透過您的圖書館登入
IP:3.144.33.41
  • 學位論文

藉由資料匿名化以避免個人隱私洩漏

Privacy Information Protection through Data Anonymization

指導教授 : 田筱榮

摘要


行動軟體的發展推動了智慧型行動裝置的普及化,更進一步的促進行動軟體的數量快速成長。行動裝置平台的個人化及隨身化的特性,加上不斷增加到行動平台的資料紀錄或感知功能連結行動平台的通訊能力,行動軟體很容易成為洩露使用者隱私的管道,如何能在享有行動軟體服務的便利的同時保護使用者隱私資訊,這個問題的重要性與日俱增。目前的做法,有些牽涉行動裝置平台系統架構的更改,或需要高複雜度的處理,並非一般使用者可採用的方式,因此我們提出運用代理伺服器的架構提供可行且實用的行動軟體使用者隱私保護的方法,我們完成保護機制架構的設計並進行了實作,我們所提出的方法能夠提供使用者有效且實用的隱私保護。

並列摘要


Mobile apps is moving power behind the prevalence of intelligent mobile devices, which, in turn, bring in the exponentially growing number of mobile apps being developed. The personalized and ubiquitous characteristics of intelligent mobile devices, with the added variety of record taking and data sensing capabilities become a serious threat to user privacy when linked with the communication ability of the mobile devices. How to allow us to enjoy all the conveniences and services without privacy risk is an important issue to all users of mobile devices. The available privacy protection schemes or methods either require change made at the mobile device system framework and core, or require complicate technology process and skill. In this thesis, we proposed a proxy server based approach to develop a solution practical to ordinary users. A prototype has been implemented to demonstrate the practicality and usability of the privacy protection mechanism.

參考文獻


[3] M. Nauman, S. Khan, X. Zhang, “Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints”, In Proceedings of the ACM Symposium on Information, Computer, and Communications Security, ASIACCS’10, 2010.
[7] W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, A. N. Sheth, “TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones”, In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI’10, 2010.
[1] A. Porter Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A Survey of Mobile Malware in the Wild”, In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphone and Mobile Device, CSS-SPSM’11, 2011.
[2] Dalvik Virtual Machine, https://source.android.com/devices/tech/dalvik/index.html
[4] L. Yang, N. Boushehrinejadmoradi, P. Roy, V. Ganapathy, L. Iftode, “Short Paper: Enhancing Users’ Comprehension of Android Permissions”, In Proceedings of the ACM CCS Workshop on Security and Privacy in Smartphone and Mobile Device, CSS-SPSM’12, 2012.

延伸閱讀