首页> 外文学位 >Securing human information interaction and privacy via new protocols and architectures
【24h】

Securing human information interaction and privacy via new protocols and architectures

机译:通过新的协议和体系结构保护人的信息交互和隐私

获取原文
获取原文并翻译 | 示例

摘要

The ubiquity of the Internet and lower cost of computers and mobile devices have resulted in a hyper-connected computing paradigm. This emerging environment has led to the movement of everything going online and attracted many inexperienced users. However, the current computing infrastructure is not user-friendly and lacks easy-to-use and transparent security architecture. As a result, establishing security is in some part left to the consumers. This practice results in users quickly becoming overwhelmed and unable to protect themselves, especially those who are not well versed in technology.;In current practices, users are seeking third-party services to aggregate their finances. However, due to lack of a better secure method, they are sharing their accounts' login credentials. This practice along with users' habit of reusing passwords across accounts, leads to increased vulnerability. Also, when users continue to use plaintext email messages over insecure networks and servers, they put themselves in jeopardy. As a result, personal and confidential information that is stored unencrypted on hard disks or sent over insecure networks is vulnerable to attackers. The recurring cyber-attacks (e.g., ransomware, server breaches, and distributed denial-of-service (DDoS) attacks) are indications of flaws, usability, and vulnerability of the current computing infrastructure. Therefore, we need to design underlying technologies that protect users with minimum or no effort on their part.;In this dissertation, we present new and original security models using novel protocols and architectures to secure online accounts and email messages. The first model provides a new authentication mechanism as an alternative login architecture and new access control sandbox technique to provide granular access control. These new methods are more secure than using username and password combination along with accounts that get full-access upon login. The second model protects email messages and provides non-repudiation. It consists of a new architecture with fully integrated infrastructure and an enhanced public key distribution system. This model eliminates inflexible and difficult to use email security that exists in current practices. The simplified design is easy to use to protect all users, especially average users who are incapable of protecting themselves while using insecure networks and servers.
机译:Internet的普遍存在以及计算机和移动设备成本的降低导致了超连接计算范例。这种新兴的环境导致一切都在线上移动,并吸引了许多经验不足的用户。但是,当前的计算基础结构不是用户友好的,并且缺乏易于使用和透明的安全体系结构。结果,建立安全性在某种程度上留给消费者。这种做法导致用户迅速变得不知所措,无法保护自己,尤其是那些不熟悉技术的用户。在当前实践中,用户正在寻求第三方服务以汇总其财务状况。但是,由于缺乏更好的安全方法,他们正在共享其帐户的登录凭据。这种做法以及用户习惯在各个帐户之间重用密码的习惯,导致漏洞增加。同样,当用户继续在不安全的网络和服务器上使用纯文本电子邮件时,他们会陷入危险之中。结果,未加密存储在硬盘上或通过不安全网络发送的个人和机密信息容易受到攻击者的攻击。反复出现的网络攻击(例如勒索软件,服务器漏洞和分布式拒绝服务(DDoS)攻击)表明当前计算基础架构存在缺陷,可用性和脆弱性。因此,我们需要设计基本的技术来保护用户的工作,而他们却需要付出最小的努力或没有任何努力。第一个模型提供了一种新的身份验证机制作为替代的登录体系结构,并提供了新的访问控制沙箱技术来提供精细的访问控制。这些新方法比使用用户名和密码组合以及登录时具有完全访问权限的帐户更加安全。第二种模型可以保护电子邮件并提供不可否认性。它由具有完全集成的基础架构的新体系结构和增强的公共密钥分发系统组成。该模型消除了当前实践中存在的僵化且难以使用的电子邮件安全性。简化的设计易于使用,以保护所有用户,尤其是在使用不安全的网络和服务器时无法保护自己的普通用户。

著录项

  • 作者

    Nourai, Mehrdad Michael.;

  • 作者单位

    University of Massachusetts Lowell.;

  • 授予单位 University of Massachusetts Lowell.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 91 p.
  • 总页数 91
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号