首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks 移动社交网络中基于快速好友匹配的伪匿名和隐藏属性比较
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.220
Entao Luo, Guojun Wang, Qin Liu
With the development of smart terminals and mobile social networks, users can find potential friends who have similar interests by sharing personal attribute profile in mobile social networks (MSN). However, the personal attribute profile usually contains sensitive information, and if this information is captured by attackers, it may cause unexpected consequences. In this paper, we propose a privacy-preserving matching scheme which is based on both identity authentication and key agreement. The scheme relies on trusted third party which has powerful computation ability and can reduce the workload on intelligent terminal. Moreover, the scheme uses encryption and authentication techniques to guarantee that the attacker fails to get the real information of user's attribute profile, so the personal privacy can be protected during friend matching process. Security analysis shows that the proposed scheme can protect the user's privacy. The simulation result shows that the scheme is more efficient than existing works.
随着智能终端和移动社交网络的发展,用户可以通过在移动社交网络MSN (mobile social networks)上分享个人属性资料,找到兴趣相似的潜在朋友。但是,个人属性配置文件通常包含敏感信息,如果这些信息被攻击者捕获,可能会导致意想不到的后果。本文提出了一种基于身份认证和密钥协议的隐私保护匹配方案。该方案依赖于具有强大计算能力的可信第三方,可以减少智能终端的工作量。此外,该方案采用了加密和认证技术,保证了攻击者无法获取用户属性配置文件的真实信息,从而在好友匹配过程中保护了用户的个人隐私。安全性分析表明,该方案能够有效地保护用户的隐私。仿真结果表明,该方案比现有方案更有效。
{"title":"Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks","authors":"Entao Luo, Guojun Wang, Qin Liu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.220","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.220","url":null,"abstract":"With the development of smart terminals and mobile social networks, users can find potential friends who have similar interests by sharing personal attribute profile in mobile social networks (MSN). However, the personal attribute profile usually contains sensitive information, and if this information is captured by attackers, it may cause unexpected consequences. In this paper, we propose a privacy-preserving matching scheme which is based on both identity authentication and key agreement. The scheme relies on trusted third party which has powerful computation ability and can reduce the workload on intelligent terminal. Moreover, the scheme uses encryption and authentication techniques to guarantee that the attacker fails to get the real information of user's attribute profile, so the personal privacy can be protected during friend matching process. Security analysis shows that the proposed scheme can protect the user's privacy. The simulation result shows that the scheme is more efficient than existing works.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Investigation and Automating Extraction of Thumbnails Produced by Image Viewers 图像查看器生成的缩略图的调查与自动提取
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.355
Wybren van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, Mohand Tahar Kechadi
Data carving is generally used to recover deleted images in digital investigations, but carving time can be significant and the deleted images may have been overwritten. Thus, thumbnails of (deleted) images are an alternative evidence, and can often be found within databases created by either operating systems or image viewers. Existing literature generally focus on the extraction of thumbnails from databases created by the operating system. Understanding thumbnails created by image reviewers is relatively understudied. Therefore, in this paper, we propose a new approach of automating extraction of thumbnails produced by image viewers. We then evaluate the utility of our approach using popular image viewers.
在数字调查中,数据雕刻通常用于恢复被删除的图像,但雕刻时间可能很长,并且被删除的图像可能已被覆盖。因此,(已删除)图像的缩略图是另一种证据,通常可以在操作系统或图像查看器创建的数据库中找到。现有文献一般侧重于从操作系统创建的数据库中提取缩略图。理解由图像审稿人创建的缩略图的研究相对较少。因此,在本文中,我们提出了一种自动提取图像观察者生成的缩略图的新方法。然后,我们使用流行的图像查看器来评估我们的方法的效用。
{"title":"Investigation and Automating Extraction of Thumbnails Produced by Image Viewers","authors":"Wybren van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, Mohand Tahar Kechadi","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.355","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.355","url":null,"abstract":"Data carving is generally used to recover deleted images in digital investigations, but carving time can be significant and the deleted images may have been overwritten. Thus, thumbnails of (deleted) images are an alternative evidence, and can often be found within databases created by either operating systems or image viewers. Existing literature generally focus on the extraction of thumbnails from databases created by the operating system. Understanding thumbnails created by image reviewers is relatively understudied. Therefore, in this paper, we propose a new approach of automating extraction of thumbnails produced by image viewers. We then evaluate the utility of our approach using popular image viewers.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pipeline Optimizations of Architecting STT-RAM as Registers in Rad-Hard Environment 硬件环境下STT-RAM寄存器结构的管道优化
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.321
Zhiyao Gong, Keni Qiu, Weiwen Chen, Yuanhui Ni, Yuanchao Xu, Jianlei Yang
Electromagnetic radiation effects can cause several types of errors on traditional SRAM-based registers such as single event upset (SEU) and single event functional interrupt (SEFI). Especially in aerospace where radiation is quite intense, the stability and correctness of systems are greatly affected. By exploiting the beneficial features of high radiation resistance and non-volatility, spin-transfer torque RAM (STT-RAM), a kind of emerging nonvolatile memory (NVM), is promising to be used as registers to avoid errors caused by radiation. However, substituting SRAM with STT-RAM in registers will affect system performance because STT-RAM suffers from long write latency. The early write termination (EWT) method has been accepted as an effective technique to mitigate write problems by terminating redundant writes. Based on the above background, this paper proposes to build registers by STT-RAM for embedded systems in rad-hard environment. Targeting the microarchitecture level of pipeline, the impact of architecting STT-RAM-based registers is discussed considering data hazard due to data dependencies. Furthermore, integrated with the EWT technique, a Read Merging method is proposed to eliminate redundant normal reads or sensing reads which are conducted along with a write. As a result of carrying out these actions, the energy and performance can be improved greatly. The results report 68% (and 75%) and 32% (and 39%) improvements on performance (and energy) by the proposed Read Merging method compared to the cases where STT-RAM is naively used as registers and intelligently used by integrating EWT, respectively.
电磁辐射效应会对传统的基于sram的寄存器造成几种类型的错误,如单事件中断(SEU)和单事件功能中断(SEFI)。特别是在辐射强度较大的航空航天环境中,系统的稳定性和正确性受到很大影响。作为一种新兴的非易失性存储器(NVM), STT-RAM (spin-transfer torque RAM)利用其高抗辐射性和非易失性的优点,有望用作寄存器,避免辐射引起的错误。然而,用寄存器中的STT-RAM代替SRAM会影响系统性能,因为STT-RAM有很长的写延迟。早期写终止(EWT)方法被认为是一种通过终止冗余写来缓解写问题的有效技术。基于以上背景,本文提出了一种基于STT-RAM的嵌入式系统硬件寄存器构建方法。针对管道的微体系结构层面,讨论了基于stt - ram的寄存器体系结构的影响,考虑了由于数据依赖而产生的数据危害。在此基础上,结合EWT技术,提出了一种读合并方法,以消除在写入过程中产生的冗余正常读或感知读。通过这些行动,可以大大提高精力和性能。结果表明,与单纯使用STT-RAM作为寄存器和通过集成EWT巧妙地使用STT-RAM相比,所提出的读合并方法在性能(和能耗)方面分别提高了68%(和75%)和32%(和39%)。
{"title":"Pipeline Optimizations of Architecting STT-RAM as Registers in Rad-Hard Environment","authors":"Zhiyao Gong, Keni Qiu, Weiwen Chen, Yuanhui Ni, Yuanchao Xu, Jianlei Yang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.321","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.321","url":null,"abstract":"Electromagnetic radiation effects can cause several types of errors on traditional SRAM-based registers such as single event upset (SEU) and single event functional interrupt (SEFI). Especially in aerospace where radiation is quite intense, the stability and correctness of systems are greatly affected. By exploiting the beneficial features of high radiation resistance and non-volatility, spin-transfer torque RAM (STT-RAM), a kind of emerging nonvolatile memory (NVM), is promising to be used as registers to avoid errors caused by radiation. However, substituting SRAM with STT-RAM in registers will affect system performance because STT-RAM suffers from long write latency. The early write termination (EWT) method has been accepted as an effective technique to mitigate write problems by terminating redundant writes. Based on the above background, this paper proposes to build registers by STT-RAM for embedded systems in rad-hard environment. Targeting the microarchitecture level of pipeline, the impact of architecting STT-RAM-based registers is discussed considering data hazard due to data dependencies. Furthermore, integrated with the EWT technique, a Read Merging method is proposed to eliminate redundant normal reads or sensing reads which are conducted along with a write. As a result of carrying out these actions, the energy and performance can be improved greatly. The results report 68% (and 75%) and 32% (and 39%) improvements on performance (and energy) by the proposed Read Merging method compared to the cases where STT-RAM is naively used as registers and intelligently used by integrating EWT, respectively.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125327941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior 一种基于用户流量行为的DDoS和Flash人群洪水区分方法
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.221
Degang Sun, Kun Yang, Zhixin Shi, Yan Wang
Discriminating Distributed Denial of Service (DDoS) from Flash Crowds (FC) is a tough and challenging problem, because there are many similarities between each other existed in network layer. In this paper, according to an extensive analysis of user traffic behavior of DDoS and FC, it can be found that some traffic abnormalities are existed between Bots and legitimate users. So a behavior-based method employed Data Mining isproposed to distinguish each other, and two public real-world datasets are used to evaluate the method. What's more, simulated traffic are produced to evaluate the method further, which is based on statistical parameters took from the two datasets and combined with two popular and common distributions together, Gaussian Distribution and Pareto Distribution. And two types of simulations are considered: Novice Simulation and Veteran Simulation. The result in Novice Simulation has almost 100% accuracy, while in Veteran Simulation, the result has a more than 98% accuracy, less than 15% FRP and 3% FNR, all of them show the proposed method could have a good accuracy and robustness. In addition, compared it with traditional methods-Entropy and Threshold methods in Veteran Simulation, the results indicate that both of them could hardly distinguish DDoS and FC, whilethe proposed method could achieve a better distinguished effect.
分布式拒绝服务攻击(DDoS)和Flash人群攻击(FC)在网络层存在许多相似之处,因此区分它们是一个非常困难和具有挑战性的问题。本文通过对DDoS和FC用户流量行为的广泛分析,可以发现bot与合法用户之间存在一些流量异常。为此,提出了一种基于行为的数据挖掘方法,并利用两个公开的真实数据集对该方法进行了评估。在此基础上,结合高斯分布和帕累托分布这两种比较常用的分布,对两种数据集的统计参数进行模拟,进一步对该方法进行了评价。我们考虑了两种类型的模拟:新手模拟和老兵模拟。新手仿真的结果准确率接近100%,老手仿真的结果准确率大于98%,FRP小于15%,FNR小于3%,均表明该方法具有良好的准确性和鲁棒性。此外,将该方法与退伍军人仿真中的传统方法熵值法和阈值法进行比较,结果表明,这两种方法都难以区分DDoS和FC,而该方法可以达到更好的区分效果。
{"title":"A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior","authors":"Degang Sun, Kun Yang, Zhixin Shi, Yan Wang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.221","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.221","url":null,"abstract":"Discriminating Distributed Denial of Service (DDoS) from Flash Crowds (FC) is a tough and challenging problem, because there are many similarities between each other existed in network layer. In this paper, according to an extensive analysis of user traffic behavior of DDoS and FC, it can be found that some traffic abnormalities are existed between Bots and legitimate users. So a behavior-based method employed Data Mining isproposed to distinguish each other, and two public real-world datasets are used to evaluate the method. What's more, simulated traffic are produced to evaluate the method further, which is based on statistical parameters took from the two datasets and combined with two popular and common distributions together, Gaussian Distribution and Pareto Distribution. And two types of simulations are considered: Novice Simulation and Veteran Simulation. The result in Novice Simulation has almost 100% accuracy, while in Veteran Simulation, the result has a more than 98% accuracy, less than 15% FRP and 3% FNR, all of them show the proposed method could have a good accuracy and robustness. In addition, compared it with traditional methods-Entropy and Threshold methods in Veteran Simulation, the results indicate that both of them could hardly distinguish DDoS and FC, whilethe proposed method could achieve a better distinguished effect.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126971112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC 一种基于ECC的轻量级匿名密钥协商协议
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.234
Wei Zhang, D. Lin, Hailong Zhang, Cong Chen, Xiaojun Zhou
Recently, Goutham et al. proposed an ID-based user authentication with key agreement on elliptic curve cryptography(ECC), which is suitable to be applied in client-serverenvironment. The scheme mainly negotiates a temporary session key between two parties. However, we find that the scheme contains some security flaws, such as incomplete anonymity, no provision for updating private key and so on. In light of this, we propose a new version of anonymous authentication with key agreement protocol used for client-server environment, especially, the calculation of both sides are lower than the previous scheme. The proposed scheme provides more security features like complete anonymity, dynamic private key updating while keeping the merits of Goutham et al.’s scheme. We also optimize the performance of the scheme to get a lightweight protocol which is more suitable for resource-constrained device applied in Internet of Things(IoT) or wireless sensor network(WSN) applications.
最近,Goutham等人提出了一种基于id的椭圆曲线加密(ECC)密钥协议的用户认证方法,该方法适用于客户端-服务器环境。该方案主要在双方之间协商一个临时会话密钥。然而,我们发现该方案存在一些安全缺陷,如不完全匿名、不提供私钥更新等。鉴于此,我们提出了一种用于客户端-服务器环境的具有密钥协议的匿名认证新版本,特别是双方的计算量比以前的方案要低。该方案在保留Goutham等人方案优点的同时,提供了完全匿名、动态私钥更新等安全特性。我们还对方案进行了性能优化,以获得更适合于物联网(IoT)或无线传感器网络(WSN)应用中资源受限设备的轻量级协议。
{"title":"A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECC","authors":"Wei Zhang, D. Lin, Hailong Zhang, Cong Chen, Xiaojun Zhou","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.234","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.234","url":null,"abstract":"Recently, Goutham et al. proposed an ID-based user authentication with key agreement on elliptic curve cryptography(ECC), which is suitable to be applied in client-serverenvironment. The scheme mainly negotiates a temporary session key between two parties. However, we find that the scheme contains some security flaws, such as incomplete anonymity, no provision for updating private key and so on. In light of this, we propose a new version of anonymous authentication with key agreement protocol used for client-server environment, especially, the calculation of both sides are lower than the previous scheme. The proposed scheme provides more security features like complete anonymity, dynamic private key updating while keeping the merits of Goutham et al.’s scheme. We also optimize the performance of the scheme to get a lightweight protocol which is more suitable for resource-constrained device applied in Internet of Things(IoT) or wireless sensor network(WSN) applications.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124398121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks 两层传感器网络中隐私保护和合谋感知的k-NN查询处理
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.274
Juru Zeng, Hong Chen, Weiling Lai, Y. Liu, Cuiping Li, Shan Wang
With high expansibility of sensor electronic devices, wireless sensor networks have attracted more and more attention. The k nearest neighbors (k-NN) query has become a significant part of sensor networks due to its availability and convenience. However, it is an important but challenging problem to keep privacy and security while still maintaining low energy consumption. In this paper, we address this issue and propose PCKQ, a Privacy-preserving and Collusion-aware protocol for k-NN Query in two-tiered wireless sensor networks. Our solution consists of a novel k-NN query framework, a data encryption mechanism and comparison method. Extensive analysis and experimental results show the high performance of PCKQ in terms of energy efficiency, security and accountability requirements.
随着传感器电子设备的高扩展性,无线传感器网络越来越受到人们的关注。k近邻(k- nn)查询以其可用性和便捷性成为传感器网络的重要组成部分。然而,在保持低能耗的同时保持隐私和安全是一个重要但具有挑战性的问题。在本文中,我们解决了这个问题,并提出了PCKQ,一种用于两层无线传感器网络中k-NN查询的隐私保护和合谋感知协议。我们的解决方案由一种新颖的k-NN查询框架、数据加密机制和比较方法组成。广泛的分析和实验结果表明,PCKQ在能源效率、安全性和责任要求方面具有很高的性能。
{"title":"Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor Networks","authors":"Juru Zeng, Hong Chen, Weiling Lai, Y. Liu, Cuiping Li, Shan Wang","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.274","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.274","url":null,"abstract":"With high expansibility of sensor electronic devices, wireless sensor networks have attracted more and more attention. The k nearest neighbors (k-NN) query has become a significant part of sensor networks due to its availability and convenience. However, it is an important but challenging problem to keep privacy and security while still maintaining low energy consumption. In this paper, we address this issue and propose PCKQ, a Privacy-preserving and Collusion-aware protocol for k-NN Query in two-tiered wireless sensor networks. Our solution consists of a novel k-NN query framework, a data encryption mechanism and comparison method. Extensive analysis and experimental results show the high performance of PCKQ in terms of energy efficiency, security and accountability requirements.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123683115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond the Hype: On Using Blockchains in Trust Management for Authentication 超越炒作:在信任管理中使用区块链进行身份验证
Pub Date : 2017-08-01 DOI: 10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.283
Nikolaos Alexopoulos, Jörg Daubert, M. Mühlhäuser, Sheikh Mahbub Habib
Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.
用于认证的信任管理(TM)系统对我们日常生活中无处不在的在线交互的安全性至关重要。各种系统,如Web PKI (X.509)和PGP的Web of Trust被用来管理这种设置中的信任。近年来,区块链技术被认为是解决我们安全问题的灵丹妙药,包括身份验证问题,但没有充分的理由来说明它的优点。在这项工作中,我们研究了使用开放分布式账本(odl)的优点,例如由区块链技术实现的分布式账本,用于保护TM系统的身份验证。我们正式为这样的系统建模,并探索区块链如何帮助减轻对它们的攻击。经过正式的论证,我们得出结论,在认证、区块链技术和odl的信任管理背景下,与以前的方法相比,可以提供相当大的优势。据我们所知,我们的分析是第一个正式建模并讨论基于区块链技术的TM认证系统安全性的分析。为了实现这一结果,我们首先为TM系统提供了一个用于身份验证的抽象模型。然后,我们通过将其表示为一系列状态转换,展示了如何在区块链中对该模型进行概念编码。下一步,我们将研究针对TM系统的五种常见攻击,并提供证据证明基于区块链的解决方案可以通过减轻或完全消除此类攻击来有利于此类系统的安全性。
{"title":"Beyond the Hype: On Using Blockchains in Trust Management for Authentication","authors":"Nikolaos Alexopoulos, Jörg Daubert, M. Mühlhäuser, Sheikh Mahbub Habib","doi":"10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.283","DOIUrl":"https://doi.org/10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.283","url":null,"abstract":"Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Security and Resilience in 5G: Current Challenges and Future Directions 5G的安全性和弹性:当前挑战和未来方向
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.345
Ghada Arfaoui, José Manuel Sánchez-Vílchez, Jean-Philippe Wary
5G tends to be a multi-layered, multi-actor, and multi-access mobile network in order to fulfill the stringent availability, security, privacy and resilience requirements that are usually contradictory. In this paper, we propose a 5G vision based on softwarization. We provide a non-exhaustive list of current security, trust and resilience issues that are critical to be explored in 5G. We finally give some directions to overcome these issues.
5G倾向于成为一个多层、多参与者和多接入的移动网络,以满足通常相互矛盾的严格的可用性、安全性、隐私性和弹性要求。本文提出了基于软件化的5G愿景。我们提供了一份不详尽的当前安全、信任和弹性问题清单,这些问题对5G的探索至关重要。我们最终给出了一些克服这些问题的方向。
{"title":"Security and Resilience in 5G: Current Challenges and Future Directions","authors":"Ghada Arfaoui, José Manuel Sánchez-Vílchez, Jean-Philippe Wary","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.345","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.345","url":null,"abstract":"5G tends to be a multi-layered, multi-actor, and multi-access mobile network in order to fulfill the stringent availability, security, privacy and resilience requirements that are usually contradictory. In this paper, we propose a 5G vision based on softwarization. We provide a non-exhaustive list of current security, trust and resilience issues that are critical to be explored in 5G. We finally give some directions to overcome these issues.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131875124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure Salsa20和ChaCha的故障注入攻击及轻量级对策
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.348
Kazuhide Fukushima, Rui Xu, S. Kiyomoto, N. Homma
We propose a fault injection attack on Salsa20 and ChaCha stream ciphers. In these stream ciphers, the initial matrix X, which consists of constants, a key, a block counter, and a nonce, is added to the matrix X(20) process with a round function to generate a keystream. Our proposed fault injection attack skips the corresponding addition (add) instruction to obtain the matrix X or X(20) and extracts the key. General countermeasures against instruction skipping, including randomization, duplication, and parity checking, are not suitable for the software implementation of a stream cipher that requires high performance and lightweight computation. We thus demonstrate an algorithm-specific but extremely lightweight countermeasure with less than 0.5% execution time overhead based on a variable separation technique. Furthermore, we study the feasibility of the countermeasure in the IA-32, Intel 64, and ARM architectures.
提出了一种针对Salsa20和ChaCha流密码的故障注入攻击方法。在这些流密码中,初始矩阵X(由常量、密钥、块计数器和nonce组成)通过一个round函数添加到矩阵X(20)进程中以生成密钥流。我们提出的故障注入攻击跳过相应的加法(add)指令获取矩阵X或X(20)并提取密钥。针对指令跳过的一般对策,包括随机化、重复和奇偶校验,不适合要求高性能和轻量级计算的流密码的软件实现。因此,我们展示了一种基于变量分离技术的特定算法但非常轻量级的对策,其执行时间开销不到0.5%。此外,我们还研究了该对策在IA-32、Intel 64和ARM架构下的可行性。
{"title":"Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure","authors":"Kazuhide Fukushima, Rui Xu, S. Kiyomoto, N. Homma","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.348","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.348","url":null,"abstract":"We propose a fault injection attack on Salsa20 and ChaCha stream ciphers. In these stream ciphers, the initial matrix X, which consists of constants, a key, a block counter, and a nonce, is added to the matrix X(20) process with a round function to generate a keystream. Our proposed fault injection attack skips the corresponding addition (add) instruction to obtain the matrix X or X(20) and extracts the key. General countermeasures against instruction skipping, including randomization, duplication, and parity checking, are not suitable for the software implementation of a stream cipher that requires high performance and lightweight computation. We thus demonstrate an algorithm-specific but extremely lightweight countermeasure with less than 0.5% execution time overhead based on a variable separation technique. Furthermore, we study the feasibility of the countermeasure in the IA-32, Intel 64, and ARM architectures.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130738665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A High-Speed and SPA-Resistant Implementation of ECC Point Multiplication Over GF(p) GF(p)上ECC点乘法的高速抗spa实现
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.245
Xiang Feng, Shuguo Li
In this paper, we propose a novel high-speed and SPA-resistant architecture for elliptic curve cryptography (ECC) point multiplication. A new Karatsuba-Ofman based pipelined multiplier is proposed to lower the latency, and an improved comb point multiplication method is employed to reduce the clock cycles and to resist simple power analysis (SPA). The proposed ECC architecture has been implemented on Altera's Stratix II FPGA platform. Implementation results show that our processor can perform 256-bit ECC point multiplication in 0.16 ms at the cost of 14.2k ALMs. Compared with the previous implementations, our implementation achieves a speed up factor of no less than 4 times without compromising the SPA-resistance.
在本文中,我们提出了一种新的高速和抗spa的椭圆曲线密码(ECC)点乘法结构。提出了一种新的基于Karatsuba-Ofman的流水线乘法器来降低时延,并采用改进的梳点乘法方法来减少时钟周期和抵抗简单的功率分析(SPA)。提出的ECC架构已在Altera的Stratix II FPGA平台上实现。实现结果表明,我们的处理器可以在0.16 ms内完成256位ECC点乘法运算,成本为14.2万alm。与以前的实现相比,我们的实现在不影响spa电阻的情况下实现了不小于4倍的加速因子。
{"title":"A High-Speed and SPA-Resistant Implementation of ECC Point Multiplication Over GF(p)","authors":"Xiang Feng, Shuguo Li","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.245","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.245","url":null,"abstract":"In this paper, we propose a novel high-speed and SPA-resistant architecture for elliptic curve cryptography (ECC) point multiplication. A new Karatsuba-Ofman based pipelined multiplier is proposed to lower the latency, and an improved comb point multiplication method is employed to reduce the clock cycles and to resist simple power analysis (SPA). The proposed ECC architecture has been implemented on Altera's Stratix II FPGA platform. Implementation results show that our processor can perform 256-bit ECC point multiplication in 0.16 ms at the cost of 14.2k ALMs. Compared with the previous implementations, our implementation achieves a speed up factor of no less than 4 times without compromising the SPA-resistance.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115163078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1