Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/110873
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Electrical and Electronic Engineering | - |
| dc.creator | Fu, Yue | - |
| dc.identifier.uri | https://theses.lib.polyu.edu.hk/handle/200/13384 | - |
| dc.language.iso | English | - |
| dc.title | Distributed security enhancement from a data management perspective : theoretical foundations and practical applications | - |
| dc.type | Thesis | - |
| dcterms.abstract | This thesis explores the critical need for enhanced security measures in distributed systems, addressing vulnerabilities exposed by sophisticated cyber-attacks such as DDoS. It delves into advanced cryptographic techniques and data management strategies designed to secure data outsourcing, enable searchable encryption, and protect data integrity against online manipulations. Motivated by imperative security goals in the current landscape of distributed systems, this thesis develops three innovative privacy-preserving schemes designed to enhance security measures and ensure robust data protection. The first scheme addresses vulnerabilities in password authentication systems, employing a novel cryptographic approach that minimizes computational overhead and enhances resistance against brute-force attacks. This methodology secures password transactions and efficiently manages large volumes of authentication requests. The second scheme focuses on secure indexing, particularly for bi-attribute datasets common in advanced data analytics and AI applications. It introduces an optimized searchable encryption technique that allows for secure and efficient querying of encrypted databases without compromising data privacy. This scheme leverages modified probabilistic data structures to enhance performance and reduce potential privacy leaks through advanced inference attacks. The third scheme tackles the challenge of maintaining data integrity in the face of sophisticated online manipulation attacks. It integrates a game-theoretical model that dynamically adapts to evolving threats, effectively countering malicious attempts to alter data. This model uses a combination of real-time threat analysis and strategic response mechanisms to ensure that data remains accurate and reliable, thus preserving the integrity essential for critical decision-making processes. | - |
| dcterms.accessRights | open access | - |
| dcterms.educationLevel | Ph.D. | - |
| dcterms.extent | xiv, 119 pages : color illustrations | - |
| dcterms.issued | 2024 | - |
| dcterms.LCSH | Computer security | - |
| dcterms.LCSH | Electronic data processing -- Distributed processing | - |
| dcterms.LCSH | Data protection | - |
| dcterms.LCSH | Internet -- Security measures | - |
| dcterms.LCSH | Hong Kong Polytechnic University -- Dissertations | - |
| Appears in Collections: | Thesis | |
Access
View full-text via https://theses.lib.polyu.edu.hk/handle/200/13384
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


