Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Electrical and Electronic Engineering | en_US |
dc.contributor.advisor | Hu, Haibo (EEE) | en_US |
dc.contributor.advisor | Ye, Qingqing (EEE) | en_US |
dc.creator | Fu, Yue | - |
dc.identifier.uri | https://theses.lib.polyu.edu.hk/handle/200/13384 | - |
dc.language | English | en_US |
dc.publisher | Hong Kong Polytechnic University | en_US |
dc.rights | All rights reserved | en_US |
dc.title | Distributed security enhancement from a data management perspective : theoretical foundations and practical applications | en_US |
dcterms.abstract | This thesis explores the critical need for enhanced security measures in distributed systems, addressing vulnerabilities exposed by sophisticated cyber-attacks such as DDoS. It delves into advanced cryptographic techniques and data management strategies designed to secure data outsourcing, enable searchable encryption, and protect data integrity against online manipulations. Motivated by imperative security goals in the current landscape of distributed systems, this thesis develops three innovative privacy-preserving schemes designed to enhance security measures and ensure robust data protection. The first scheme addresses vulnerabilities in password authentication systems, employing a novel cryptographic approach that minimizes computational overhead and enhances resistance against brute-force attacks. This methodology secures password transactions and efficiently manages large volumes of authentication requests. The second scheme focuses on secure indexing, particularly for bi-attribute datasets common in advanced data analytics and AI applications. It introduces an optimized searchable encryption technique that allows for secure and efficient querying of encrypted databases without compromising data privacy. This scheme leverages modified probabilistic data structures to enhance performance and reduce potential privacy leaks through advanced inference attacks. The third scheme tackles the challenge of maintaining data integrity in the face of sophisticated online manipulation attacks. It integrates a game-theoretical model that dynamically adapts to evolving threats, effectively countering malicious attempts to alter data. This model uses a combination of real-time threat analysis and strategic response mechanisms to ensure that data remains accurate and reliable, thus preserving the integrity essential for critical decision-making processes. | en_US |
dcterms.extent | xiv, 119 pages : color illustrations | en_US |
dcterms.isPartOf | PolyU Electronic Theses | en_US |
dcterms.issued | 2024 | en_US |
dcterms.educationalLevel | Ph.D. | en_US |
dcterms.educationalLevel | All Doctorate | en_US |
dcterms.LCSH | Computer security | en_US |
dcterms.LCSH | Electronic data processing -- Distributed processing | en_US |
dcterms.LCSH | Data protection | en_US |
dcterms.LCSH | Internet -- Security measures | en_US |
dcterms.LCSH | Hong Kong Polytechnic University -- Dissertations | en_US |
dcterms.accessRights | open access | en_US |
Copyright Undertaking
As a bona fide Library user, I declare that:
- I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
- I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
- I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.
Please use this identifier to cite or link to this item:
https://theses.lib.polyu.edu.hk/handle/200/13384