In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ...
详细信息
ISBN:
(纸本)9781479932801
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper proposes a custom data partitioning optimization method to achieve an efficient data parallelism, and applies it to the matrix multiplication. The result of the application supports the custom data partitioning optimization method. Then we develop a task parallel application: Image Blender, and this application explains the efficiency and pitfall aspects associated with task parallelism. Finally, the paper analyzes the performance of our applications. Experiments results show that TPL can dramatically alleviate programmer burden and boost the performance of programs with its task-based parallel programming mechanism.
Based on Attribute-Based Encryption (ABE), a variety of access control schemes have been constructed in cloud computing. However, in these schemes, the ciphertext overhead goes linearly with the number of attributes u...
详细信息
Based on Attribute-Based Encryption (ABE), a variety of access control schemes have been constructed in cloud computing. However, in these schemes, the ciphertext overhead goes linearly with the number of attributes used in encryption. To address this concern, a CCP-ABE (Constant-size Ciphertext Policy ABE) based access control scheme is proposed. The original data is encrypted by a symmetric key;then symmetric key is encrypted under an AND-gate access policy. Only the user who possesses a set of attributes that satisfy the policy can recover the symmetric key. The security of the proposed scheme is proved based on security of the CPA (Chosen Plaintext Attack) secure CCP-ABE scheme. Moreover, a method of constructing CCA (Chosen Ciphertext attack) secure CCP-ABE schemes is introduced. Performance analysis indicates that the ciphertext overhead over the number of attributes included in ciphertext is constant-size rather than linearity.
With the continuous development of the space technology, increasing communication between spacecrafts. To ensure the spacecrafts keep a uniform time standard, time synchronization protocol plays an crucial role. Takin...
详细信息
ISBN:
(纸本)9781479978724
With the continuous development of the space technology, increasing communication between spacecrafts. To ensure the spacecrafts keep a uniform time standard, time synchronization protocol plays an crucial role. Taking account the characteristics of deep-space: poor link quality, limited node computing power, and the GNSS service is unstable, through the improving of IEEE1588 protocol, a autonomous time synchronization protocol for the space environment is presented, which security arrangement is relatively sound, does not depend on the GNSS service - security Enhanced IEEE1588 for Space (SEIEEE1588).
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p...
详细信息
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the privacy information and documents in the Internet, in this paper, we propose the idea of combining the three security methods of multilevel security, identity-based encryption (IBE), and distributed hash table (DHT) network. And we further propose an IBE-based secure self-destruction (ISS) scheme to protect the confidentiality and privacy of the Internet content by self-destruction after a predefined time. In our proposed ISS security scheme, the Internet content is first partitioned into many segments with diverse security levels, and each segment is encrypted with a symmetric key to obtain primitive ciphertext. By applying the methods of association and extraction, the primitive ciphertext is turned to associated ciphertext, which is then divided into extracted ciphertext and encapsulated ciphertext. The latter is encapsulated into the Internet content self-destructing object (CDO), which is stored into the storage services provider. Furthermore, to protect the privacy security when the CDO expired, the symmetric key is encrypted using the IBE algorithm based on the identity of the authorized user. The combination of this key's ciphertext and the extracted ciphertext, by means of Lagrange polynomial processing, generates mixture ciphertext shares. Then those shares are distributed into nodes within the DHT network and will be automatically discarded over the deadline when the primitive ciphertext and the symmtric key are unrecoverable. Consequently, the ISS scheme achieves the aim of secure self-destruction. Comprehensive analysis shows that the ISS scheme is able to satisfy all the design demands and is more secure than existing schemes. The ISS scheme can resist against not only the traditional cryptanalysis and brute-force attack, but also the Sybil
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, every hierarchical node is composed of perceptual nodes which provide resources with the same levels of security. More hierarchical nodes can be modeled as a set of partially ordered classes. With this mode, a deterministic key derivation algorithm is designed, which makes every user and perceptual node possesses a single key material to get some keys, and obtains the resources at the presented class and all descendant classes in the hierarchy. Furthermore, a mechanism of Merkle tree is introduced to guarantee secure and efficient multi-user key material derivation by independent of each hash link. Compared with previous proposals, the scheme is more suitable for multi-user to access resources of perceptual layer in IoT.
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit...
详细信息
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authority ciphertext-policy ABE (MA-CP-ABE) scheme on prime order groups was proposed when a dual pairing vector space approach was employed. The proposed scheme supports any monotone access structure, and is proven adaptively secure from the decisional linear assumption in the standard model. Performance analysis indicates that our scheme is more efficient while achieving the adaptive security.
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings t...
详细信息
ISBN:
(纸本)9781479974351
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings that standard PSO traps into local optima easily and improve the convergence speed of algorithm, the concept of GA and Multi-thread Technology are introduced. The experiment results show that the proposed parallel hybrid PSO algorithm(PHPSO) is relatively steady with faster convergent rate. Especially for multi-nodes, the efficiency is improved obviously. So the proposed PHPSO is well suited for large parking lot.
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc...
详细信息
The most of existing encryption algorithm with public verifiability of the cipher-text are based on pairings. To our knowledge, it cost much time on the computing of the pairings. So it is always an interested studyin...
详细信息
With the advent of cloud computing, large-scale data are being increasingly outsourced to the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective dat...
详细信息
暂无评论