InsubriaSPACE - Thesis PhD Repository >
Insubria Thesis Repository >
01 - Tesi di dottorato >
Utilizza questo identificativo per citare o creare un link a questo documento:
|Autori: ||Tran, Ngoc Hong|
|Tutor interno: ||FERRARI, ELENA|
|Titolo: ||Secure execution of collaborative processes|
|Abstract: ||So far the number of users on the social network sites has been increasing year-on-year. In the meanwhile, the price of mobile devices drops vertically. Both events push up vigorously the quantity of social users who use mobile devices. This results in a need for collaboration among mobile social users to attain the common goals. The fact that the huge number of users goes online lifts forcefully up the number of services over the Internet. The user requirements for services then get more complex. As a consequence, responding such a complex service request needs a composition of several single services.
However, the collaboration among several participants can make the personal data disclosed to the other sides during the collaborative process. Despite the fact that all participants comply with the common protocol and agree on contributing their personal data, they do not trust adequately in each other. This leads to the requirement of preserving user privacy and securing the user data against the other sides.
In this dissertation, we investigate different collaboration and participant types. More specifically, they are centralized and decentralized models among users/services. We also concern the communication environment, e.g., mobile network, Internet, or mobile ad-hoc network. The protocols that are enforced in a mobile network environment have more rigorous constraints due to limited physical and performance resources. For preserving user privacy and data security, we study and select different rational and effective cryptography algorithms then apply them into the collaborative protocols. For more understanding, we propose several collaboration scenarios and present them in detail in the upcoming chapters. Each scenario describes a combination of different collaborative type, participant type and network environment. For each scenario, we address issues on privacy preserving and data security and propose selective solutions. In addition, we propose methods for improving network performance. The experimental results show that our proposals are efficient and effective.|
|Parole chiave: ||Secure multiple party collaboration, trust preference, homomorphic encryption, mobile ad-hoc network, mobile person-to-person payment, secure web service composition|
|MIUR : ||INF/01 INFORMATICA|
|Corso di dottorato: ||Informatica|
|Ciclo di dottorato: ||28|
|Università di conseguimento titolo: ||Università degli Studi dell'Insubria|
|Citazione: ||Tran, N.H.Secure execution of collaborative processes (Doctoral Thesis, Università degli Studi dell'Insubria, 2016).|
|Phd_Thesis_Tranngochong_completa.pdf||testo completo tesi||4,03 MB||Adobe PDF||Visualizza/apri
Tutti i documenti archiviati in InsubriaSPACE sono protetti da copyright. Tutti i diritti riservati.