The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer network ( MP2...
详细信息
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer network ( MP2PN ). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key rmnagement protocol to authenticate a peer's at- tributes and identity. A peer can be described by a set of attributes or one unique special identity at- tribute. Peers that have some attributes in common can form a group and conmmnicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that rmtches the access structure can join the group and provide its input to form the group key. The proposed protocol pro- vides backward and forward secrecy. The sinmlation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication.
In this paper, a genetic clustering algorithm is described that uses a new similarity measure based message passing between data points and the candidate centers described by the chromosome. In the new algorithm, a va...
详细信息
A simple and high-degree accuracy sensor for solution concentration and temperature based on fused tapering optical fiber coupler is fabricated. The change of refractive index in the evanescent field on the fused regi...
详细信息
The issue designs a high-definition digital processing platform, present algorithms of image sensor decoding and image enhancement pre-processing and its implementation. Firstly, the framework of the high-definition d...
详细信息
P2P storage architecture plays an important role in distributed storage systems. For P2P dynamic environment, the sufficient redundant data must be maintained to ensure the data availability. System will pay various c...
详细信息
P2P storage architecture plays an important role in distributed storage systems. For P2P dynamic environment, the sufficient redundant data must be maintained to ensure the data availability. System will pay various costs to maintain redundant data. In this paper, the costs of the bandwidth that are respectively caused by the methods of replication and erasure coding are qualitatively analyzed based on Markov chain model. Combined the advantage of replication and erasure coding, a new hybrid redundancy strategy is proposed. Just as replication, the downloaded files automatically are viewed as shared files for next downloading. Like erasure coding, when the availability of one file needs to be repaired, anyone of peers which store the fully copy of this file is assigned to generate and distribute new fragments. The analysis result shows that the hybrid redundancy strategy can maintain the appropriate level of redundancy and save more bandwidth than the traditional redundancy strategy in a variety of network environment.
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle Wireless Sensor networks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an...
详细信息
A new scheme of information encryption is presented in this paper, which employs Chen's chaos to construct the random mask of the virtual optical imaging system instead of randomly generated by computer. The gener...
详细信息
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. Ho...
详细信息
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system(TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture(DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System(TS) and the Security System(SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel(TIC) to protect the information flow between TS and SS. In a word, the doublesystem architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. H...
详细信息
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
According to the demerits of the traditional cloud storage that there exists superuser, encryption and decryption would take up many client’s sources, and the retrieval spends much time and is complex, the paper prop...
详细信息
According to the demerits of the traditional cloud storage that there exists superuser, encryption and decryption would take up many client’s sources, and the retrieval spends much time and is complex, the paper proposed a security structure of cloud storage based on homomorphic encryption scheme. The structure will reduce the use of client’s sources, and is convenient for moving to mobile devices;the homomorphic encryption scheme makes retrieval more efficient;users’ data would be more secure because they could not be achieved by superusers in the side of sever;users can operate cloud virtual disk as convenient as local disk. These merits of the structure not only could ensure the data storage’s security, but also promote highly the popularization of cloud storage.
暂无评论