首页 > 最新文献

2014 7th International Conference on Security Technology最新文献

英文 中文
Security Objectives of Cyber Physical Systems 网络物理系统的安全目标
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.15
Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang
Today, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures. Security of cyber physical systems has become the utmost important concern in system design, implementation and research. For the past few years, researchers are focus their researches on different aspects of security of cyber physical systems. In this paper, we present a comprehensive review on up-to-now security research of cyber physical systems. We analyze main universities and institutes studying CPS security objectives.
如今,网络物理系统(CPS)在电力网络、医疗设备、交通网络、工业过程和基础设施中无处不在。网络物理系统的安全已成为系统设计、实现和研究中最重要的问题。近年来,研究人员对网络物理系统安全的各个方面进行了深入的研究。本文对网络物理系统的安全研究现状进行了综述。我们分析了研究CPS安全目标的主要大学和研究机构。
{"title":"Security Objectives of Cyber Physical Systems","authors":"Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang","doi":"10.1109/SECTECH.2014.15","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.15","url":null,"abstract":"Today, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures. Security of cyber physical systems has become the utmost important concern in system design, implementation and research. For the past few years, researchers are focus their researches on different aspects of security of cyber physical systems. In this paper, we present a comprehensive review on up-to-now security research of cyber physical systems. We analyze main universities and institutes studying CPS security objectives.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Analysis of Attacks against Anonymous Communication Networks 针对匿名通信网络的攻击分析
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.17
Tianbo Lu, Puxin Yao, Lingling Zhao, Yang Li, Feng Xie, Yamei Xia
Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper classifies and summarizes the study of attacks against anonymous communication system in recent years, including passive attacks and active attacks.
匿名通信系统一直是信息安全领域的研究热点,针对匿名通信系统的攻击技术层出不穷。本文对近年来针对匿名通信系统的攻击研究进行了分类和总结,包括被动攻击和主动攻击。
{"title":"An Analysis of Attacks against Anonymous Communication Networks","authors":"Tianbo Lu, Puxin Yao, Lingling Zhao, Yang Li, Feng Xie, Yamei Xia","doi":"10.1109/SECTECH.2014.17","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.17","url":null,"abstract":"Anonymous communication system has been hot topic in the field of information security, and attack techniques against anonymous systems are endless. This paper classifies and summarizes the study of attacks against anonymous communication system in recent years, including passive attacks and active attacks.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"114 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113946016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Empirical Study of Dimensionality Reduction Methods for Biometric Recognition 生物特征识别降维方法的实证研究
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.14
Nittaya Kerdprasop, Ratiporn Chanklan, Anusara Hirunyawanakul, Kittisak Kerdprasop
This research aims at studying the recognition accuracy and execution time that are affected by different dimensionality reduction methods applied to the biometric image data. We comparatively study the fingerprint, face images, and handwritten signature data that are pre-processed with the two statistical based dimensionality reduction methods: principal component analysis (PCA) and linear discriminant analysis (LDA). The algorithm that has been used to train and recognize the images is support vector machine with linear and polynomial kernel functions. Experimental results showed that the application of LDA dimensionality reduction method before recognizing the image patterns with a linear kernel function of SVM is more accurate and takes less time than the recognition that did not use dimensionality reduction. LDA is a suitable technique for physiological biometrics, whereas PCA is appropriate for the behavioral biometrics. We also found out that only 1% of transformed dimensions is adequate for the accurate recognition of biometric image patterns.
本研究旨在研究不同降维方法对生物特征图像数据识别精度和执行时间的影响。对比研究了采用主成分分析(PCA)和线性判别分析(LDA)两种基于统计的降维方法预处理的指纹、人脸图像和手写签名数据。用于训练和识别图像的算法是具有线性和多项式核函数的支持向量机。实验结果表明,在SVM的线性核函数图像模式识别前应用LDA降维方法比不使用降维方法的识别更准确、耗时更短。LDA技术适用于生理生物识别,PCA技术适用于行为生物识别。我们还发现,只有1%的变换维度足以准确识别生物特征图像模式。
{"title":"An Empirical Study of Dimensionality Reduction Methods for Biometric Recognition","authors":"Nittaya Kerdprasop, Ratiporn Chanklan, Anusara Hirunyawanakul, Kittisak Kerdprasop","doi":"10.1109/SECTECH.2014.14","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.14","url":null,"abstract":"This research aims at studying the recognition accuracy and execution time that are affected by different dimensionality reduction methods applied to the biometric image data. We comparatively study the fingerprint, face images, and handwritten signature data that are pre-processed with the two statistical based dimensionality reduction methods: principal component analysis (PCA) and linear discriminant analysis (LDA). The algorithm that has been used to train and recognize the images is support vector machine with linear and polynomial kernel functions. Experimental results showed that the application of LDA dimensionality reduction method before recognizing the image patterns with a linear kernel function of SVM is more accurate and takes less time than the recognition that did not use dimensionality reduction. LDA is a suitable technique for physiological biometrics, whereas PCA is appropriate for the behavioral biometrics. We also found out that only 1% of transformed dimensions is adequate for the accurate recognition of biometric image patterns.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mutual Authentication between Ships in the E-Navigation Environment 电子航行环境下船舶间的相互认证
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.11
Seung-hee Oh, Dae-Hee Seo, Byunggil Lee, Byung-ho Chung
In recent maritime communication, discussion for the maritime information exchange has been carried out continuously around the e-Navigation for environmental protection and safe navigation. However, it is the situation that is concentrated only in the service and a common data structure for maritime information sharing, security considerations is insufficient. In this paper, we analysis the security threats and vulnerabilities that can be generated in the e-Navigation environment and propose a mutual authentication method to provide reliable communication between ships of e-Navigation. In the proposed scheme, it assures the reliability with each other through mutual authentication before starting AIS communication between ships by utilizing the MMSI is a unique key of ship.
在近年来的海事通信中,围绕电子导航环境保护与安全航行,海事信息交流的讨论不断展开。然而,目前的情况是,仅集中在服务和通用数据结构上进行海事信息共享,安全性考虑不足。本文分析了电子导航环境中可能产生的安全威胁和漏洞,提出了一种相互认证的方法,以提供电子导航船舶之间的可靠通信。该方案利用MMSI作为船舶的唯一密钥,在船舶之间开始AIS通信前通过相互认证来保证彼此之间的可靠性。
{"title":"Mutual Authentication between Ships in the E-Navigation Environment","authors":"Seung-hee Oh, Dae-Hee Seo, Byunggil Lee, Byung-ho Chung","doi":"10.1109/SECTECH.2014.11","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.11","url":null,"abstract":"In recent maritime communication, discussion for the maritime information exchange has been carried out continuously around the e-Navigation for environmental protection and safe navigation. However, it is the situation that is concentrated only in the service and a common data structure for maritime information sharing, security considerations is insufficient. In this paper, we analysis the security threats and vulnerabilities that can be generated in the e-Navigation environment and propose a mutual authentication method to provide reliable communication between ships of e-Navigation. In the proposed scheme, it assures the reliability with each other through mutual authentication before starting AIS communication between ships by utilizing the MMSI is a unique key of ship.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effectiveness of Port Hopping as a Moving Target Defense 港口跳跃作为移动目标防御的有效性
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.9
Yue Luo, Baosheng Wang, Gui-lin Cai
Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters and give some empirical studies. This paper introduces urn model and quantifies the likelihood of attacker success in terms of the port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting network attacks.
端口跳变是一种典型的移动目标防御,它通过不断改变服务端口号来阻止侦察攻击。它在隐藏服务身份和迷惑潜在攻击者方面是有效的,但由于现有的工作有限,通常只讨论几个参数并给出一些实证研究,因此端口跳变的有效性和在什么情况下是可行的主动防御仍然是未知的。本文引入urn模型,从端口池大小、探测次数、脆弱服务数量、跳频等方面量化攻击者成功的可能性。理论分析表明,端口跳变是一种有效的、有发展前途的网络攻击主动防御技术。
{"title":"Effectiveness of Port Hopping as a Moving Target Defense","authors":"Yue Luo, Baosheng Wang, Gui-lin Cai","doi":"10.1109/SECTECH.2014.9","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.9","url":null,"abstract":"Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters and give some empirical studies. This paper introduces urn model and quantifies the likelihood of attacker success in terms of the port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting network attacks.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Extending Advanced Evasion Techniques Using Combinatorial Search 利用组合搜索扩展高级逃避技术
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.18
M'hamed Chammem, Mohamed Hamdi, Tai-hoon Kim
In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.
在本文中,我们通过探索新的替代方案来扩展高级逃避技术(aet)的概念,以降低现有逃避工具的复杂性。主要目标是通过增加可在被测设备(DUT)上测试和检查的组合数量来增强aet带来的安全测试潜力。我们通过使用组合了多种逃避技术的聚类来分析非穷举搜索策略的性能。为此,我们建议使用概率树来设计基于场景的aet,其中考虑了多种体系结构。为了准确分析所提出的想法所产生的贡献,我们使用一个实用的逃避工具来说明我们的想法,即McAfee设计的EVADER工具。
{"title":"Extending Advanced Evasion Techniques Using Combinatorial Search","authors":"M'hamed Chammem, Mohamed Hamdi, Tai-hoon Kim","doi":"10.1109/SECTECH.2014.18","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.18","url":null,"abstract":"In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123024971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Analysis of Sensitive Information System Security Models 敏感信息系统安全模型分析
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.13
Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin
The study of security models for sensitive information systems has been taken on for years. During this century, the thought of seeking the system security to the source of system development lifecycle received huge improvement in the system and software assurance domain. This paper expounds the understanding of information security by illustrating information security study development progress since pre-computer age and presents a description of cyberspace and cyberization security by summarizing the status quo of cyberization. Then a security model called PDRL, which includes six core security attributes of sensitive information systems, is proposed to protect the security of sensitive information systems in the whole system life-cycle.
敏感信息系统安全模型的研究已经进行了很多年。本世纪以来,从系统开发生命周期的源头寻求系统安全的思想在系统和软件保障领域得到了巨大的发展。本文通过说明前计算机时代以来信息安全研究的发展进展,阐述了对信息安全的认识;通过总结网络空间和网络安全的现状,对网络空间和网络安全进行了描述。在此基础上,提出了包含敏感信息系统六个核心安全属性的PDRL安全模型,在系统全生命周期内保护敏感信息系统的安全。
{"title":"An Analysis of Sensitive Information System Security Models","authors":"Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin","doi":"10.1109/SECTECH.2014.13","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.13","url":null,"abstract":"The study of security models for sensitive information systems has been taken on for years. During this century, the thought of seeking the system security to the source of system development lifecycle received huge improvement in the system and software assurance domain. This paper expounds the understanding of information security by illustrating information security study development progress since pre-computer age and presents a description of cyberspace and cyberization security by summarizing the status quo of cyberization. Then a security model called PDRL, which includes six core security attributes of sensitive information systems, is proposed to protect the security of sensitive information systems in the whole system life-cycle.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analysis of Cyber Physical System Security Theories 网络物理系统安全理论分析
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.12
Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng
Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper describes CPS security properties and basic theories, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber - physical systems and to provide useful security defense.
政府、公司、大学和研究机构正在推动网络物理系统(CPS)的研究和开发。然而,网络物理系统的发展受到安全因素的制约。针对这种情况,本文阐述了CPS的安全特性和基本理论,总结了针对网络物理系统的安全攻击,为网络物理系统的研究提供理论参考,为网络物理系统的安全防御提供有益的借鉴。
{"title":"An Analysis of Cyber Physical System Security Theories","authors":"Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li, Yong Peng","doi":"10.1109/SECTECH.2014.12","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.12","url":null,"abstract":"Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper describes CPS security properties and basic theories, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber - physical systems and to provide useful security defense.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Determining Location and Movement Pattern Using Anonymized WiFi Access Point BSSID 使用匿名WiFi接入点BSSID确定位置和移动模式
Pub Date : 2014-12-20 DOI: 10.1109/SECTECH.2014.10
M. N. Sakib, Junaed Bin Halim, Chin-Tser Huang
Location tracking applications are usually based on exact GPS location information and non-anonymized WiFi Access Point (AP) information. It has been assumed that anonymizing WiFi AP information is an effective way to preserve location privacy of the connected users. In this work, our goal is to show that the privacy of connected users' movement pattern can still be compromised by a determined attacker even if the WiFi AP information is anonymized. We investigated the feasibility of tracking user's movement between locations from anonymized WiFi AP BSSIDs based on large Device Analyzer datasets. Our experiments show that the user's daily movement pattern can be identified with almost 83% accuracy.
位置跟踪应用程序通常基于精确的GPS位置信息和非匿名的WiFi接入点(AP)信息。人们一直认为匿名化WiFi AP信息是保护连接用户位置隐私的有效方法。在这项工作中,我们的目标是表明,即使WiFi AP信息是匿名的,连接用户的移动模式的隐私仍然可以被确定的攻击者破坏。我们研究了基于大型设备分析器数据集的匿名WiFi AP bssid跟踪用户在不同位置之间移动的可行性。我们的实验表明,用户的日常运动模式可以识别几乎83%的准确率。
{"title":"Determining Location and Movement Pattern Using Anonymized WiFi Access Point BSSID","authors":"M. N. Sakib, Junaed Bin Halim, Chin-Tser Huang","doi":"10.1109/SECTECH.2014.10","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.10","url":null,"abstract":"Location tracking applications are usually based on exact GPS location information and non-anonymized WiFi Access Point (AP) information. It has been assumed that anonymizing WiFi AP information is an effective way to preserve location privacy of the connected users. In this work, our goal is to show that the privacy of connected users' movement pattern can still be compromised by a determined attacker even if the WiFi AP information is anonymized. We investigated the feasibility of tracking user's movement between locations from anonymized WiFi AP BSSIDs based on large Device Analyzer datasets. Our experiments show that the user's daily movement pattern can be identified with almost 83% accuracy.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing 云计算中基于虹膜特征的安全高效数据完整性
Pub Date : 2014-12-01 DOI: 10.1109/SECTECH.2014.8
Salah H. Abbdal, Hai Jin, Deqing Zou, A. Yassin
Cloud computing aids users to outsource their data in the cloud remotely to prevent them from burdens of local storage and maintenance. Users no longer have possession and control of these data. This property brings many new security challenges like unauthorised entities and correctness of stored data. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. We propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the XOR operation and iris feature extraction as the strong factors. This work gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user's iris features to secure and integrate data in a manner difficult for any internal or external entity to take or compromise it. Extensive security and performance analysis show that our scheme is highly efficient and provably secure.
云计算帮助用户将云中的数据远程外包,从而避免了本地存储和维护的负担。用户不再拥有和控制这些数据。这种特性带来了许多新的安全挑战,如未经授权的实体和存储数据的正确性。在本文中,我们重点研究了如何保证存储在云中的数据的完整性。我们提出了一种结合生物识别技术和加密技术的方法,以一种经济有效的方式让数据所有者获得对云的信任。我们提出了基于异或操作和虹膜特征提取的高效、安全的完整性作为重要因素。这项工作使云用户更有信心检测任何已更改的块。此外,我们提出的方案利用用户的虹膜特征来保护和集成数据,使任何内部或外部实体都难以获取或破坏数据。大量的安全性和性能分析表明,我们的方案是高效且可证明是安全的。
{"title":"Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing","authors":"Salah H. Abbdal, Hai Jin, Deqing Zou, A. Yassin","doi":"10.1109/SECTECH.2014.8","DOIUrl":"https://doi.org/10.1109/SECTECH.2014.8","url":null,"abstract":"Cloud computing aids users to outsource their data in the cloud remotely to prevent them from burdens of local storage and maintenance. Users no longer have possession and control of these data. This property brings many new security challenges like unauthorised entities and correctness of stored data. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. We propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the XOR operation and iris feature extraction as the strong factors. This work gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user's iris features to secure and integrate data in a manner difficult for any internal or external entity to take or compromise it. Extensive security and performance analysis show that our scheme is highly efficient and provably secure.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 7th International Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1