计算机科学 ›› 2019, Vol. 46 ›› Issue (3): 217-220.doi: 10.11896/j.issn.1002-137X.2019.03.032

• 信息安全 • 上一篇    下一篇

基于移动切换认证的分层异构网络中的用户敏感信息隐藏方法

张建安   

  1. (解放军信息工程大学三院昆明大队 昆明 650231)
  • 收稿日期:2018-04-09 修回日期:2018-08-22 出版日期:2019-03-15 发布日期:2019-03-22
  • 通讯作者: 张建安(1972-),男,硕士,教授,主要研究方向为信息安全,E-mail:zhangjianan788@163.com
  • 基金资助:
    国家自然科学基金(60873139)资助

Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication

ZHANG Jian-an   

  1. (Kunming Branch,No.3 College,PLA Information Engineering University,Kunming 650231,China)
  • Received:2018-04-09 Revised:2018-08-22 Online:2019-03-15 Published:2019-03-22

摘要: 为了保证用户敏感信息的安全性,需要对用户敏感信息进行隐蔽传输。采用已有方法对分层异构网络中的用户敏感信息进行隐藏时,所得信息的完整性和安全性较低。鉴于此,提出一种基于移动切换认证的分层异构网络中的用户敏感信息隐藏方法。该方法采用嵌入单元置乱算法对用户的敏感信息进行置乱,打乱用户敏感信息在分层异构网络中的正常排序序列;根据字符亮度编码机制并结合HSI模型,在打乱的用户敏感信息排序序列内得到最优的用户敏感信息嵌入位置;采用载体操纵法对分层异构网络中用户敏感信息的嵌入单元集合进行分析,根据分析结果将用户的敏感信息嵌入到最优嵌入位置中,完成分层异构网络中用户敏感信息的隐藏。实验结果表明,所提方法得到的信息的完整性和安全性均较高。

关键词: 分层异构网络, 敏感信息隐藏, 移动切换认证, 用户信息

Abstract: In order to ensure the security of users’ sensitive information,it’s essential to transmit the users’ sensitive information in a covert manner.When the current method is used to hide the users’ sensitive information in the hierarchical heterogeneous network,the obtained information has low integrity and low information security.This paper proposed a users’ sensitive information hiding method in hierarchical heterogeneous networks based on mobile swit-ching authentication.It uses the embedded unit scrambling algorithm to scramble the sensitive information of users and disrupts the normal ordering of users’ sensitive information in hierarchical heterogeneous networks.Then,combined with the HSI model,the optimal users’ sensitive information embedding position is obtained within the scrambled users’ sensitive information sorting sequence according to the character brightness encoding mechanism.And the vector-based manipulation method is used to set the embedding unit of users’ sensitive information in the hierarchical heterogeneous network.According to the analysis results,users’ sensitive information is embedded in the optimal embedding position,and the users’ sensitive information hiding in the hierarchical heterogeneous network is completed.The experimental results show that the information obtained by the proposed method has high integrity and security.

Key words: Layered heterogeneous network, Mobile switching authentication, Sensitive information hiding, User information

中图分类号: 

  • TP309
[1]WU M T,ZHAN J,LIN C W.Ant Colony System Sanitization Approach to Hiding Sensitive Itemsets[J].IEEE Access,2017,PP(99):1
[2]XIANG L,PENG J X,ZHANG L.Network Clustering Algo-
rithm Based on Energy Time Competition Mechanism in Hete-rogeneous Network Environment[J].Bulletin of Science and Technology,2017,33(8):185-188.(in Chinese)
向岚,彭进香,张莉.异构网络环境中基于能量时间竞争机制的网络分簇算法研究[J].科技通报,2017,33(8):185-188.
[3]LUO C,FYLAKIS A,PARTALA J,et al.A data hiding approach for sensitive smartphone data[C]∥ACM International Joint Conference on Pervasive and Ubiquitous Computing.ACM,2016:557-568.
[4]ZHANG X,ZHANG Y,JIN C F,et al.A Dynamic Almost Blank Subframes Allocation for Interference Coordination in Heterogeneous Networks[J].Computer Measurement & Control,2016,24(7):215-218.(in Chinese)
张新,张艳,金春凤,等.异构网络动态配置空白子帧干扰协调算法[J].计算机测量与控制,2016,24(7):215-218.
[5]SHARMA S,TOSHNIWAL D.Scalable two-phase co-occurring sensitive pattern hiding using MapReduce[J].Journal of Big Data,2017,4(1):4-14.
[6]LI S B,WANG L R,LIU P,et al.A HEVC Information Hiding Approach Based on Motion Vection Space Encoding[J].Chinese Journal of Computers,2016,39(7):1450-1463.(in Chinese)
李松斌,王凌睿,刘鹏,等.一种基于运动矢量空间编码的HEVC信息隐藏方法[J].计算机学报,2016,39(7):1450-1463.
[7]LIN C W,LIU Q,FOURNIER-VIGER P,et al.A sanitization
approach for hiding sensitive itemsets based on particle swarm optimization[J].Engineering Applications of Artificial Intelligence,2016,53(C):1-18.
[8]GAO B,ZHAI J T,DAI Y W.Information hiding method based on Have messages in BitTorrent protocol[J].Journal of Computer Applications,2017,37(1):200-205.(in Chinese)
高斌,翟江涛,戴跃伟.基于BitTorrent协议Have消息的信息隐藏方法[J].计算机应用,2017,37(1):200-205.
[9]KHEDEKAR L S.Security:An effective technique to protecting
sensitive information using quick response code[C]∥International Conference on Communication and Signal Processing.IEEE,2016:1185-1188.
[10]PENG Y B,XIE X T.The adaptive Web information extraction based on single DOM tree characteristics and classification[J].Electronic Design Engineering,2017,25(19):56-59.(in Chinese)
彭艳兵,谢馨庭.基于单DOM树特征预分类的自适应Web信息抽取方法[J].电子设计工程,2017,25(19):56-59.
[11]YANG M J,SHAO D,LIU K Y.Vertical handoff for heterogeneous wireless network based on mobile terminal priority[J].Journal of Dalian Polytechnic University,2018,20(1):73-78.(in Chinese)
杨明极,邵丹,刘恺怿.移动终端在异构无线网络中的接入方法[J].大连工业大学学报,2018,20(1):73-78.
[12]FEI H H.Research on Optimal Detection Method of User Infor-
mation Resources In Network[J].Computer Simulation,2017(12):318-320.(in Chinese)
费宏慧.导构网络中用户信息资源优化检测方法研究[J].计算机仿真,2017(12):318-320.
[13]Innowireless Co.L.Method of switching connection to femtocell and wifi ap in sdn[J].New Patents & Technology,2016,21(3):12.
[14]MA B,DENG H,XIE X Z.Two-sided Matching Model Based
Vertical Handover Algorithm in Heterogeneous Wireless Networks[J].Journal of Electronics & Information Technology,2018,40(2):421-429.(in Chinese)
马彬,邓红,谢显中.基于双向匹配模型的异构网络垂直切换算法[J].电子与信息学报,2018,40(2):421-429.
[15]LI X W,WANG X J,TIAN F X,et al.Analysis and Implementation of Handover Process of Dual Connectivity Technology based on Heterogeneous Networks[J].Study on Optical Communications,2017,43(2):68-70.(in Chinese)
李小文,王晓娟,田凤仙,等.基于异构网双连接技术切换流程的分析与实现[J].光通信研究,2017,43(2):68-70.
[16]WU W G,ZHANG Z W,WANG Q S.A Information Security Risk Assesment Model Based on AHP and Fuzzy Comprehensive Evaluation.Journal of Chongqing University of Technology(Natural Science),2017,31(7):162-167.(in Chinese)
吴文刚,张志文,王庆生.基于模糊综合评判和AHP信息安全风险评估模型.重庆理工大学学报(自然科学),2017,31(7):162-167.
[1] 常庚, 赵岚, 陈文.
MLSTM:一种基于多序列长度LSTM的口令猜测方法
MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM
计算机科学, 2022, 49(4): 354-361. https://doi.org/10.11896/jsjkx.210300008
[2] 谢志杰, 张旻, 李振汉, 王红军.
基于攻击算法的海量真实用户口令数据分析
Analysis of Large-scale Real User Password Data Based on Cracking Algorithms
计算机科学, 2020, 47(11): 48-54. https://doi.org/10.11896/jsjkx.200900077
[3] 陈贵平,王子牛.
基于大数据分析的用户信息多重加密存储技术
Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis
计算机科学, 2018, 45(7): 150-153. https://doi.org/10.11896/j.issn.1002-137X.2018.07.025
[4] 刘桂阳,郭欣桐,席桂清,刘金明.
昆虫标本图像的多角度采集与三维观察
Multi Angle Acquisition and 3D Observation of Insect Specimen Image
计算机科学, 2016, 43(Z6): 239-241. https://doi.org/10.11896/j.issn.1002-137X.2016.6A.058
[5] 谢铭,吴产乐.
用户信息保护下的学习资源知识点自动提取
Topic Extracting with User Information Protection on Web
计算机科学, 2011, 38(3): 203-205.
[6] 蔡登 卢增祥 李衍达.
信息协同过滤

计算机科学, 2002, 29(6): 1-4.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!