首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
Decentralizing access control system for data sharing in smart grid 智能电网数据共享的分散访问控制系统
Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100113
Kunpeng Liu , Chenfei Wang , Xiaotong Zhou

Smart grid enhances the intelligence of the traditional power grid, which allows sharing varied data such as consumer, production, or energy with service consumers. Due to the untrustworthy networks, there exist potential security threats (e.g., unauthorized access and modification, malicious data theft) hindering the development of smart grid. While several access control schemes have been proposed for smart grid to achieve sensitive data protection and fine-grained identity management, most of them cannot satisfy the requirements of decentralizing smart grid environment and suffer from key escrow problems. In addition, some existing solutions cannot achieve dynamic user management for lacking the privilege revocation mechanism. In this paper, we propose a decentralizing access control system with user revocation to relieve the above problems. We design a new multiple-authority attribute-based encryption (MABE) scheme to keep data confidentiality and adapt decentralizing smart grid applications. We also compare our proposal with the similar solution from both security and performance. The comparing results show that our access control system can achieve a trade-off among confidentiality, authentication, distribution and efficiency in smart grid.

智能电网增强了传统电网的智能性,允许与服务消费者共享消费者、生产或能源等各种数据。由于网络不可信,存在潜在的安全威胁(如未经授权的访问和修改、恶意数据盗窃),阻碍了智能电网的发展。虽然已经为智能电网提出了几种访问控制方案,以实现敏感数据保护和细粒度身份管理,但大多数方案都不能满足去中心化智能电网环境的要求,并且存在关键托管问题。此外,由于缺乏权限撤销机制,现有的一些解决方案无法实现动态用户管理。在本文中,我们提出了一个具有用户撤销的去中心化访问控制系统来缓解上述问题。我们设计了一种新的基于多权限属性的加密(MABE)方案,以保持数据机密性并适应去中心化的智能电网应用。我们还从安全性和性能两个方面将我们的方案与类似的解决方案进行了比较。比较结果表明,我们的访问控制系统可以在智能电网中实现保密性、认证性、分布性和效率之间的权衡。
{"title":"Decentralizing access control system for data sharing in smart grid","authors":"Kunpeng Liu ,&nbsp;Chenfei Wang ,&nbsp;Xiaotong Zhou","doi":"10.1016/j.hcc.2023.100113","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100113","url":null,"abstract":"<div><p>Smart grid enhances the intelligence of the traditional power grid, which allows sharing varied data such as consumer, production, or energy with service consumers. Due to the untrustworthy networks, there exist potential security threats (e.g., unauthorized access and modification, malicious data theft) hindering the development of smart grid. While several access control schemes have been proposed for smart grid to achieve sensitive data protection and fine-grained identity management, most of them cannot satisfy the requirements of decentralizing smart grid environment and suffer from key escrow problems. In addition, some existing solutions cannot achieve dynamic user management for lacking the privilege revocation mechanism. In this paper, we propose a decentralizing access control system with user revocation to relieve the above problems. We design a new multiple-authority attribute-based encryption (MABE) scheme to keep data confidentiality and adapt decentralizing smart grid applications. We also compare our proposal with the similar solution from both security and performance. The comparing results show that our access control system can achieve a trade-off among confidentiality, authentication, distribution and efficiency in smart grid.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel GPU based Geo-Location Inference Attack on WebGL framework 一种新的基于GPU的WebGL框架地理位置推断攻击
Pub Date : 2023-05-27 DOI: 10.1016/j.hcc.2023.100135
Weixian Mai, Yinhao Xiao

In the past few years, graphics processing units (GPUs) have become an indispensable part of modern computer systems, not only for graphics rendering but also for intensive parallel computing. Given that many tasks running on GPUs contain sensitive information, security concerns have been raised, especially about potential GPU information leakage. Previous works have shown such concerns by showing that attackers can use GPU memory allocations or performance counters to measure victim side effects. However, such an attack has a critical drawback that it requires a victim to install desktop applications or mobile apps yielding it uneasy to be deployed in the real world. In this paper, we solve this drawback by proposing a novel GPU-based side-channel Geo-Privacy inference attack on the WebGL framework, namely, GLINT (stands for Geo-Location Inference Attack). GLINT merely utilizes a lightweight browser extension to measure the time elapsed to render a sequence of frames on well-known map websites, e.g., Google Maps, or Baidu Maps. The measured stream of time series is then employed to infer geologically privacy-sensitive information, such as a search on a specific location. Upon retrieving the stream, we propose a novel online segmentation algorithm for streaming data to determine the start and end points of privacy-sensitive time series. We then combine the DTW algorithm and KNN algorithm on these series to conclude the final inference on a user’s geo-location privacy.

We conducted real-world experiments to testify our attack. The experiments show that GeoInfer can correctly infer more than 83% of user searches regardless of the locations and map websites, meaning that our Geo-Privacy inference attack is accurate, practical, and robust. To counter this attack, we implemented a defense strategy based on Differential Privacy to hinder obtaining accurate rendering data. We found that this defense mechanism managed to reduce the average accuracy of the attack model by more than 70%, indicating that the attack was no longer effective. We have fully implemented GLINT and open-sourced it for future follow-up research.

在过去的几年里,图形处理单元(GPU)已经成为现代计算机系统中不可或缺的一部分,不仅用于图形渲染,而且用于密集的并行计算。考虑到GPU上运行的许多任务都包含敏感信息,人们提出了安全问题,尤其是潜在的GPU信息泄露问题。先前的研究表明,攻击者可以使用GPU内存分配或性能计数器来测量受害者的副作用,从而表明了这种担忧。然而,这种攻击有一个关键的缺点,即它需要受害者安装桌面应用程序或移动应用程序,从而使其难以在现实世界中部署。在本文中,我们通过在WebGL框架上提出一种新的基于GPU的侧通道地理隐私推断攻击来解决这一缺陷,即GLINT(代表地理位置推断攻击)。GLINT仅利用轻量级浏览器扩展来测量在知名地图网站(如谷歌地图或百度地图)上渲染一系列帧所花费的时间。然后,测量的时间序列流被用来推断地质上隐私敏感的信息,例如对特定位置的搜索。在检索流时,我们提出了一种新的流数据在线分割算法,以确定隐私敏感时间序列的起点和终点。然后,我们将DTW算法和KNN算法结合在这些序列上,得出关于用户地理位置隐私的最终推断。我们进行了真实世界的实验来证明我们的攻击。实验表明,无论位置和地图网站如何,GeoInfer都可以正确推断83%以上的用户搜索,这意味着我们的地理隐私推断攻击是准确、实用和稳健的。为了应对这种攻击,我们实施了一种基于差分隐私的防御策略,以阻止获得准确的渲染数据。我们发现,这种防御机制使攻击模型的平均准确率降低了70%以上,这表明攻击不再有效。我们已经全面实施了GLINT,并为未来的后续研究开源。
{"title":"A novel GPU based Geo-Location Inference Attack on WebGL framework","authors":"Weixian Mai,&nbsp;Yinhao Xiao","doi":"10.1016/j.hcc.2023.100135","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100135","url":null,"abstract":"<div><p>In the past few years, graphics processing units (GPUs) have become an indispensable part of modern computer systems, not only for graphics rendering but also for intensive parallel computing. Given that many tasks running on GPUs contain sensitive information, security concerns have been raised, especially about potential GPU information leakage. Previous works have shown such concerns by showing that attackers can use GPU memory allocations or performance counters to measure victim side effects. However, such an attack has a critical drawback that it requires a victim to install desktop applications or mobile apps yielding it uneasy to be deployed in the real world. In this paper, we solve this drawback by proposing a novel GPU-based side-channel Geo-Privacy inference attack on the WebGL framework, namely, GLINT (stands for <strong>G</strong>eo-<strong>L</strong>ocation <strong>In</strong>ference A<strong>t</strong>tack). GLINT merely utilizes a lightweight browser extension to measure the time elapsed to render a sequence of frames on well-known map websites, e.g., Google Maps, or Baidu Maps. The measured stream of time series is then employed to infer geologically privacy-sensitive information, such as a search on a specific location. Upon retrieving the stream, we propose a novel online segmentation algorithm for streaming data to determine the start and end points of privacy-sensitive time series. We then combine the DTW algorithm and KNN algorithm on these series to conclude the final inference on a user’s geo-location privacy.</p><p>We conducted real-world experiments to testify our attack. The experiments show that GeoInfer can correctly infer more than 83% of user searches regardless of the locations and map websites, meaning that our Geo-Privacy inference attack is accurate, practical, and robust. To counter this attack, we implemented a defense strategy based on Differential Privacy to hinder obtaining accurate rendering data. We found that this defense mechanism managed to reduce the average accuracy of the attack model by more than 70%, indicating that the attack was no longer effective. We have fully implemented GLINT and open-sourced it for future follow-up research.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50193401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain data secure sharing protocol based on threshold Paillier algorithm 基于门限Paillier算法的区块链数据安全共享协议
Pub Date : 2023-05-24 DOI: 10.1016/j.hcc.2023.100132
Likai Jia , Xiubo Chen , Luxi Liu , Xiaoge Wang , Ke Xiao , Gang Xu

With the development of Internet technology, secure storage and secure sharing of data have become increasingly important. Traditional data sharing schemes exist a series of problems including lack of security and low efficiency. In this paper, we construct a secure and efficient data sharing scheme based on threshold Paillier algorithm and blockchain technology, which achieves secure data storage and sharing without a third-party institution. Firstly, we propose a (t,l) threshold Paillier blockchain data sharing scheme, which effectively prevents decryption failures caused by the loss of a single node’s private key. Secondly, we propose a combined on-chain and off-chain data storage scheme, we store the ciphertext on the cloud server and the ciphertext hash value on the blockchain, which not only ensures the integrity of the data but also solves the storage limitation problem on the blockchain. Finally, we use the simulation paradigm to prove the security of the scheme in the semi-honest model. The discussion results of the comparison and the analysis of performance show that the blockchain data security sharing scheme proposed in this paper has lower computational overhead and higher security than other similar schemes.

随着互联网技术的发展,数据的安全存储和安全共享变得越来越重要。传统的数据共享方案存在着一系列问题,包括缺乏安全性和效率低下。在本文中,我们构建了一个基于阈值Paillier算法和区块链技术的安全高效的数据共享方案,在没有第三方机构的情况下实现了安全的数据存储和共享。首先,我们提出了一种(t,l)阈值的Paillier区块链数据共享方案,该方案有效地防止了由于单个节点的私钥丢失而导致的解密失败。其次,我们提出了一种链上和链下相结合的数据存储方案,将密文存储在云服务器上,将密文哈希值存储在区块链上,既保证了数据的完整性,又解决了区块链上的存储限制问题。最后,我们使用仿真范式在半诚实模型中证明了该方案的安全性。比较和性能分析的讨论结果表明,本文提出的区块链数据安全共享方案比其他类似方案具有更低的计算开销和更高的安全性。
{"title":"Blockchain data secure sharing protocol based on threshold Paillier algorithm","authors":"Likai Jia ,&nbsp;Xiubo Chen ,&nbsp;Luxi Liu ,&nbsp;Xiaoge Wang ,&nbsp;Ke Xiao ,&nbsp;Gang Xu","doi":"10.1016/j.hcc.2023.100132","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100132","url":null,"abstract":"<div><p>With the development of Internet technology, secure storage and secure sharing of data have become increasingly important. Traditional data sharing schemes exist a series of problems including lack of security and low efficiency. In this paper, we construct a secure and efficient data sharing scheme based on threshold Paillier algorithm and blockchain technology, which achieves secure data storage and sharing without a third-party institution. Firstly, we propose a <span><math><mrow><mo>(</mo><mi>t</mi><mo>,</mo><mi>l</mi><mo>)</mo></mrow></math></span> threshold Paillier blockchain data sharing scheme, which effectively prevents decryption failures caused by the loss of a single node’s private key. Secondly, we propose a combined on-chain and off-chain data storage scheme, we store the ciphertext on the cloud server and the ciphertext hash value on the blockchain, which not only ensures the integrity of the data but also solves the storage limitation problem on the blockchain. Finally, we use the simulation paradigm to prove the security of the scheme in the semi-honest model. The discussion results of the comparison and the analysis of performance show that the blockchain data security sharing scheme proposed in this paper has lower computational overhead and higher security than other similar schemes.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50193399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capsule networks embedded with prior known support information for image reconstruction 嵌入先验支持信息的胶囊网络用于图像重建
Pub Date : 2023-04-12 DOI: 10.1016/j.hcc.2023.100125
Meng Wang , Ping Yang , Yahao Zhang

Compressed sensing (CS) has been successfully applied to realize image reconstruction. Neural networks have been introduced to the CS of images to exploit the prior known support information, which can improve the reconstruction quality. Capsule Network (Caps Net) is the latest achievement in neural networks, and can well represent the instantiation parameters of a specific type of entity or part of an object. This study aims to propose a Caps Net with a novel dynamic routing to embed the information within the CS framework. The output of the network represents the probability that the index of the nonzero entry exists on the support of the signal of interest. To lead the dynamic routing to the most likely index, a group of prediction vectors is designed determined by the information. Furthermore, the results of experiments on imaging signals are taken for a comparation of the performances among different algorithms. It is concluded that the proposed capsule network (Caps Net) creates higher reconstruction quality at nearly the same time with traditional Caps Net.

压缩传感(CS)已成功应用于图像重建。神经网络被引入到图像的CS中,以利用先前已知的支持信息,从而提高重建质量。胶囊网络(Caps-Net)是神经网络的最新成果,可以很好地表示特定类型实体或对象部分的实例化参数。本研究旨在提出一种具有新颖动态路由的Caps-Net,以将信息嵌入CS框架中。网络的输出表示非零条目的索引存在于感兴趣信号的支持上的概率。为了将动态路由引导到最可能的索引,设计了一组由信息确定的预测向量。此外,还利用成像信号的实验结果对不同算法的性能进行了比较。结果表明,所提出的胶囊网络(Caps-Net)在几乎与传统的Caps-Net同时产生了更高的重建质量。
{"title":"Capsule networks embedded with prior known support information for image reconstruction","authors":"Meng Wang ,&nbsp;Ping Yang ,&nbsp;Yahao Zhang","doi":"10.1016/j.hcc.2023.100125","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100125","url":null,"abstract":"<div><p>Compressed sensing (CS) has been successfully applied to realize image reconstruction. Neural networks have been introduced to the CS of images to exploit the prior known support information, which can improve the reconstruction quality. Capsule Network (Caps Net) is the latest achievement in neural networks, and can well represent the instantiation parameters of a specific type of entity or part of an object. This study aims to propose a Caps Net with a novel dynamic routing to embed the information within the CS framework. The output of the network represents the probability that the index of the nonzero entry exists on the support of the signal of interest. To lead the dynamic routing to the most likely index, a group of prediction vectors is designed determined by the information. Furthermore, the results of experiments on imaging signals are taken for a comparation of the performances among different algorithms. It is concluded that the proposed capsule network (Caps Net) creates higher reconstruction quality at nearly the same time with traditional Caps Net.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50193400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient secure and verifiable KNN set similarity search over outsourced clouds 外包云上高效、安全、可验证的KNN集相似性搜索
Pub Date : 2023-03-01 DOI: 10.1016/j.hcc.2022.100100
Xufeng Jiang , Lu Li

KNN set similarity search is a foundational operation in various realistic applications in cloud computing. However, for security consideration, sensitive data will always be encrypted before uploading to the cloud servers, which makes the search processing a challenging task. In this paper, we focus on the problem of KNN set similarity search over the encrypted datasets. We use Yao’s garbled circuits and secret sharing as underlying tools. To achieve better querying efficiency, we construct a secure R-Tree index structure based on a novel secure grouping protocol, which enables grouping appropriate private values in an oblivious way. Along with several elaborately designed secure arithmetic subroutines, we propose an efficient secure and verifiable KNN set similarity search framework over outsourced clouds. Theoretically, we analyze the complexity of our schemes in detail, and prove the security in the presence of semi-honest adversaries. Finally, we evaluate the performance and feasibility of our proposed methods by extensive experiments.

KNN集相似性搜索是云计算中各种现实应用的基础操作。然而,出于安全考虑,敏感数据在上传到云服务器之前总是会被加密,这使得搜索处理成为一项具有挑战性的任务。本文主要研究加密数据集上的KNN集相似性搜索问题。我们使用姚混乱的电路和秘密分享作为底层工具。为了提高查询效率,我们在一种新的安全分组协议的基础上构建了一种安全的R树索引结构,该结构能够以一种不经意的方式对适当的私有值进行分组。结合几个精心设计的安全算法子程序,我们提出了一个有效的、安全的、可验证的外包云上KNN集相似性搜索框架。从理论上讲,我们详细分析了我们的方案的复杂性,并证明了在存在半诚实对手的情况下的安全性。最后,我们通过大量的实验评估了我们提出的方法的性能和可行性。
{"title":"Efficient secure and verifiable KNN set similarity search over outsourced clouds","authors":"Xufeng Jiang ,&nbsp;Lu Li","doi":"10.1016/j.hcc.2022.100100","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100100","url":null,"abstract":"<div><p>KNN set similarity search is a foundational operation in various realistic applications in cloud computing. However, for security consideration, sensitive data will always be encrypted before uploading to the cloud servers, which makes the search processing a challenging task. In this paper, we focus on the problem of KNN set similarity search over the encrypted datasets. We use Yao’s garbled circuits and secret sharing as underlying tools. To achieve better querying efficiency, we construct a secure R-Tree index structure based on a novel secure grouping protocol, which enables grouping appropriate private values in an oblivious way. Along with several elaborately designed secure arithmetic subroutines, we propose an efficient secure and verifiable KNN set similarity search framework over outsourced clouds. Theoretically, we analyze the complexity of our schemes in detail, and prove the security in the presence of semi-honest adversaries. Finally, we evaluate the performance and feasibility of our proposed methods by extensive experiments.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization of multi-state generation problem based on spatial information network topology 基于空间信息网络拓扑结构的多状态生成优化问题
Pub Date : 2023-03-01 DOI: 10.1016/j.hcc.2022.100102
Peng Yang , JiaYing Zhang , Shijie Zhou , Jinyu Zhou

Spatial information network is a kind of satellite network with high speed node movement and fast dynamic topology change. With the increasing number of low-orbit satellites, the research on the subnets topology and dynamic optimization of space information networks has become an important direction to study the destructibility of spatial information network. In this paper, two common objective functions in inter-satellite link assignment, network observation position and network communication factor are studied, and a multi-objective optimization model is constructed. Depth first search, simulated annealing, NSGA-II and adaptive optimization simulated annealing were used to analyze and solve the model. By comparing the solving efficiency of the model through simulation experiments, the difference of the results caused by the four algorithms is verified.

空间信息网络是一种节点移动速度快、拓扑结构动态变化快的卫星网络。随着低轨卫星数量的不断增加,空间信息网络子网拓扑结构和动态优化研究已成为研究空间信息网络破坏性的重要方向。本文研究了星间链路分配中两个常见的目标函数,即网络观测位置和网络通信因子,并建立了多目标优化模型。采用深度优先搜索、模拟退火、NSGA-II和自适应优化模拟退火对模型进行了分析和求解。通过仿真实验对模型的求解效率进行比较,验证了四种算法求解结果的差异。
{"title":"Optimization of multi-state generation problem based on spatial information network topology","authors":"Peng Yang ,&nbsp;JiaYing Zhang ,&nbsp;Shijie Zhou ,&nbsp;Jinyu Zhou","doi":"10.1016/j.hcc.2022.100102","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100102","url":null,"abstract":"<div><p>Spatial information network is a kind of satellite network with high speed node movement and fast dynamic topology change. With the increasing number of low-orbit satellites, the research on the subnets topology and dynamic optimization of space information networks has become an important direction to study the destructibility of spatial information network. In this paper, two common objective functions in inter-satellite link assignment, network observation position and network communication factor are studied, and a multi-objective optimization model is constructed. Depth first search, simulated annealing, NSGA-II and adaptive optimization simulated annealing were used to analyze and solve the model. By comparing the solving efficiency of the model through simulation experiments, the difference of the results caused by the four algorithms is verified.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross-domain identity authentication scheme based on blockchain and PKI system 基于区块链和PKI系统的跨域身份认证方案
Pub Date : 2023-03-01 DOI: 10.1016/j.hcc.2022.100096
Hai Zhang , Feng Zhao

In vehicular ad hoc networks (VANET), the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users. The Public Key Infrastructure (PKI) system is often used to solve the identity authentication and security trust problems faced by VANET. However, the PKI system has challenges such as too centralized Authority of Certification Authority (CA), frequent cross-domain access to certificate interactions and high authentication volume, leading to high certificate management costs, complex cross-domain authentication paths, easy privacy leakage, and overburdened networks. To address these problems, this paper proposes a lightweight blockchain-based PKI identity management and authentication architecture that uses smart contracts to reduce the heavy burden caused by CAs directly managing the life cycle of digital certificates. On this basis, a trust chain based on smart contracts is designed to replace the traditional CA trust chain to meet the general cross-domain requirements, to effectively avoid the communication pressure caused by a mass of certificate transmissions. For the cross-domain scenario with higher privacy and security requirements the identity attribute authentication service is provided directly while protecting privacy by using the Merkle tree to anchor identity attribute data on and off the blockchain chain. Finally, the proposed scheme was comprehensively analyzed in terms of cost, time consumption and security.

在车载自组织网络(VANET)中,由于车辆用户具有较大的跨域移动性,用户的跨域身份认证对VANET的发展非常重要。公钥基础设施(PKI)系统通常用于解决VANET面临的身份认证和安全信任问题。然而,PKI系统面临着证书颁发机构(CA)过于集中、证书交互频繁跨域访问和身份验证量大等挑战,导致证书管理成本高、跨域身份验证路径复杂、隐私容易泄露和网络负担过重。为了解决这些问题,本文提出了一种基于区块链的轻量级PKI身份管理和认证架构,该架构使用智能合约来减轻CA直接管理数字证书生命周期所带来的沉重负担。在此基础上,设计了一种基于智能合约的信任链,以取代传统的CA信任链,满足通用的跨域需求,有效避免了大量证书传输带来的通信压力。对于隐私和安全要求更高的跨域场景,直接提供身份属性认证服务,同时通过使用Merkle树在区块链链上和链下锚定身份属性数据来保护隐私。最后,从成本、时间消耗和安全性三个方面对所提出的方案进行了综合分析。
{"title":"Cross-domain identity authentication scheme based on blockchain and PKI system","authors":"Hai Zhang ,&nbsp;Feng Zhao","doi":"10.1016/j.hcc.2022.100096","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100096","url":null,"abstract":"<div><p>In vehicular ad hoc networks (VANET), the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users. The Public Key Infrastructure (PKI) system is often used to solve the identity authentication and security trust problems faced by VANET. However, the PKI system has challenges such as too centralized Authority of Certification Authority (CA), frequent cross-domain access to certificate interactions and high authentication volume, leading to high certificate management costs, complex cross-domain authentication paths, easy privacy leakage, and overburdened networks. To address these problems, this paper proposes a lightweight blockchain-based PKI identity management and authentication architecture that uses smart contracts to reduce the heavy burden caused by CAs directly managing the life cycle of digital certificates. On this basis, a trust chain based on smart contracts is designed to replace the traditional CA trust chain to meet the general cross-domain requirements, to effectively avoid the communication pressure caused by a mass of certificate transmissions. For the cross-domain scenario with higher privacy and security requirements the identity attribute authentication service is provided directly while protecting privacy by using the Merkle tree to anchor identity attribute data on and off the blockchain chain. Finally, the proposed scheme was comprehensively analyzed in terms of cost, time consumption and security.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm 一种基于SM2签名算法的无证书多接收加密方案
Pub Date : 2023-03-01 DOI: 10.1016/j.hcc.2023.100103
Jinglin Zou , Debiao He , Sheng Bi , Libing Wu , Zhe Liu , Cong Peng

The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial cryptographic algorithms. Designing an MRE scheme based on Elliptic Curve Cryptography (ECC) is one of the current design methods with better flexibility and performance. However, the research on MRE schemes based on SM2 elliptic curve public-key cryptography is still in a blank state. This paper proposes a Certificateless SM2-based Multi-receiver Encryption (CL-SM2-MRE) scheme. We prove the security of the CL-SM2-MRE scheme under the Random Oracle Model (ROM) and analyze the performance.

多接收器加密(MRE)方案可以满足多播和广播场景中的安全数据传输要求。为了实现合规性,中国的关键信息基础设施应使用中国国家商用密码算法进行保护。设计一种基于椭圆曲线密码(ECC)的MRE方案是目前具有更好灵活性和性能的设计方法之一。然而,基于SM2椭圆曲线公钥密码的MRE方案的研究还处于空白状态。本文提出了一种基于无证书SM2的多接收机加密(CL-SM2-MRE)方案。我们在随机Oracle模型(ROM)下证明了CL-SM2-MRE方案的安全性,并对其性能进行了分析。
{"title":"A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm","authors":"Jinglin Zou ,&nbsp;Debiao He ,&nbsp;Sheng Bi ,&nbsp;Libing Wu ,&nbsp;Zhe Liu ,&nbsp;Cong Peng","doi":"10.1016/j.hcc.2023.100103","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100103","url":null,"abstract":"<div><p>The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial cryptographic algorithms. Designing an MRE scheme based on Elliptic Curve Cryptography (ECC) is one of the current design methods with better flexibility and performance. However, the research on MRE schemes based on SM2 elliptic curve public-key cryptography is still in a blank state. This paper proposes a Certificateless SM2-based Multi-receiver Encryption (CL-SM2-MRE) scheme. We prove the security of the CL-SM2-MRE scheme under the Random Oracle Model (ROM) and analyze the performance.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A robust adversarial attack against speech recognition with UAP 一种针对UAP语音识别的鲁棒对抗性攻击
Pub Date : 2023-03-01 DOI: 10.1016/j.hcc.2022.100098
Ziheng Qin , Xianglong Zhang , Shujun Li

Speech recognition (SR) systems based on deep neural networks are increasingly widespread in smart devices. However, they are vulnerable to human-imperceptible adversarial attacks, which cause the SR to generate incorrect or targeted adversarial commands. Meanwhile, audio adversarial attacks are particularly susceptible to various factors, e.g., ambient noise, after applying them to a real-world attack. To circumvent this issue, we develop a universal adversarial perturbation (UAP) generation method to construct robust real-world UAP by integrating ambient noise into the generation process. The proposed UAP can work well in the case of input-agnostic and independent sources. We validate the effectiveness of our method on two different SRs in different real-world scenarios and parameters, the results demonstrate that our method yields state-of-the-art performance, i.e. given any audio waveform, the word error rate can be up to 80%. Extensive experiments investigate the impact of different parameters (e.g, signal-to-noise ratio, distance, and attack angle) on the attack success rate.

基于深度神经网络的语音识别系统在智能设备中越来越广泛。然而,它们很容易受到人类无法察觉的对抗性攻击,这会导致SR生成不正确或有针对性的对抗性命令。同时,音频对抗性攻击在应用于真实世界的攻击后,特别容易受到各种因素的影响,例如环境噪声。为了解决这个问题,我们开发了一种通用对抗性扰动(UAP)生成方法,通过将环境噪声集成到生成过程中来构建健壮的真实世界UAP。所提出的UAP在输入不可知和独立来源的情况下可以很好地工作。我们在不同的真实世界场景和参数中验证了我们的方法在两个不同SR上的有效性,结果表明,我们的方法产生了最先进的性能,即在给定任何音频波形的情况下,单词错误率可以高达80%。大量实验研究了不同参数(如信噪比、距离和攻角)对攻击成功率的影响。
{"title":"A robust adversarial attack against speech recognition with UAP","authors":"Ziheng Qin ,&nbsp;Xianglong Zhang ,&nbsp;Shujun Li","doi":"10.1016/j.hcc.2022.100098","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100098","url":null,"abstract":"<div><p>Speech recognition (SR) systems based on deep neural networks are increasingly widespread in smart devices. However, they are vulnerable to human-imperceptible adversarial attacks, which cause the SR to generate incorrect or targeted adversarial commands. Meanwhile, audio adversarial attacks are particularly susceptible to various factors, e.g., ambient noise, after applying them to a real-world attack. To circumvent this issue, we develop a universal adversarial perturbation (UAP) generation method to construct robust real-world UAP by integrating ambient noise into the generation process. The proposed UAP can work well in the case of input-agnostic and independent sources. We validate the effectiveness of our method on two different SRs in different real-world scenarios and parameters, the results demonstrate that our method yields state-of-the-art performance, i.e. given any audio waveform, the word error rate can be up to 80%. Extensive experiments investigate the impact of different parameters (e.g, signal-to-noise ratio, distance, and attack angle) on the attack success rate.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering onion services through circuit fingerprinting attacks 通过电路指纹攻击发现洋葱服务
Pub Date : 2023-03-01 DOI: 10.1016/j.hcc.2022.100099
Bin Huang, Yanhui Du

Tor onion services provide anonymous service to clients using the Tor browser without disclosing the real address of the server. But an adversary could use a circuit fingerprinting attack to classify circuit types and discovers the network address of the onion service. Recently, Tor has used padding defenses to inject dummy cells to protect against circuit fingerprinting attacks. But we found that circuits still expose much information to the adversary. In this paper, we present a novel circuit fingerprinting attack, which divides the circuit into the circuit generated by the client and the circuit generated by the onion service. To get a more effective attack, we tried three state-of-the-art classification models called SVM, Random Forest and XGBoost, respectively. As the best performance, we attain 99.99% precision and 99.99% recall when using Random Forest and XGBoost classification models, respectively. And we also tried to classify circuit types using our features and the classification model mentioned above, which was first proposed by Kwon. The best performance was achieved with 99.99% precision and 99.99% recall when using the random forest classifier in circuit type classification. The experimental results show that we achieved highly accurate circuit fingerprinting attacks even when application-layer traffic is identical and some type of circuits using the defenses provided by Tor.

Tor洋葱服务使用Tor浏览器向客户端提供匿名服务,而不披露服务器的真实地址。但对手可以使用电路指纹攻击来对电路类型进行分类,并发现洋葱服务的网络地址。最近,Tor使用填充防御来注入伪单元,以防止电路指纹攻击。但我们发现,电路仍然会向对手暴露大量信息。在本文中,我们提出了一种新的电路指纹攻击,将电路分为客户端生成的电路和洋葱服务生成的电路。为了获得更有效的攻击,我们尝试了三种最先进的分类模型,分别称为SVM、随机森林和XGBoost。作为最佳性能,当使用随机森林和XGBoost分类模型时,我们分别达到99.99%的精度和99.99%的召回率。我们还试图利用我们的特征和Kwon首次提出的上述分类模型对电路类型进行分类。在电路类型分类中使用随机森林分类器时,获得了99.99%的准确率和99.99%的召回率的最佳性能。实验结果表明,即使应用层流量相同,并且某些类型的电路使用Tor提供的防御,我们也能实现高度准确的电路指纹攻击。
{"title":"Discovering onion services through circuit fingerprinting attacks","authors":"Bin Huang,&nbsp;Yanhui Du","doi":"10.1016/j.hcc.2022.100099","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100099","url":null,"abstract":"<div><p>Tor onion services provide anonymous service to clients using the Tor browser without disclosing the real address of the server. But an adversary could use a circuit fingerprinting attack to classify circuit types and discovers the network address of the onion service. Recently, Tor has used padding defenses to inject dummy cells to protect against circuit fingerprinting attacks. But we found that circuits still expose much information to the adversary. In this paper, we present a novel circuit fingerprinting attack, which divides the circuit into the circuit generated by the client and the circuit generated by the onion service. To get a more effective attack, we tried three state-of-the-art classification models called SVM, Random Forest and XGBoost, respectively. As the best performance, we attain 99.99% precision and 99.99% recall when using Random Forest and XGBoost classification models, respectively. And we also tried to classify circuit types using our features and the classification model mentioned above, which was first proposed by Kwon. The best performance was achieved with 99.99% precision and 99.99% recall when using the random forest classifier in circuit type classification. The experimental results show that we achieved highly accurate circuit fingerprinting attacks even when application-layer traffic is identical and some type of circuits using the defenses provided by Tor.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1