{"title":"移动环境中的安全数据共享","authors":"T. Matsunaka, T. Warabino, Y. Kishi","doi":"10.1109/MDM.2008.32","DOIUrl":null,"url":null,"abstract":"This paper proposes an approach for secure data sharing on mobile terminals with members of a particular group. To avoid the data being compromised due to loss or theft, this approach prevents data leakage, while allowing the correct members to recover the data to a new mobile terminal thanks to cooperation between a mobile terminal and a network server. The fundamental concept used to achieve data security involves applying data encryption and secret sharing of the encryption key. In addition, this approach newly introduces a key encapsulation mechanism (KEM) and threshold cryptography. The approach also combines the use of a data protection approach, based on a secret sharing scheme, in order to achieve an efficient data reading process. Once one of the members reads the data, he/she need not use threshold cryptography to reconstruct the encrypted key, but instead uses a secret sharing scheme. This paper confirms the potential of this approach via the prototype implementation onto a mobile phone.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Secure Data Sharing in Mobile Environments\",\"authors\":\"T. Matsunaka, T. Warabino, Y. Kishi\",\"doi\":\"10.1109/MDM.2008.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes an approach for secure data sharing on mobile terminals with members of a particular group. To avoid the data being compromised due to loss or theft, this approach prevents data leakage, while allowing the correct members to recover the data to a new mobile terminal thanks to cooperation between a mobile terminal and a network server. The fundamental concept used to achieve data security involves applying data encryption and secret sharing of the encryption key. In addition, this approach newly introduces a key encapsulation mechanism (KEM) and threshold cryptography. The approach also combines the use of a data protection approach, based on a secret sharing scheme, in order to achieve an efficient data reading process. Once one of the members reads the data, he/she need not use threshold cryptography to reconstruct the encrypted key, but instead uses a secret sharing scheme. This paper confirms the potential of this approach via the prototype implementation onto a mobile phone.\",\"PeriodicalId\":365750,\"journal\":{\"name\":\"The Ninth International Conference on Mobile Data Management (mdm 2008)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Ninth International Conference on Mobile Data Management (mdm 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MDM.2008.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Ninth International Conference on Mobile Data Management (mdm 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MDM.2008.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper proposes an approach for secure data sharing on mobile terminals with members of a particular group. To avoid the data being compromised due to loss or theft, this approach prevents data leakage, while allowing the correct members to recover the data to a new mobile terminal thanks to cooperation between a mobile terminal and a network server. The fundamental concept used to achieve data security involves applying data encryption and secret sharing of the encryption key. In addition, this approach newly introduces a key encapsulation mechanism (KEM) and threshold cryptography. The approach also combines the use of a data protection approach, based on a secret sharing scheme, in order to achieve an efficient data reading process. Once one of the members reads the data, he/she need not use threshold cryptography to reconstruct the encrypted key, but instead uses a secret sharing scheme. This paper confirms the potential of this approach via the prototype implementation onto a mobile phone.