Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a good approach enabling the data owner to retain its control over the outsourced data. Searchable encryption is a cryptographic primitive allowing for private keyword based search over the encrypted database. The above setting of enterprise outsourcing database to the cloud requires multi-user searchable encryption, whereas virtually all of the existing schemes consider the single-user setting. To bridge this gap, we are motivated to propose a practical multi-user searchable encryption scheme, which has a number of advantages over the known approaches. The associated model and security requirements are also formulated. We further discuss to extend our scheme in several ways so as to achieve different search capabilities.
A group of decision-makers may differ in their choice of alternatives while making a decision. As a result, how to aggregate opinions of different experts is still an open issue. Due to the uncertainty in the process ...
详细信息
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy...
详细信息
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy nowadays. How to achieve trade-off between anonymity and certification simultaneously? In this paper, we propose a security architecture to ensure anonymity and certification for Internet of Things. We use pseudonym and threshold secret sharing approach to resolve conflict between anonymity and certification. Moreover, the implementation of Bloom filter offers security authentication for remote command. security analysis shows that the proposed mechanism can perfectly achieve tradeoff between anonymity, certification, and also resist impersonation, tamper as well as compromise attacks.
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a...
详细信息
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous abuse. So there is a challenge to harmonize the dilemma between the anonymity and authentication in P2P networks. Few P2P protocol provides complete anonymity as well as traceability. In this paper, we propose a security mechanism to ensure anonymity for honest peers and traceability for misbehaving peers in P2P systems. We utilize superposition watermarking based anonymity trace scheme to resolve the conflicts between traceability and anonymity. This scheme uses information processing technology similar to CDMA to superpose path information. security analysis and simulation result show that the superposition watermarking based P2P anonymity trace scheme (SWP2P) can attain tradeoff between anonymity and traceability perfectly.
To meet the requirements of operation orders auto-generation, a topology information data structure is designedAbove this, several algorithms are proposed, which support to generate operation orders for the tasks of c...
详细信息
To meet the requirements of operation orders auto-generation, a topology information data structure is designedAbove this, several algorithms are proposed, which support to generate operation orders for the tasks of cell maintenance, cell transmission, full circuitry maintenance, range of circuitry maintenance, and switch load algorithmsThese algorithms can use in the distribution networkThe auto-generation only accords the topology information that distilled from the graphicIt is easily use for the maintain personnel.
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wan...
详细信息
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wang et al. 2007 Chin. Phys. 16 1868), the proposed schemes have the advantages of consuming fewer quantum and classical resources, lessening the difficulty and intensity of necessary operations, and having higher efficiency.
A DIDS(Distributed Intrusion Detection System) named as F-DIDS is built to defend against flooding DoS(Denial of Services) attacks in the paper. F-DIDS is composed of F-IDSes which are settled in nodes who need to be ...
详细信息
A DIDS(Distributed Intrusion Detection System) named as F-DIDS is built to defend against flooding DoS(Denial of Services) attacks in the paper. F-DIDS is composed of F-IDSes which are settled in nodes who need to be protected. F-DIDS is a complete DIDS, in which each node with F-IDS can be the detection centre. Due to no central node, single failure can be avoided in F-DIDS. In F-DIDS, Traffic tables help to build up traffic matrixes. By analyzing traffic matrixes, flooding DoS attacks could be detected and three normal flooding DoS attacks are classified. Local and global communication methods are proposed to reduce the overhead brought from fully distributed architecture. The simulation results and performance analysis show that F-DIDS works effectively.
A relative significance factor of an impact category is the external weight of the impact category and plays an important role in life cycle assessment(LCA). Many multiattribute decision-making (MADM) methods such as ...
详细信息
A relative significance factor of an impact category is the external weight of the impact category and plays an important role in life cycle assessment(LCA). Many multiattribute decision-making (MADM) methods such as analytical hierarchy process(AHP), the rank-order centroid method and the fuzzy method are proposed to determine the relative significance factor of an impact category. However, in previous research, it is shown that, the AHP approach is difficult for experts rendering consistent judgment when the number of pairwise comparisons increases, the rank-order method has some insurmountable shortcomings, the key issue to use fuzzy set theory is its complexity. In order to address this problem, a new simple and efficient method is proposed to determine relative significance factor in a more efficient manner. An example to determine relative significance factor of impact categories is shown to illustrate the efficiency of the proposed method.
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo...
详细信息
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical proved to be secure even with a compromised arbitrator. messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator.
Migrating existing Web applications toward SaaS (software-as-a-service) applications can reuse the legacy software assets and cut down the re-development cost and risk. However, it lacked generic migration approaches ...
详细信息
Migrating existing Web applications toward SaaS (software-as-a-service) applications can reuse the legacy software assets and cut down the re-development cost and risk. However, it lacked generic migration approaches and tools. A generic approach was proposed to quickly enable existing Web applications to be multi-tenant based on the data middleware. It introduced the multi-tenancy at a minimum revision of the original application. This approach is transparent and loosely coupled for the application layer.
暂无评论