首页 > 最新文献

IEEE Transactions on Dependable and Secure Computing最新文献

英文 中文
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms 多个信用贷款平台反欺诈系统中的协同预测
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334281
Cheng Wang, Hao Tang, Hang Zhu, Changjun Jiang
Anti-fraud engineering for online credit loan (OCL) platforms is getting more challenging due to the developing specialization of gang fraud. Associations are critical features referring to assessing the credibility of loan applications for OCL fraud prediction. State-of-the-art solutions employ graph-based methods to mine hidden associations among loan applications effectively. They perform well based on the information asymmetry which is guaranteed by the huge advantage of platforms over fraudsters in terms of data quantity and quality at their disposal. The inherent difficulty that can be foreseen is the data isolation caused by mistrust between multiple platforms and data control legislations for privacy preservation. To maintain the advantage owned by the platforms, we design a privacy-preserving distributed graph learning framework that ensures critical association repairs by merging parameter sharing and data sharing. Specially, we propose the association reconstruction mechanism (ARM) that consists of the devised exploration, processing, transmission and utilization schemes to realize data sharing. For parameter sharing, we design a hybrid encryption technique to protect privacy during collaboratively learning graph neural network (GNN) models among different financial client platforms. We conduct the experiments over real-life data from large financial platforms. The results demonstrate the effectiveness and efficiency of our proposed methods.
由于团伙欺诈日益专业化,在线信用贷款(OCL)平台的反欺诈工程变得越来越具有挑战性。关联是评估贷款申请可信度的关键特征,可用于 OCL 欺诈预测。最先进的解决方案采用基于图的方法来有效挖掘贷款申请之间的隐藏关联。它们在信息不对称的基础上表现出色,而平台在数据数量和质量上相对于欺诈者的巨大优势保证了信息不对称。可以预见的固有困难是,多个平台之间的不信任和保护隐私的数据控制法律造成了数据隔离。为了保持平台所拥有的优势,我们设计了一种保护隐私的分布式图学习框架,通过合并参数共享和数据共享来确保关键的关联修复。特别是,我们提出了关联重构机制(ARM),该机制由设计的探索、处理、传输和利用方案组成,以实现数据共享。在参数共享方面,我们设计了一种混合加密技术,以保护不同金融客户端平台在协同学习图神经网络(GNN)模型时的隐私。我们在大型金融平台的真实数据上进行了实验。实验结果证明了我们提出的方法的有效性和效率。
{"title":"Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms","authors":"Cheng Wang, Hao Tang, Hang Zhu, Changjun Jiang","doi":"10.1109/TDSC.2023.3334281","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334281","url":null,"abstract":"Anti-fraud engineering for online credit loan (OCL) platforms is getting more challenging due to the developing specialization of gang fraud. Associations are critical features referring to assessing the credibility of loan applications for OCL fraud prediction. State-of-the-art solutions employ graph-based methods to mine hidden associations among loan applications effectively. They perform well based on the information asymmetry which is guaranteed by the huge advantage of platforms over fraudsters in terms of data quantity and quality at their disposal. The inherent difficulty that can be foreseen is the data isolation caused by mistrust between multiple platforms and data control legislations for privacy preservation. To maintain the advantage owned by the platforms, we design a privacy-preserving distributed graph learning framework that ensures critical association repairs by merging parameter sharing and data sharing. Specially, we propose the association reconstruction mechanism (ARM) that consists of the devised exploration, processing, transmission and utilization schemes to realize data sharing. For parameter sharing, we design a hybrid encryption technique to protect privacy during collaboratively learning graph neural network (GNN) models among different financial client platforms. We conduct the experiments over real-life data from large financial platforms. The results demonstrate the effectiveness and efficiency of our proposed methods.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141715292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DeFiRanger: Detecting DeFi Price Manipulation Attacks DeFiRanger:检测 DeFi 价格操纵攻击
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3346888
Siwei Wu, Zhou Yu, Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xingliang Yuan
The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At the same time, attacks on DeFi applications (apps) are increasing. However, to the best of our knowledge, existing smart contract vulnerability detection tools cannot directly detect DeFi attacks. That's because they lack the capability to recover and understand high-level DeFi semantics, e.g., a user trades a token pair X and Y in a Decentralized EXchange (DEX). In this work, we focus on the detection of two new types of price manipulation attacks. To this end, we propose a platform-independent method to identify high-level DeFi semantics. Specifically, we first construct the Cash Flow Tree (CFT) from a raw transaction and then lifting the low-level semantics to high-level ones, including five advanced DeFi actions. Finally, we use patterns expressed with the recovered DeFi semantics to detect price manipulation attacks. We implemented a prototype named DeFiRanger that detected 14 zero-day security incidents. These findings were reported to affected parties or/and the community for the first time. Furthermore, the backtest experiment discovered 15 unknown historical security incidents. We further performed an attack analysis to shed light on the root causes of vulnerabilities incurring price manipulation attacks.
去中心化金融(DeFi)的快速发展推动了区块链生态系统的发展。与此同时,针对 DeFi 应用程序(应用程序)的攻击也在不断增加。然而,据我们所知,现有的智能合约漏洞检测工具无法直接检测到 DeFi 攻击。这是因为它们缺乏恢复和理解高级 DeFi 语义的能力,例如,用户在去中心化交易所(DEX)中交易代币对 X 和 Y。在这项工作中,我们的重点是检测两种新型价格操纵攻击。为此,我们提出了一种独立于平台的方法来识别高级 DeFi 语义。具体来说,我们首先从原始交易构建现金流树(CFT),然后将低级语义提升为高级语义,包括五种高级 DeFi 操作。最后,我们使用恢复后的 DeFi 语义所表达的模式来检测价格操纵攻击。我们实施了一个名为 DeFiRanger 的原型,检测到了 14 起零日安全事件。这些发现首次向受影响方或/和社区进行了报告。此外,回溯测试实验还发现了 15 起未知的历史安全事件。我们进一步进行了攻击分析,以揭示导致价格操纵攻击的漏洞的根本原因。
{"title":"DeFiRanger: Detecting DeFi Price Manipulation Attacks","authors":"Siwei Wu, Zhou Yu, Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xingliang Yuan","doi":"10.1109/TDSC.2023.3346888","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3346888","url":null,"abstract":"The rapid growth of Decentralized Finance (DeFi) boosts the blockchain ecosystem. At the same time, attacks on DeFi applications (apps) are increasing. However, to the best of our knowledge, existing smart contract vulnerability detection tools cannot directly detect DeFi attacks. That's because they lack the capability to recover and understand high-level DeFi semantics, e.g., a user trades a token pair X and Y in a Decentralized EXchange (DEX). In this work, we focus on the detection of two new types of price manipulation attacks. To this end, we propose a platform-independent method to identify high-level DeFi semantics. Specifically, we first construct the Cash Flow Tree (CFT) from a raw transaction and then lifting the low-level semantics to high-level ones, including five advanced DeFi actions. Finally, we use patterns expressed with the recovered DeFi semantics to detect price manipulation attacks. We implemented a prototype named DeFiRanger that detected 14 zero-day security incidents. These findings were reported to affected parties or/and the community for the first time. Furthermore, the backtest experiment discovered 15 unknown historical security incidents. We further performed an attack analysis to shed light on the root causes of vulnerabilities incurring price manipulation attacks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141695811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited 重新审视可验证(外包)计算中使用的隐私保护变换
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334890
Liang Zhao, Liqun Chen
Recently, a privacy-preserving technique called Privacy-Preserving Matrix Transformation (PPMT) is widely used to construct efficient privacy-preserving Verifiable (outsourced) Computation (VC) protocols for specific functions. This technique is first proposed and formalized by Salinas et al. in 2015, and it enjoys provable privacy and high efficiency. Although it seems that Salinas et al.'s PPMT scheme and the further modified scheme are elegant, we still need to take a step back and precisely discuss whether the PPMT schemes are suitable choices for VC protocols. Since Salinas et al. gave two concrete PPMT schemes to achieve the matrix-related VC in data protection and proved that their schemes are private (in terms of indistinguishability), and Zhou et al. devised a new type of PPMT scheme for the same purpose, we focus on exploring privacy of these three types of PPMT schemes. In this article, to achieve our object, we first propose the concept of a linear distinguisher and two constructions of the linear distinguisher algorithms. In particular, the linear distinguisher is a polynomial-time algorithm employed by an adversary to explore the privacy property of a cryptographic primitive. Then, we take these three PPMT schemes (including Salinas et al.'s original work, Yu et al.'s generalization and Zhou et al.'s variant) as targets and analyze their privacy property by letting an adversary make use of our linear distinguisher algorithms. The analysis results show that all these three types of transformations do not hold privacy even against passive eavesdropping (i.e., a ciphertext-only attack), and subsequently, the privacy-preserving VC protocols, based on any of these PPMT schemes, also do not hold the same privacy.
最近,一种名为隐私保护矩阵变换(Privacy-Preserving Matrix Transformation,PPMT)的隐私保护技术被广泛用于为特定函数构建高效的隐私保护可验证(外包)计算(VC)协议。该技术由 Salinas 等人于 2015 年首次提出并正式化,具有可证明的隐私性和高效性。虽然看起来 Salinas 等人的 PPMT 方案和进一步修改后的方案都很优雅,但我们仍需要退一步,精确地讨论 PPMT 方案是否适合用于 VC 协议。由于 Salinas 等人给出了两种具体的 PPMT 方案来实现数据保护中与矩阵相关的 VC,并证明了他们的方案是私有的(在不可区分性方面),而 Zhou 等人出于同样的目的设计了一种新型 PPMT 方案,因此我们重点探讨这三种 PPMT 方案的隐私性。在本文中,为了实现我们的目标,我们首先提出了线性区分器的概念和两种线性区分算法的构造。具体来说,线性区分器是一种多项式时间算法,它被对手用来探索加密基元的隐私属性。然后,我们以这三种 PPMT 方案(包括 Salinas 等人的原创作品、Yu 等人的泛化作品和 Zhou 等人的变体作品)为目标,通过让对手使用我们的线性区分算法来分析它们的隐私属性。分析结果表明,所有这三类变换即使面对被动窃听(即只针对密文的攻击)也无法保护隐私,因此,基于任何一种 PPMT 方案的隐私保护 VC 协议也无法保护同样的隐私。
{"title":"Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited","authors":"Liang Zhao, Liqun Chen","doi":"10.1109/TDSC.2023.3334890","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334890","url":null,"abstract":"Recently, a privacy-preserving technique called Privacy-Preserving Matrix Transformation (PPMT) is widely used to construct efficient privacy-preserving Verifiable (outsourced) Computation (VC) protocols for specific functions. This technique is first proposed and formalized by Salinas et al. in 2015, and it enjoys provable privacy and high efficiency. Although it seems that Salinas et al.'s PPMT scheme and the further modified scheme are elegant, we still need to take a step back and precisely discuss whether the PPMT schemes are suitable choices for VC protocols. Since Salinas et al. gave two concrete PPMT schemes to achieve the matrix-related VC in data protection and proved that their schemes are private (in terms of indistinguishability), and Zhou et al. devised a new type of PPMT scheme for the same purpose, we focus on exploring privacy of these three types of PPMT schemes. In this article, to achieve our object, we first propose the concept of a linear distinguisher and two constructions of the linear distinguisher algorithms. In particular, the linear distinguisher is a polynomial-time algorithm employed by an adversary to explore the privacy property of a cryptographic primitive. Then, we take these three PPMT schemes (including Salinas et al.'s original work, Yu et al.'s generalization and Zhou et al.'s variant) as targets and analyze their privacy property by letting an adversary make use of our linear distinguisher algorithms. The analysis results show that all these three types of transformations do not hold privacy even against passive eavesdropping (i.e., a ciphertext-only attack), and subsequently, the privacy-preserving VC protocols, based on any of these PPMT schemes, also do not hold the same privacy.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141716811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CMI: Client-Targeted Membership Inference in Federated Learning CMI: 联合学习中的客户目标成员推理
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3346692
Tianhang Zheng, Baochun Li
Membership inference is a popular benchmark attack to evaluate the privacy risk of a machine learning model or a learning scheme. However, in federated learning, membership inference is still under-explored due to several issues. For instance, some assumptions in prior works may not be practical in federated learning. Most existing membership inference methods stand on those impractical assumptions or lack generalization ability, which may misestimate the privacy risk. To address these issues, we propose CMI, an attack framework armed by a targeted poisoning method, to conduct a critical evaluation of client-targeted membership inference in federated learning. Under CMI, we consider a strong adversary, refine the prior impractical assumptions, and apply simple but generalizable attack methods. The evaluation results on multiple datasets demonstrate the efficacy of CMI under identically independently distributed (i.i.d.) and non-i.i.d. settings. In terms of the defenses, although differetially private stochatic gradient descent (DP-SGD) is effective under the i.i.d. setting, it does not provide satisfactory protection under label-biased non-i.i.d. settings. Thus, we propose RR-Label, a modified random response algorithm, to defend against membership inference. Compared to DP-SGD and Random Response Top-k (RRTop-k), RR-Label enables a better trade-off between model utility and defensive performance under label-biased non-i.i.d. settings.
成员推理是一种流行的基准攻击,用于评估机器学习模型或学习方案的隐私风险。然而,在联合学习中,由于一些问题,成员推断仍未得到充分开发。例如,先前工作中的一些假设在联合学习中可能并不实用。大多数现有的成员推断方法都基于这些不切实际的假设,或者缺乏泛化能力,这可能会误估隐私风险。为了解决这些问题,我们提出了 CMI(一种由定向中毒方法武装起来的攻击框架),以对联合学习中的客户端定向成员推断进行批判性评估。在 CMI 框架下,我们考虑了一个强大的对手,完善了先前不切实际的假设,并应用了简单但可推广的攻击方法。在多个数据集上的评估结果证明了 CMI 在完全独立分布(i.i.d.)和非 i.i.d. 环境下的有效性。在防御方面,虽然在同源独立分布(i.i.d.)设置下,差分私有随机梯度下降(DP-SGD)是有效的,但在有标签偏差的非同源独立分布(i.i.d.)设置下,它并不能提供令人满意的保护。因此,我们提出了一种改进的随机响应算法 RR-Label 来抵御成员推断。与 DP-SGD 和随机响应 Top-k 算法(RRTop-k)相比,RR-Label 算法能更好地权衡模型效用和标签偏向非 i.i.d 设置下的防御性能。
{"title":"CMI: Client-Targeted Membership Inference in Federated Learning","authors":"Tianhang Zheng, Baochun Li","doi":"10.1109/TDSC.2023.3346692","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3346692","url":null,"abstract":"Membership inference is a popular benchmark attack to evaluate the privacy risk of a machine learning model or a learning scheme. However, in federated learning, membership inference is still under-explored due to several issues. For instance, some assumptions in prior works may not be practical in federated learning. Most existing membership inference methods stand on those impractical assumptions or lack generalization ability, which may misestimate the privacy risk. To address these issues, we propose CMI, an attack framework armed by a targeted poisoning method, to conduct a critical evaluation of client-targeted membership inference in federated learning. Under CMI, we consider a strong adversary, refine the prior impractical assumptions, and apply simple but generalizable attack methods. The evaluation results on multiple datasets demonstrate the efficacy of CMI under identically independently distributed (i.i.d.) and non-i.i.d. settings. In terms of the defenses, although differetially private stochatic gradient descent (DP-SGD) is effective under the i.i.d. setting, it does not provide satisfactory protection under label-biased non-i.i.d. settings. Thus, we propose RR-Label, a modified random response algorithm, to defend against membership inference. Compared to DP-SGD and Random Response Top-k (RRTop-k), RR-Label enables a better trade-off between model utility and defensive performance under label-biased non-i.i.d. settings.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141706609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganography With Generated Images: Leveraging Volatility to Enhance Security 利用生成图像的隐写术:利用波动性提高安全性
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3341427
Jiansong Zhang, Kejiang Chen, Weixiang Li, Weiming Zhang, Neng H. Yu
The development of generative AI applications has revolutionized the data environment for steganography, providing a new source of steganographic cover. However, existing generative data-based steganography methods typically require white-box access, rendering them unsuitable for black-box generative models. To overcome this limitation, we propose a novel steganography method for generated images, which leverages the volatility of generative models and is applicable in black-box scenarios. The volatility of generative models refers to the ability to generate a series of images with slight variations by fine-tuning the input parameters of the model. These generated images exhibit varying degrees of volatility in different areas. To resist steganalysis, we mask steganographic modifications by confusing them with the inherent volatility of the model. Specifically, by modeling distributions of generated pixels and estimating the parameters of the distributions, the occurrence probabilities of generated pixels can be obtained, which serve as an effective measure for steganographic modification probabilities to render stego images as indistinguishable as possible from the images producible by the model. Moreover, we further combine it with existing costs to develop a more comprehensive steganographic algorithm. Experimental results show that the proposed method significantly outperforms baseline and comparative methods in resisting both feature-based and CNN-based steganalyzers.
生成式人工智能应用的发展彻底改变了隐写术的数据环境,为隐写术提供了新的隐蔽来源。然而,现有的基于生成数据的隐写术方法通常需要白盒访问,因此不适合黑盒生成模型。为了克服这一局限,我们提出了一种新的生成图像隐写术方法,它利用生成模型的波动性,适用于黑盒场景。生成模型的波动性是指通过微调模型的输入参数生成一系列略有不同的图像的能力。这些生成的图像在不同区域表现出不同程度的波动性。为了抵御隐写分析,我们将隐写修改与模型固有的波动性混淆起来,从而掩盖了隐写修改。具体来说,通过对生成像素的分布建模并估算分布参数,可以得到生成像素的出现概率,从而有效地衡量隐写修改概率,使隐去图像与模型生成的图像尽可能无差别。此外,我们还进一步将其与现有成本相结合,开发出一种更全面的隐写算法。实验结果表明,所提出的方法在抵御基于特征和基于 CNN 的隐分析器方面明显优于基准方法和比较方法。
{"title":"Steganography With Generated Images: Leveraging Volatility to Enhance Security","authors":"Jiansong Zhang, Kejiang Chen, Weixiang Li, Weiming Zhang, Neng H. Yu","doi":"10.1109/TDSC.2023.3341427","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3341427","url":null,"abstract":"The development of generative AI applications has revolutionized the data environment for steganography, providing a new source of steganographic cover. However, existing generative data-based steganography methods typically require white-box access, rendering them unsuitable for black-box generative models. To overcome this limitation, we propose a novel steganography method for generated images, which leverages the volatility of generative models and is applicable in black-box scenarios. The volatility of generative models refers to the ability to generate a series of images with slight variations by fine-tuning the input parameters of the model. These generated images exhibit varying degrees of volatility in different areas. To resist steganalysis, we mask steganographic modifications by confusing them with the inherent volatility of the model. Specifically, by modeling distributions of generated pixels and estimating the parameters of the distributions, the occurrence probabilities of generated pixels can be obtained, which serve as an effective measure for steganographic modification probabilities to render stego images as indistinguishable as possible from the images producible by the model. Moreover, we further combine it with existing costs to develop a more comprehensive steganographic algorithm. Experimental results show that the proposed method significantly outperforms baseline and comparative methods in resisting both feature-based and CNN-based steganalyzers.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141706032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud 为云计算中的加密数据提供透明重复数据删除和审计功能
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3334475
Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, Xiaohua Jia
In cloud storage systems, secure deduplication plays a critical role in saving storage costs for the cloud server and ensuring data confidentiality for cloud users. Traditional secure deduplication schemes require users to encrypt their outsourced files using specific encryption algorithms that cannot provide semantic security. However, users are unable to directly benefit from the storage savings, as the relation between the actual storage cost and the offered prices remains not transparent. As a result, users may be unwilling to cooperate with the cloud by encrypting their data using semantically secure algorithms. Moreover, data integrity is a significant concern for cloud storage users. To address these issues, this paper proposes a novel transparent and secure deduplication scheme that supports integrity auditing. Compared to previous works, our design can verify the number of file owners and the integrity through one-time proof verification. It also protects the private contents of files and the privacy of file ownership from malicious users. Moreover, our scheme includes a batch auditing method to simultaneously verify the numbers of file owners and the integrity of multiple files. Theoretical analysis confirms the correctness and security of our scheme. Comparison results demonstrate its competing performance over previous solutions.
在云存储系统中,安全重复数据删除在为云服务器节省存储成本和确保云用户的数据保密性方面发挥着至关重要的作用。传统的安全重复数据删除方案要求用户使用无法提供语义安全的特定加密算法对外包文件进行加密。然而,由于实际存储成本与报价之间的关系并不透明,用户无法直接从存储节省中获益。因此,用户可能不愿意与云合作,使用语义安全算法加密数据。此外,数据完整性也是云存储用户非常关心的问题。为了解决这些问题,本文提出了一种支持完整性审计的新型透明安全重复数据删除方案。与以前的作品相比,我们的设计可以通过一次性证明验证来验证文件所有者的数量和完整性。同时,它还能保护文件的隐私内容和文件所有权的隐私不受恶意用户的侵犯。此外,我们的方案还包括一种批量审核方法,可同时验证文件所有者的数量和多个文件的完整性。理论分析证实了我们方案的正确性和安全性。比较结果表明,与之前的解决方案相比,我们的方案性能更胜一筹。
{"title":"Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud","authors":"Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, Xiaohua Jia","doi":"10.1109/TDSC.2023.3334475","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3334475","url":null,"abstract":"In cloud storage systems, secure deduplication plays a critical role in saving storage costs for the cloud server and ensuring data confidentiality for cloud users. Traditional secure deduplication schemes require users to encrypt their outsourced files using specific encryption algorithms that cannot provide semantic security. However, users are unable to directly benefit from the storage savings, as the relation between the actual storage cost and the offered prices remains not transparent. As a result, users may be unwilling to cooperate with the cloud by encrypting their data using semantically secure algorithms. Moreover, data integrity is a significant concern for cloud storage users. To address these issues, this paper proposes a novel transparent and secure deduplication scheme that supports integrity auditing. Compared to previous works, our design can verify the number of file owners and the integrity through one-time proof verification. It also protects the private contents of files and the privacy of file ownership from malicious users. Moreover, our scheme includes a batch auditing method to simultaneously verify the numbers of file owners and the integrity of multiple files. Theoretical analysis confirms the correctness and security of our scheme. Comparison results demonstrate its competing performance over previous solutions.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141703905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles 用于车联网的可证明安全高效的加密密钥更新协议
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3345406
Mir Ali Rezazadeh Baee, L. Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk
Wireless broadcast transmission technology enables vehicles to communicate with other nearby vehicles and with nearby fixed equipment. Vehicles and equipment within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The communication in VANETs is vulnerable to message manipulation attacks. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. Any cryptographic technique employed for authentication requires the use of a cryptographic key, and mechanisms to restore the system quickly when either long-term and short-term cryptographic keying material are leaked or expired. Such mechanisms must be carefully designed to satisfy both perfect-forward-secrecy and security against known-key attacks. To achieve this, there should be no direct dependencies among keying material. Unfortunately, many existing proposals for authentication are not fully effective in VANETs, since many of them do not take a key-management mechanism into consideration or they fail to satisfy the requirements for secure key-update. In this paper, we first present a case study demonstrating that dependency among keying material is an exploitable vulnerability that violates perfect-forward-secrecy, and results in known-key attacks and message forgery attacks. Second, we propose a new cryptographic-key update protocol that consists of two sub-protocols: a long-term-key update protocol (for updating the long-term cryptographic keying material) and a short-term-key update protocol (for session-key establishment). Our scheme is accompanied by both security and efficiency analysis: we provide a formal security proof and demonstrate efficiency by conducting extensive performance analysis. This is compared with the security and efficiency of existing schemes in public literature.
无线广播传输技术使车辆能够与附近的其他车辆和固定设备进行通信。传输范围内的车辆和设备会建立一个自组织网络,称为车载 Ad-hoc 网络(VANET)。VANET 中的通信容易受到信息操纵攻击。因此,应采用各种机制确保数据广播的真实性和完整性。任何用于身份验证的加密技术都需要使用加密密钥,以及在长期和短期加密密钥材料泄露或过期时迅速恢复系统的机制。这种机制必须经过精心设计,既要满足完美的前向保密性,又要保证对已知密钥攻击的安全性。要做到这一点,密钥材料之间不应存在直接依赖关系。遗憾的是,现有的许多认证方案在 VANET 中并不完全有效,因为其中许多方案没有考虑到密钥管理机制,或者无法满足安全密钥更新的要求。在本文中,我们首先介绍了一个案例研究,证明密钥材料之间的依赖性是一个可利用的漏洞,它违反了完美的前向保密性,并导致已知密钥攻击和信息伪造攻击。其次,我们提出了一种新的加密密钥更新协议,它由两个子协议组成:长期密钥更新协议(用于更新长期加密密钥材料)和短期密钥更新协议(用于建立会话密钥)。我们的方案附有安全性和效率分析:我们提供了正式的安全性证明,并通过大量的性能分析证明了效率。我们将其与公开文献中现有方案的安全性和效率进行了比较。
{"title":"A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles","authors":"Mir Ali Rezazadeh Baee, L. Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk","doi":"10.1109/TDSC.2023.3345406","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3345406","url":null,"abstract":"Wireless broadcast transmission technology enables vehicles to communicate with other nearby vehicles and with nearby fixed equipment. Vehicles and equipment within transmission range establish a self-organizing network called Vehicular Ad-hoc Network (VANET). The communication in VANETs is vulnerable to message manipulation attacks. Thus, mechanisms should be applied to ensure both the authenticity and integrity of the data broadcast. Any cryptographic technique employed for authentication requires the use of a cryptographic key, and mechanisms to restore the system quickly when either long-term and short-term cryptographic keying material are leaked or expired. Such mechanisms must be carefully designed to satisfy both perfect-forward-secrecy and security against known-key attacks. To achieve this, there should be no direct dependencies among keying material. Unfortunately, many existing proposals for authentication are not fully effective in VANETs, since many of them do not take a key-management mechanism into consideration or they fail to satisfy the requirements for secure key-update. In this paper, we first present a case study demonstrating that dependency among keying material is an exploitable vulnerability that violates perfect-forward-secrecy, and results in known-key attacks and message forgery attacks. Second, we propose a new cryptographic-key update protocol that consists of two sub-protocols: a long-term-key update protocol (for updating the long-term cryptographic keying material) and a short-term-key update protocol (for session-key establishment). Our scheme is accompanied by both security and efficiency analysis: we provide a formal security proof and demonstrate efficiency by conducting extensive performance analysis. This is compared with the security and efficiency of existing schemes in public literature.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141705863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain-Based Shared Data Integrity Auditing and Deduplication 基于区块链的共享数据完整性审计和重复数据删除
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3335413
Ying Miao, Keke Gai, Liehuang Zhu, K. Choo, Jaideep Vaidya
Data deduplication and integrity auditing based blockchain plays an important role in guaranteeing secure and efficient cloud storage services. However, existing data deduplication schemes support auditing either with the assistance of a trust center (key server or third-party auditor) or bear the waste of computation and storage resources caused by repetitive authenticators storage and key storage. In this paper, we propose a blockchain-based shared data integrity auditing and deduplication scheme. Specifically, we propose a deduplication protocol based on ID-based broadcast encryption without key servers and achieve key deduplication on the user side. Next, we propose a data integrity auditing protocol by using the characteristic of convergent encryption to achieve authenticator deduplication on the cloud service provider side. Besides, we achieve decentralized data integrity auditing based blockchain without relying on a single trusted third-party auditor and improve the credibility of the auditing result. On this basis, we propose two bath auditing protocols for different scenarios to improve efficiency. Security and performance analysis demonstrates that the authenticators’ storage cost on the cloud storage provider side can be reduced from ${mathcal {O}}({mathcal {F}})$O(F) to ${mathcal {O}}(1)$O(1) and the key storage cost on the user side can be reduced from ${mathcal {O}}({mathcal {F}})$O(F) to ${mathcal {O}}(1)$O(1) as well.
基于区块链的重复数据删除和完整性审计在保证安全高效的云存储服务方面发挥着重要作用。然而,现有的重复数据删除方案要么在信任中心(密钥服务器或第三方审计员)的协助下支持审计,要么承担重复验证器存储和密钥存储造成的计算和存储资源浪费。本文提出了一种基于区块链的共享数据完整性审计和重复数据删除方案。具体来说,我们提出了一种基于 ID 的广播加密重复数据删除协议,无需密钥服务器,在用户端实现密钥重复数据删除。接着,我们利用聚合加密的特点提出了一种数据完整性审计协议,在云服务提供商端实现了验证器重复数据删除。此外,我们还实现了基于区块链的去中心化数据完整性审计,无需依赖单一可信的第三方审计员,提高了审计结果的可信度。在此基础上,我们针对不同场景提出了两种浴缸审计协议,以提高效率。安全和性能分析表明,云存储提供方的验证器存储成本可从 ${mathcal {O}}({mathcal {F}})$O(F) 降至 ${mathcal {O}}(1)$O(1) ,用户方的密钥存储成本也可从 ${mathcal {O}}({mathcal {F}})$O(F) 降至 ${mathcal {O}}(1)$O(1) 。
{"title":"Blockchain-Based Shared Data Integrity Auditing and Deduplication","authors":"Ying Miao, Keke Gai, Liehuang Zhu, K. Choo, Jaideep Vaidya","doi":"10.1109/TDSC.2023.3335413","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3335413","url":null,"abstract":"Data deduplication and integrity auditing based blockchain plays an important role in guaranteeing secure and efficient cloud storage services. However, existing data deduplication schemes support auditing either with the assistance of a trust center (key server or third-party auditor) or bear the waste of computation and storage resources caused by repetitive authenticators storage and key storage. In this paper, we propose a blockchain-based shared data integrity auditing and deduplication scheme. Specifically, we propose a deduplication protocol based on ID-based broadcast encryption without key servers and achieve key deduplication on the user side. Next, we propose a data integrity auditing protocol by using the characteristic of convergent encryption to achieve authenticator deduplication on the cloud service provider side. Besides, we achieve decentralized data integrity auditing based blockchain without relying on a single trusted third-party auditor and improve the credibility of the auditing result. On this basis, we propose two bath auditing protocols for different scenarios to improve efficiency. Security and performance analysis demonstrates that the authenticators’ storage cost on the cloud storage provider side can be reduced from <inline-formula><tex-math notation=\"LaTeX\">${mathcal {O}}({mathcal {F}})$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"script\">O</mml:mi><mml:mo>(</mml:mo><mml:mi mathvariant=\"script\">F</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"gai-ieq1-3335413.gif\"/></alternatives></inline-formula> to <inline-formula><tex-math notation=\"LaTeX\">${mathcal {O}}(1)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"script\">O</mml:mi><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"gai-ieq2-3335413.gif\"/></alternatives></inline-formula> and the key storage cost on the user side can be reduced from <inline-formula><tex-math notation=\"LaTeX\">${mathcal {O}}({mathcal {F}})$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"script\">O</mml:mi><mml:mo>(</mml:mo><mml:mi mathvariant=\"script\">F</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"gai-ieq3-3335413.gif\"/></alternatives></inline-formula> to <inline-formula><tex-math notation=\"LaTeX\">${mathcal {O}}(1)$</tex-math><alternatives><mml:math><mml:mrow><mml:mi mathvariant=\"script\">O</mml:mi><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href=\"gai-ieq4-3335413.gif\"/></alternatives></inline-formula> as well.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid SG-Audit:智能电网的高效稳健云审计方案
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3347001
Ning Lu, Mingxi Liu, Wenbo Shi, Ximeng Liu, Kim-Kwang Raymond Choo
Cloud auditing allows users to leverage digital signature evidences to undertake remote data verification and consequently determine the integrity of their data stored in the cloud. While there are many cloud auditing schemes proposed for cloud services, deployments on large scale smart grid (SG) are known to be challenging in practice, for example in terms of inefficiency and lack of robustness. In this article, we propose an efficient and robust cloud auditing scheme for SG (hereafter referred to as SG-Audit). Specifically, we utilize mobile edge computing (served as proxy signer) to offload the signature computation loads incurred by smart meters (SMs), as well as devising an efficient proxy signer recommendation strategy to ensure each SM obtains high quality service, a scalable index structure to reduce the signature evidence access time during data verification, and a deduplication and sampling based challenge data index generation strategy to narrow down the verification scope. Moreover, we also define three strategic threat scenarios supported by SG-Audit, and further devise a secure cloud auditing protocol to improve robustness. Through rigorous mathematical analysis and extensive experiments, we demonstrate that SG-Audit achieves increased auditing efficiency (by about 42% on average) in comparison to prior work.
云审计允许用户利用数字签名证据进行远程数据验证,从而确定其存储在云中的数据的完整性。虽然针对云服务提出了许多云审计方案,但众所周知,在大规模智能电网(SG)上部署云审计方案在实践中具有挑战性,例如效率低下和缺乏鲁棒性。在本文中,我们提出了一种高效、稳健的 SG 云审计方案(以下简称 SG-审计)。具体来说,我们利用移动边缘计算(作为代理签名者)来卸载智能电表(SM)产生的签名计算负载,并设计了高效的代理签名者推荐策略,以确保每个 SM 都能获得高质量的服务;设计了可扩展的索引结构,以减少数据验证过程中的签名证据访问时间;设计了基于重复数据删除和抽样的挑战数据索引生成策略,以缩小验证范围。此外,我们还定义了 SG-Audit 支持的三种战略威胁场景,并进一步设计了安全云审计协议以提高鲁棒性。通过严格的数学分析和广泛的实验,我们证明 SG-Audit 与之前的工作相比提高了审核效率(平均提高约 42%)。
{"title":"SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid","authors":"Ning Lu, Mingxi Liu, Wenbo Shi, Ximeng Liu, Kim-Kwang Raymond Choo","doi":"10.1109/TDSC.2023.3347001","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3347001","url":null,"abstract":"Cloud auditing allows users to leverage digital signature evidences to undertake remote data verification and consequently determine the integrity of their data stored in the cloud. While there are many cloud auditing schemes proposed for cloud services, deployments on large scale smart grid (SG) are known to be challenging in practice, for example in terms of inefficiency and lack of robustness. In this article, we propose an efficient and robust cloud auditing scheme for SG (hereafter referred to as SG-Audit). Specifically, we utilize mobile edge computing (served as proxy signer) to offload the signature computation loads incurred by smart meters (SMs), as well as devising an efficient proxy signer recommendation strategy to ensure each SM obtains high quality service, a scalable index structure to reduce the signature evidence access time during data verification, and a deduplication and sampling based challenge data index generation strategy to narrow down the verification scope. Moreover, we also define three strategic threat scenarios supported by SG-Audit, and further devise a secure cloud auditing protocol to improve robustness. Through rigorous mathematical analysis and extensive experiments, we demonstrate that SG-Audit achieves increased auditing efficiency (by about 42% on average) in comparison to prior work.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141704517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds 通过骨传导闭塞声在可听设备上进行用户身份验证
IF 7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-01 DOI: 10.1109/TDSC.2023.3335368
Yadong Xie, Fan Li, Yue Wu, Yu Wang
With the rapid development of mobile devices and the fast increase of sensitive data, secure and convenient mobile authentication technologies are desired. Except for traditional passwords, many mobile devices have biometric-based authentication methods (e.g., fingerprint, voiceprint, and face recognition), but they are vulnerable to spoofing attacks. To solve this problem, we study new biometric features which are based on the dental occlusion and find that the bone-conducted sound of dental occlusion collected in binaural canals contains unique features of individual bones and teeth. Motivated by this, we propose a novel authentication system, TeethPass$^+$+, which uses earbuds to collect occlusal sounds in binaural canals to achieve authentication. First, we design an event detection method based on spectrum variance to detect bone-conducted sounds. Then, we analyze the time-frequency domain of the sounds to filter out motion noises and extract unique features of users from four aspects: teeth structure, bone structure, occlusal location, and occlusal sound. Finally, we train a Triplet network to construct the user template, which is used to complete authentication. Through extensive experiments including 53 volunteers, the performance of TeethPass$^+$+ in different environments is verified. TeethPass$^+$+ achieves an accuracy of 98.6% and resists 99.7% of spoofing attacks.
随着移动设备的快速发展和敏感数据的快速增长,人们需要安全、便捷的移动身份验证技术。除传统密码外,许多移动设备都有基于生物特征的身份验证方法(如指纹、声纹和人脸识别),但这些方法容易受到欺骗攻击。为了解决这个问题,我们研究了基于牙齿咬合的新生物识别特征,发现在双耳声道中收集的牙齿咬合的骨传导声音包含单个骨骼和牙齿的独特特征。受此启发,我们提出了一种新型身份验证系统 TeethPass$^+$+,它利用耳塞收集双耳道中的咬合声来实现身份验证。首先,我们设计了一种基于频谱方差的事件检测方法来检测骨传导声音。然后,我们分析声音的时频域以过滤运动噪声,并从牙齿结构、骨骼结构、咬合位置和咬合声音四个方面提取用户的独特特征。最后,我们训练一个三重网络来构建用户模板,用于完成身份验证。通过包括 53 名志愿者在内的大量实验,TeethPass$^+$+ 在不同环境下的性能得到了验证。TeethPass$^+$+ 的准确率达到 98.6%,并能抵御 99.7% 的欺骗攻击。
{"title":"User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds","authors":"Yadong Xie, Fan Li, Yue Wu, Yu Wang","doi":"10.1109/TDSC.2023.3335368","DOIUrl":"https://doi.org/10.1109/TDSC.2023.3335368","url":null,"abstract":"With the rapid development of mobile devices and the fast increase of sensitive data, secure and convenient mobile authentication technologies are desired. Except for traditional passwords, many mobile devices have biometric-based authentication methods (e.g., fingerprint, voiceprint, and face recognition), but they are vulnerable to spoofing attacks. To solve this problem, we study new biometric features which are based on the dental occlusion and find that the bone-conducted sound of dental occlusion collected in binaural canals contains unique features of individual bones and teeth. Motivated by this, we propose a novel authentication system, TeethPass<inline-formula><tex-math notation=\"LaTeX\">$^+$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"li-ieq1-3335368.gif\"/></alternatives></inline-formula>, which uses earbuds to collect occlusal sounds in binaural canals to achieve authentication. First, we design an event detection method based on spectrum variance to detect bone-conducted sounds. Then, we analyze the time-frequency domain of the sounds to filter out motion noises and extract unique features of users from four aspects: teeth structure, bone structure, occlusal location, and occlusal sound. Finally, we train a Triplet network to construct the user template, which is used to complete authentication. Through extensive experiments including 53 volunteers, the performance of TeethPass<inline-formula><tex-math notation=\"LaTeX\">$^+$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"li-ieq2-3335368.gif\"/></alternatives></inline-formula> in different environments is verified. TeethPass<inline-formula><tex-math notation=\"LaTeX\">$^+$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic xlink:href=\"li-ieq3-3335368.gif\"/></alternatives></inline-formula> achieves an accuracy of 98.6% and resists 99.7% of spoofing attacks.","PeriodicalId":13047,"journal":{"name":"IEEE Transactions on Dependable and Secure Computing","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141693470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE Transactions on Dependable and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1