With the proposal of the concept of ubiquitous power Internet of Things and the further promotion of blockchain strategy, modern information technologies such as the Internet of Things and cloud computing have been wi...
详细信息
With the proposal of the concept of ubiquitous power Internet of Things and the further promotion of blockchain strategy, modern information technologies such as the Internet of Things and cloud computing have been widely used in the power system. While the power grid is becoming more intelligent, it is also accompanied by the emergence of various security threats, and the power grid will face greater challenges and pressures. In this paper, aiming at the current situation of information security faced by the power grid blockchain under the cloud Internet of Things, a multi-authorization center ciphertext policy attribute encryption access control method is constructed for the power grid blockchain. It adds the function of visitor attribute update revocation, aggregates multi-dimensional data into ciphertext, and uses CP-ABE encryption to implement fine-grained access control at the dimension level. Through experimental analysis, in terms of security and functionality, this method can resist physical collision attacks and manage access rights flexibly. In terms of encryption and decryption efficiency, the encryption and decryption calculation speed of the proposed method is 6.2-15.6% higher than that of the traditional method, and the time consumption efficiency is more than 5% higher than that of other methods. It proves that this model has more advantages for open network environments such as power grid blockchain with high confidentiality requirements and large scale of users. It is of great significance to study the data security and privacy protection methods of the power grid blockchain.
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the message": its vertices, its edges, and its edge weigh...
详细信息
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the message": its vertices, its edges, and its edge weights are the information to be concealed. The encryption algorithm is based on an unconventional mapping, conjectured to be a trapdoor one-way function, designed for graphs. This function requires the sender and the receiver to use a secret one-time encryption/decryption key. It is claimed that a malicious eavesdropper with no knowledge of the key will be faced with a computational task requiring exponential time in the size of the input graph in order to extract the original plaintext from the ciphertext carried by the encrypted graph. A number of variants to the main algorithm are also proposed.
To overcome the problems of low efficiency and poor security in the process of digital forensics, a digital forensics method based on direct if sampling for 5G communication system is proposed. In this method, the mod...
详细信息
To overcome the problems of low efficiency and poor security in the process of digital forensics, a digital forensics method based on direct if sampling for 5G communication system is proposed. In this method, the modulation parameters of the communication signal are obtained by the feature extraction algorithm of the receiver's in pulse signal, and the ontology model of digital forensics is constructed based on the ontology theory: analyse the disk image and judge the file category according to the pattern feature recognition results of the radiation source signal in 5g communication system;determine the hash value and information entropy, and generate the key index;summarise the digital forensics results and generate the digital forensics report. The simulation results show that the data processing efficiency is over 25/Mbps, and the successful attack rate in the security performance test is 2.89%.
Optical flash payment technology is a form of optical flash payment application. Its payment scenario is mainly to directly realize "card free payment" in the consumption process through mobile devices, Blue...
详细信息
Optical flash payment technology is a form of optical flash payment application. Its payment scenario is mainly to directly realize "card free payment" in the consumption process through mobile devices, Bluetooth and other connection methods on mobile terminal devices such as smart phones under the mobile Internet environment. The "flash payment" is a more convenient payment method and a new payment channel without the function of electronic wallet. Compared with the current mainstream payment methods, it is more collaborative and complementary. Aggregated payment is a fourth party payment platform, which is different from Alipay, WeChat and other third payment platforms. Aggregated payment is a combination of technology and a platform that combines multiple payment methods. Based on the background of massive distributed power generation connected to the grid, this paper studied the key technologies of flash payment in combination with marketing blockchain, and discussed the data sharing mechanism of marketing information in multiple scenarios from the perspective of marketing blockchain by studying the data sharing mechanism in different scenarios. In this paper, a distributed optical flash payment system and a blockchain based encryption algorithm were proposed. Based on this research, the experimental results of key technologies of aggregated optical flash payment based on marketing blockchain were analyzed. The experimental results in this paper showed that 38.7 % of the users contacted the aggregation payment through the online platform. 11.7 % of people communicated through chatting with friends, and 9.8 % of enterprises got in touch through preferential policies. 4.5 % of them publicized through the media, and 8.3 % made requests through payment plans. 21 % of them transferred money through remittance, and 6 % of them got it through other ways. When using aggregate payment, the main reasons for users to choose aggregate payment were the network, friends chatt
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life ...
详细信息
ISBN:
(纸本)9781467362429
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life to store and retrieve data from anywhere around the globe. With the rising cost for the data storage devices and data retrieval process;enterprises have moved to centralized storage for cost efficiency. This proves a greater task to the service providers in terms of security and consistency. As shared systems are prone to be attacked, various counter measures have been proposed by experts to secure the stored data. Here the data is being encrypted by the advanced encryption algorithm which is considered to be the most competent in the present security scenario. A symmetric key is generated to the stored file. To further enhance the trust of the service provider the trust certificate of the company is being sent along with the keys to the client. All the communication process is taken place using the Key Exchange protocol. These techniques are performed to ensure the client that the stored data is being secured, integrated and a total control over the route in which the data is being communicated. In this paper, a new efficient technique is proposed which indicates the effectiveness, flexibility of the storage and retrieval process by a generic framework. This framework fills the gap between the security needs and challenges.
With development of outsourcing computation, it is possible for clients with limited computing resources to outsource heavy computational tasks to the cloud server and thus relieve huge burden of the client. As contin...
详细信息
ISBN:
(纸本)9781509013296
With development of outsourcing computation, it is possible for clients with limited computing resources to outsource heavy computational tasks to the cloud server and thus relieve huge burden of the client. As continuous attention of delegation in recent years, requirements of security and efficiency are badly concerned undoubtedly, especially for matrix multiplication. Considering wide applications of matrix multiplication, e.g. graph processing and large date processing, in this paper, we present an identity-based publicly verifiable delegation scheme in amortized model which meets the need of security and efficiency both. Moreover, by using an secure encryption algorithm and a verification certification, the security analysis of the proposed scheme demonstrates the privacy of matrixes involved and the correctness. To demonstrate efficient properties, we compared our scheme with some existing works in terms of functionality as well as computation, storage and communication overhead.
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be...
详细信息
ISBN:
(纸本)9783981537024
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be applied to a block cipher based on Substitution-Permutation Network. It arranges multiple masked S-boxes in parallel, which are rotated in each round. This rotation requires remasking process for each round to adjust current masks to those of the S-boxes. In this paper, we propose a method for reducing the complexity of RSM further by omitting the remasking process when the linear diffusion layer of the encryption algorithm has a certain algebraic property. Our method can be applied to AES with a reduced complexity from RSM, while keeping the equivalent security level.
The paperlessness of maintenance records is an inevitable trend in the development of civil aviation informationization. This paper proposes a method for the use of reliable electronic signatures for electronic record...
详细信息
ISBN:
(纸本)9781728125992
The paperlessness of maintenance records is an inevitable trend in the development of civil aviation informationization. This paper proposes a method for the use of reliable electronic signatures for electronic records in maintenance paperless, and uses domestic cryptographic algorithms to propose electronic signatures for maintenance records. And for the specific work scenario of maintenance, the special signature idea of structured data and layout archive synchronous double signature is proposed. The electronic maintenance record signature method based on SM2 algorithm proposed in this paper is applied in the construction of an airline's electronic signature system.
The primary requirements of a successful Wireless Sensor Network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash funct...
详细信息
ISBN:
(纸本)9788022728560
The primary requirements of a successful Wireless Sensor Network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash functions and cryptography schemes. By applying these mechanisms, the energy consumption increases, shortening the sensor node lifetime. On the other hand, the selection of a highly secure encryption algorithm might lead to unacceptable computational time, taking into account the constrained processor power of the sensor nodes. This paper presents an overview of the results published in the literature regarding time and energy consumption overhead of hashing and encryption mechanisms in Wireless Sensor Networks. The evaluation of these results helps on the selection of the appropriate algorithms, depending on the application.
This paper introduces a new method to solve B/S structure of network information security, namely uses the session ID as the key to achieve encryption transmission and identity of fake sensitive information in the net...
详细信息
This paper introduces a new method to solve B/S structure of network information security, namely uses the session ID as the key to achieve encryption transmission and identity of fake sensitive information in the network to prevent the B/S structure. The session identifier(hereinafter referred to as Sessionid) is in the user the first request for a particular WEB application documents, by the server through a random series of numbers generated by complex algorithm. Using Sessionid as the key string encryption method, avoids the key distribution management and custody of the trouble, the key is composed of system dynamic random generation, one-time, without user participation, and does not require additional hardware investment. Only need reasonable encryption algorithm in the application will achieve ciphertext transmission between client— server. Is a WEB application is very easy to implement the encryption method. The implementation of this method on how to apply the Sessionid algorithm, the problem of information encryption and prevent counterfeiting identity were described, and also expatiates on how the application uses the encryption method and the problems that should be paid attention to.
暂无评论