on Cracking Algorithms [J]. Computer Science, 2020, 47(11): 48-54.
[2] CHEN Gui-ping,WANG Zi-niu. Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis [J]. Computer Science, 2018, 45(7): 150-153.
[3] XIE Ming,WU Chan-le. Topic Extracting with User Information Protection on Web [J]. Computer Science, 2011, 38(3): 203-205.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .