TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publications
  4. Sicherheit und Datenschutz in nicht-interaktiven Crowdsourcing Szenarien
 
Options

Sicherheit und Datenschutz in nicht-interaktiven Crowdsourcing Szenarien

Citation Link: https://doi.org/10.15480/882.1246
Publikationstyp
Doctoral Thesis
Date Issued
2015-07
Sprache
German
Author(s)
Jeske, Tobias  
Advisor
Gollmann, Dieter  
Referee
Federrath, Hannes  
Title Granting Institution
Technische Universität Hamburg
Place of Title Granting Institution
Hamburg
Examination Date
2015-06-03
Institut
Sicherheit in verteilten Anwendungen E-15  
TORE-DOI
10.15480/882.1246
TORE-URI
http://tubdok.tub.tuhh.de/handle/11420/1249
In non-interactive crowdsourcing scenarios devices send data to a provider in real-time without user interaction, which leads to security and privacy demands. This thesis completely defines and illustrates these requirements for the first time using two scenarios. Among other things, it can be shown that user tracking is possible in modern navigation systems and that real-time traffic data can be manipulated unnoticed. In order to avoid such attacks two protocols are presented on the basis of zero-knowledge protocols and their practicality is proven on different devices. The implementation of zero-knowledge protocols is time-consuming. For this reason, a domain-specific input language is introduced in order to simplify the description of zero-knowledge protocols. A compiler translates the input language into an arbitrary target language. The intermediate code of the compiler is described by special macros, which make the integration of existing C++ code easier than in other compiler concepts. Due to the special presentation of the intermediate code, an automatic optimization of compute-intensive long-number operations is possible. Compared to a CPU implementation, graphics cards and the introduction of new algorithms increase the throughput of modular exponentiations by a factor of ten.
Subjects
Sicherheit
Datenschutz
Crowdsourcing
Zero-Knowledge
Smart Grid
Floating Car Data
GPU
DDC Class
004: Informatik
Lizenz
http://rightsstatements.org/vocab/InC/1.0/
Loading...
Thumbnail Image
Name

Dissertation_Tobias_Jeske.pdf

Size

4.01 MB

Format

Adobe PDF

TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback