Hierarchical identity-based cryptography is an efficient technology to address the security issues in cloud storage. However, the inherent key escrow problem primarily hinders the widespread adoption of this cryptosys...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Hierarchical identity-based cryptography is an efficient technology to address the security issues in cloud storage. However, the inherent key escrow problem primarily hinders the widespread adoption of this cryptosystem in practice. To address the key escrow problem, this paper proposes an escrow-free hierarchical identity-based signature model, in which a user signs messages with a user-selected secret and PKG signing factor apart from the private key. For proving the full security, we formulate three security games with respect to our signature model. We instantiate the escrow-free model into a specific scheme based on the SHER-IBS scheme and prove that our scheme is secure against adaptive chosen ID and message attacks.
Cloud storage has become one of the integral parts of online life. However, the cloud storage brings in new kinds of data security issues as well. Authentication framework for both users and services provides an effic...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Cloud storage has become one of the integral parts of online life. However, the cloud storage brings in new kinds of data security issues as well. Authentication framework for both users and services provides an efficient solution to the security and privacy problems of the cloud storage. In this paper we propose a Hierarchical Identity-Based Signature (HIBS) scheme using composite order bilinear groups. We present the methodology of dual system signature to prove that our scheme is secure against existential forgery on adaptively chosen message and identity attack under standard model. Our HIBS scheme shares the same system parameters withthe hierarchical identity-based encryption (LW-HIBE) scheme by Lewko and Waters, and it is as efficient as the LW-HIBE. Combining our signature scheme withthe LW-HIBE scheme yields a complete solution of an identity-based public key system, which can be utilized to build an authentication framework for cloud storage.
Scheduling precedence constrained stochastic tasks on heterogenous cluster systems is an important issue which impact the performance of clusters significantly. Different with deterministic tasks, stochastic task mode...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Scheduling precedence constrained stochastic tasks on heterogenous cluster systems is an important issue which impact the performance of clusters significantly. Different with deterministic tasks, stochastic task model assumes that the workload of task and quantity of data transmission between tasks are stochastic variables, which is more realistic than other task models. Scheduling model and algorithms of precedence constrained stochastic tasks attract a large number of researchers' attention recently. An algorithm SDLS (Stochastic Dynamic Level Scheduling) has been proved performing well in scheduling stochastic tasks on heterogenous clusters. However, the assumption about communication time between tasks in SDLS is much simpler than its assumptions about task computing time, which makes it cannot depict the communication cost among heterogenous links well. In this paper, it is assumed that the quantity of data communication between tasks is a stochastic variable of normal distribution, instead of assuming communication time among heterogenous links a same stochastic variable immediately. Moreover, a modified scheduling model and algorithm SDLS-HC (Stochastic Dynamic Level Scheduling on Heterogenous Communication links) are proposed. Work in this paper focus on considering much more detailed communication cost in task scheduling based on SDLS. Evaluation on many random generated tasks experiments demonstrates that SDLS-HC achieves better performance than SDLS on cluster systems with heterogenous links.
In order to address the problem of energy- and time-efficient execution of spatial queries in directional sensor networks, an efficient hybrid spatial query processing algorithm called SQPDSN is proposed in this paper...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
In order to address the problem of energy- and time-efficient execution of spatial queries in directional sensor networks, an efficient hybrid spatial query processing algorithm called SQPDSN is proposed in this paper. In the majority of studies on query processing using wireless sensor networks, sensors are assumed to have an isotropic sensing and transmission model. However, in certain applications the sensors have directional sensing and directional transmission model. SQPDSN only requires each node within the query region send data message once which reduces the data messages. For achieving minimal energy consumption and minimal response time, our query processing model ensures that only the relevant nodes for the correct execution of a query are involved in the query execution. Each sector has a node which collects the sensory data in it, aggregates the data to derive partial query result and send it to the next sector. Compared with other techniques, the experimental results demonstrated an improvement of the proposed technique in terms of energy efficient query cover with lower communication cost.
Hierarchical Identity-Based Encryption (HIBE) provides an efficient solution to the security problems existed in cloud storage. However, the key escrow problem, which is an inherent problem in HIBE, primarily hinders ...
详细信息
ISBN:
(纸本)9783319271613;9783319271606
Hierarchical Identity-Based Encryption (HIBE) provides an efficient solution to the security problems existed in cloud storage. However, the key escrow problem, which is an inherent problem in HIBE, primarily hinders the widespread adoption of the cryptographic scheme in practice. To address the key escrow problem, this paper introduces a provably-secure escrow-free model, which employs multiple Key Privacy Authorities (KPAs) to restrict the power of Public Key Generators (PKGs) in HIBE scheme. We instantiate the model into an escrow-free HIBE scheme that is referred to as the EF-LW-HIBE scheme, based on the HIBE scheme introduced by Lewko and Waters. Utilizing the Dual System Encryption methodology, we prove that our EF-LW-HIBE scheme is IND-ID-CCA secure.
Small, medium and large companies all face three well- identified problems, precisely: (i) the data deluge, (ii) the large number of interacted exploratory queries and (iii) the economic crisis. Hence, it becomes a re...
详细信息
the proceedings contain 83 papers. the special focus in this conference is on Trust, Security and Privacy for Big Data. the topics include: Nth-Order Multifunction Filter Employing Current Differencing Transconductanc...
ISBN:
(纸本)9783319271606
the proceedings contain 83 papers. the special focus in this conference is on Trust, Security and Privacy for Big Data. the topics include: Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers;An Efficient Spatial Query processing Algorithm in Multi-sink Directional Sensor Network;An Improved Method for Reversible Data Hiding in Encrypted Image;Study on Personalized Location Privacy Preservation algorithms Based on Road Networks;A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups;Towards Returning Data Control to Cloud Users;A Distributed Algorithm for Graph Edge Partitioning;Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture;An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm;An Efficient Pre-filter to Accelerate Regular Expression Matching;A Hybrid Optimization Approach for Anonymizing Transactional Data;Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption;Predicting Severity of Software Vulnerability Based on Grey System theory;Characterization of Android Applications with Root Exploit by Using Static Feature Analysis;A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity;Context-Aware QoS Assurance for Smart Grid Big Data processing with Elastic Cloud Resource Reconfiguration;Continuous User Identity Verification for Trusted Operators in Control Rooms;Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model;Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines and Towards Mechanised Semantics of HPC.
暂无评论