Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either withthe third party cloud service provider...
详细信息
the proceedings contain 12 papers. the topics discussed include: a security protocol for information-centric networking in smart grids;DLMS/COSEM security level enhancement to construct secure advanced metering infras...
ISBN:
(纸本)9781450324922
the proceedings contain 12 papers. the topics discussed include: a security protocol for information-centric networking in smart grids;DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure;securing ZigBee smart energy profile I .x with OpenECC library;detecting intrusions in encrypted control traffic;semantic security analysis of SCADA networks to detect malicious control commands in power grids;a distributed monitoring architecture for AMI5: minimizing the number of monitoring nodes and enabling collided packet recovery;protection of consumer data in the smart grid compliant withthe German smart metering guideline;customer-centric energy usage data management and sharing in smart grid systems;implementation of privacy-friendly aggregation for the smart grid;smart meter aggregation via secret-sharing;a formal model for sustainable vehicle-to-grid management;and toward a cyber-physical topology language: applications to NERC CIP audit.
Secure watermark detection techniques are important to protect the secrecy of the watermark pattern. In this paper, we identify an application scenario that requires performing secure watermark detection in the cloud,...
详细信息
ISBN:
(纸本)9781467355919
Secure watermark detection techniques are important to protect the secrecy of the watermark pattern. In this paper, we identify an application scenario that requires performing secure watermark detection in the cloud, and in the meantime, supporting privacy preserving multimedia data storage using the cloud. We then propose a compressive sensing (CS) based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a compressive sensing domain to protect the privacy. the compressive sensing transformation is executed by a MPC protocol under the semi-honest security model to protect the privacy of the compressive sensing matrix and the watermark pattern. We derive the lower bound of the expected watermark detection performance in the compressive sensing domain, given the original image, watermark pattern and only the size of the compressive sensing matrix. the lower bound has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the compressive sensing domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.
Withthe growth of system scale, it has become very difficult problem that how to ensure the security of service in grid. In order to resolve this problem, we propose an auditing mechanism for the security of service ...
详细信息
As the infrastructure of cloud computing, the virtualization security problem has become more severe since the security requirement of different virtual machines (VMs) may conflict withthe others in could computing p...
详细信息
Although software can and does implement access control at the application layer, failure to enforce data access at the data layer often allows uncontrolled data access when individuals bypass application controls. th...
详细信息
ISBN:
(纸本)9781467330763
Although software can and does implement access control at the application layer, failure to enforce data access at the data layer often allows uncontrolled data access when individuals bypass application controls. the goal of this research is to improve security and compliance by ensuring access controls rules explicitly and implicitly defined within unconstrained natural language texts are appropriately enforced within a system's relational database. Access control implemented in boththe application and data layers strongly supports a defense in depth strategy. We propose a tool-based process to 1) parse existing, unaltered natural language documents;2) classify whether or not a statement implies access control and whether or not the statement implies database design;and, as appropriate, 3) extract policy elements;4) extract database design;5) map data objects found in the text to a database schema;and 6) automatically generate the necessary SQL commands to enable the database to enforce access control. Our initial studies of the first three steps indicate that we can effectively identify access control sentences and extract the relevant policy elements.
Cloud computing provides both opportunities to develop more services as well as significant risks for greater exposure to dataprivacy problem when users outsource sensitive data for sharing on cloud servers. Re-encry...
详细信息
File distributing and sharing is one of the most commonly used services in cloud computing and the requirement of datasecurity grows withthe cloud computing spreading. Attribute based encryption is one of the most a...
详细信息
the proceedings contain 241 papers. the topics discussed include: a new adaptive filtering algorithm based on the current statistical model;a strategic decision framework for sustainability in supply;backstepping base...
ISBN:
(纸本)9780769550114
the proceedings contain 241 papers. the topics discussed include: a new adaptive filtering algorithm based on the current statistical model;a strategic decision framework for sustainability in supply;backstepping based nonlinear adaptive control of magnetic levitation system with unknown disturbances;design and realization of web-based e-mail subscription and distribution system;research on system model of temperature measurement of stored-cotton based on ultrasound wave;research of an adaptive particle swarm optimization on engine optimization problem;security risk evaluation of information systems based on game theory;research on the key technique of three-dimensional measurement based on laser ranging;the method and development trend of laser ranging;hyperspectral data unmixing algorithm comparative analysis based on linear spectral mixture model;and application research on high voltage switch cabinet based on fiber Bragg gratings temperature measurement system.
the proceedings contain 241 papers. the topics discussed include: a new adaptive filtering algorithm based on the current statistical model;a strategic decision framework for sustainability in supply;backstepping base...
ISBN:
(纸本)9780769550114
the proceedings contain 241 papers. the topics discussed include: a new adaptive filtering algorithm based on the current statistical model;a strategic decision framework for sustainability in supply;backstepping based nonlinear adaptive control of magnetic levitation system with unknown disturbances;design and realization of web-based e-mail subscription and distribution system;research on system model of temperature measurement of stored-cotton based on ultrasound wave;research of an adaptive particle swarm optimization on engine optimization problem;security risk evaluation of information systems based on game theory;research on the key technique of three-dimensional measurement based on laser ranging;the method and development trend of laser ranging;hyperspectral data unmixing algorithm comparative analysis based on linear spectral mixture model;and application research on high voltage switch cabinet based on fiber Bragg gratings temperature measurement system.
暂无评论