Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

A Network Registration Model with Hidden Real Name

Authors
Chen Kan, Xiong Yueshan, Zhu Peidong
Corresponding Author
Chen Kan
Available Online November 2013.
DOI
10.2991/ccis-13.2013.84How to use a DOI?
Keywords
real name; network registration; model; relationship
Abstract

The openness and anonymity of Internet allow people joining in without identity validation, resulting in a trustless environment and bringing about many security problems, such as privacy exposure, rumor spreading, deception and social panic making. The root of these problems is that users use pseudonyms instead of their real identities, thus they take no responsibility to their misbehaviors. To solve the problems and build a more credible environment, real name policy is promoted in some countries. Although the real name policy can provide strong assurance to users’ real identities, but as a compelled governmental law, it suffers difficulty in promotion and even worse, may lead to the disaster of large-scale leaking of real name information. In this paper, we provide a novel real name validation model. The key of our model is that users are validated by their friends and their real name information is kept by their friends. In the way, the server is free to the burden of storing privacy information and the real name is hidden to the server and other users. We test our model with real data and get inspiring results.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
Series
Advances in Intelligent Systems Research
Publication Date
November 2013
ISBN
10.2991/ccis-13.2013.84
ISSN
1951-6851
DOI
10.2991/ccis-13.2013.84How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Chen Kan
AU  - Xiong Yueshan
AU  - Zhu Peidong
PY  - 2013/11
DA  - 2013/11
TI  - A Network Registration Model with Hidden Real Name
BT  - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
PB  - Atlantis Press
SP  - 366
EP  - 369
SN  - 1951-6851
UR  - https://doi.org/10.2991/ccis-13.2013.84
DO  - 10.2991/ccis-13.2013.84
ID  - Kan2013/11
ER  -