首页 > 最新文献

2021 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

英文 中文
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing 支持云计算中有效范围搜索的基于属性的可搜索加密方案
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346237
Yuan Li, Haiyan Wang, Shulan Wang, Yong Ding
With the widespread application of cloud computing technology, data privacy security problem becomes more serious. The recent studies related to searchable encryption (SE) area have shown that the data owners can share their private data with efficient search function and high-strength security. However, the search method has yet to be perfected, compared with the plaintext search mechanism. In this paper, based LSSS matrix, we give a new searchable algorithm, which is suitable for many search method, such as exact search, Boolean search and range search. In order to improve the search efficiency, the 0, 1-coding theory is introduced in the process of ciphertext search. Meanwhile it is shown that multi-search mechanism can improve the efficiency of data sharing. Finally, the performance analysis is presented, which prove our scheme is secure, efficient, and human-friendly.
随着云计算技术的广泛应用,数据隐私安全问题日益严重。近年来有关可搜索加密(SE)领域的研究表明,数据所有者可以通过高效的搜索功能和高强度的安全性共享其私有数据。但是,与明文搜索机制相比,其搜索方法还有待完善。本文提出了一种新的基于LSSS矩阵的可搜索算法,该算法适用于精确搜索、布尔搜索和范围搜索等多种搜索方法。为了提高搜索效率,在密文搜索过程中引入了0,1编码理论。同时,多搜索机制可以提高数据共享的效率。最后给出了性能分析,证明了该方案安全、高效、人性化。
{"title":"Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing","authors":"Yuan Li, Haiyan Wang, Shulan Wang, Yong Ding","doi":"10.1109/DSC49826.2021.9346237","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346237","url":null,"abstract":"With the widespread application of cloud computing technology, data privacy security problem becomes more serious. The recent studies related to searchable encryption (SE) area have shown that the data owners can share their private data with efficient search function and high-strength security. However, the search method has yet to be perfected, compared with the plaintext search mechanism. In this paper, based LSSS matrix, we give a new searchable algorithm, which is suitable for many search method, such as exact search, Boolean search and range search. In order to improve the search efficiency, the 0, 1-coding theory is introduced in the process of ciphertext search. Meanwhile it is shown that multi-search mechanism can improve the efficiency of data sharing. Finally, the performance analysis is presented, which prove our scheme is secure, efficient, and human-friendly.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Subset Predicate Encryption for Internet of Things 面向物联网的高效子集谓词加密
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346245
Yi-Fan Tseng, Shih-Jie Gao
With the rapid development of Internet technologies, emerging network environments have been discussed, such as Internet of Things. In this manuscript, we proposed a novel subset predicate encryption for the access control in Internet of Things. Compared with the existing subset predicate encryption schemes, the proposed scheme enjoy the better efficiency due to the short private key and the efficient decryption procedure.
随着互联网技术的快速发展,人们开始讨论诸如物联网等新兴网络环境。在本文中,我们提出了一种新的子集谓词加密用于物联网中的访问控制。与现有的子集谓词加密方案相比,该方案由于私钥短,解密过程高效,具有更高的效率。
{"title":"Efficient Subset Predicate Encryption for Internet of Things","authors":"Yi-Fan Tseng, Shih-Jie Gao","doi":"10.1109/DSC49826.2021.9346245","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346245","url":null,"abstract":"With the rapid development of Internet technologies, emerging network environments have been discussed, such as Internet of Things. In this manuscript, we proposed a novel subset predicate encryption for the access control in Internet of Things. Compared with the existing subset predicate encryption schemes, the proposed scheme enjoy the better efficiency due to the short private key and the efficient decryption procedure.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122415340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance 一种可证明的容错云存储系统数据占有协议
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346241
Kui Zhu, Yongjun Ren, Qingfeng Zhu
To maintain the availability and durability of data, data owners (DOs) usually store their mass data in remote cloud, which is namely called cloud storage. Cloud storage is one of the most important applications of cloud computing. Through the technique of cloud storage, DOs can enjoy the services and benefits of cloud computing. However, while bringing the convenience and efficiency, there must be some security issues like data corrupted threatened in the process of using cloud storage services. Through many provable data possession (PDP) protocols has been presented to deal with these threats, most of them don not consider the problem that how should the protocol proceed when the corrputed data was found. In this paper, we propose a provable data possession protocol with fault tolerance including corrupted data locating and recovering utilizing Cuckoo Filter and Reed-Solomon codes respectively. Finally, we illustrate the security and performance of the proposed schemes, which shows the practicability of the proposed protocol.
为了保持数据的可用性和持久性,数据所有者(DOs)通常将大量数据存储在远程云中,即云存储。云存储是云计算最重要的应用之一。通过云存储技术,DOs可以享受云计算的服务和好处。然而,在带来便利和效率的同时,在使用云存储服务的过程中也必然存在一些安全问题,比如数据被破坏的威胁。为了应对这些威胁,已经提出了许多可证明数据占有(PDP)协议,但大多数协议都没有考虑到当发现损坏的数据时协议应该如何处理的问题。本文提出了一种可证明的数据占有协议,该协议具有容错性,包括损坏数据的定位和恢复,分别利用杜鹃滤波器和里德-所罗门码。最后,我们对所提出方案的安全性和性能进行了说明,证明了所提出协议的实用性。
{"title":"A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance","authors":"Kui Zhu, Yongjun Ren, Qingfeng Zhu","doi":"10.1109/DSC49826.2021.9346241","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346241","url":null,"abstract":"To maintain the availability and durability of data, data owners (DOs) usually store their mass data in remote cloud, which is namely called cloud storage. Cloud storage is one of the most important applications of cloud computing. Through the technique of cloud storage, DOs can enjoy the services and benefits of cloud computing. However, while bringing the convenience and efficiency, there must be some security issues like data corrupted threatened in the process of using cloud storage services. Through many provable data possession (PDP) protocols has been presented to deal with these threats, most of them don not consider the problem that how should the protocol proceed when the corrputed data was found. In this paper, we propose a provable data possession protocol with fault tolerance including corrupted data locating and recovering utilizing Cuckoo Filter and Reed-Solomon codes respectively. Finally, we illustrate the security and performance of the proposed schemes, which shows the practicability of the proposed protocol.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114417939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ExamChain: A Privacy-Preserving Onscreen Marking System based on Consortium Blockchain ExamChain:一个基于联盟区块链的保护隐私的屏幕阅卷系统
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346262
Haoyang An, Jiageng Chen
Recently, Onscreen Marking (OSM) system based on the traditional cloud platform has been widely used in various large-scale public examinations. However, the mainstream examination marking process is not transparent, and there is the possibility of a black-box operation, which damages the fairness of the examination. Also, the issues related to data security and privacy are still considered to be serious challenges. In this paper, we deal with the above problems by providing secure and private transactions in a distributed OSM assuming the semi-trusted examination center. We have implemented a proof-of-concept for a consortium blockchain-based OSM in a privacy-preserving and auditable manner, enabling markers to anonymously mark to the distributed ledger,
近年来,基于传统云平台的在线阅卷(OSM)系统在各种大型公开考试中得到了广泛应用。然而,主流考试阅卷过程不透明,存在黑箱操作的可能性,损害了考试的公正性。此外,与数据安全和隐私相关的问题仍然被认为是严重的挑战。在本文中,我们通过在分布式OSM中提供安全和私有的交易来解决上述问题,OSM假设为半可信的检查中心。我们以隐私保护和可审计的方式为基于区块链的OSM联盟实施了概念验证,使标记能够匿名标记到分布式账本,
{"title":"ExamChain: A Privacy-Preserving Onscreen Marking System based on Consortium Blockchain","authors":"Haoyang An, Jiageng Chen","doi":"10.1109/DSC49826.2021.9346262","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346262","url":null,"abstract":"Recently, Onscreen Marking (OSM) system based on the traditional cloud platform has been widely used in various large-scale public examinations. However, the mainstream examination marking process is not transparent, and there is the possibility of a black-box operation, which damages the fairness of the examination. Also, the issues related to data security and privacy are still considered to be serious challenges. In this paper, we deal with the above problems by providing secure and private transactions in a distributed OSM assuming the semi-trusted examination center. We have implemented a proof-of-concept for a consortium blockchain-based OSM in a privacy-preserving and auditable manner, enabling markers to anonymously mark to the distributed ledger,","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection 基于生成对抗网络的Android恶意软件检测数据增强
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346277
Yi-Ming Chen, Chun-Hsien Yang, Guo-Chung Chen
In the field of mobile malware detection, the problem of sample imbalance often occurs in the dataset, making the classifier unable to learn features through sufficient data during the training process. This research used the generative adversarial networks (GAN). In this paper, features of malwares are transformed into image expressions, and data is generated from a small number of malicious families to balance and expand the original dataset. We also compare other data augmentation techniques to explore whether they are beneficial to identify a small number of malicious samples. Experiments show that both traditional techniques and GAN can improve the accuracy of classification, but GAN can more effectively improve the classification model to detect that the dataset originally has a small number of datasets and the recognition accuracy is lower. The experimental results show that in the different datasets of 4,000 data in Drebin and 20,000 data in AMD, the types with a relatively small number of samples are augmented by the GAN. Compared with before and after data augmentation, the difference in F1-score accuracy can reach 5%~20%.
在移动恶意软件检测领域,数据集中经常出现样本不平衡的问题,使得分类器在训练过程中无法通过足够的数据学习到特征。本研究使用了生成对抗网络(GAN)。本文将恶意软件的特征转化为图像表达式,并从少量恶意家族中生成数据,以平衡和扩展原始数据集。我们还比较了其他数据增强技术,以探索它们是否有利于识别少量恶意样本。实验表明,传统技术和GAN都可以提高分类的准确率,但GAN可以更有效地改进分类模型,以检测数据集原本数量较少且识别准确率较低的数据集。实验结果表明,在Drebin的4000个数据和AMD的20000个数据的不同数据集中,GAN增强了样本数量相对较少的类型。与数据增强前后相比,f1评分准确率的差异可达5%~20%。
{"title":"Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection","authors":"Yi-Ming Chen, Chun-Hsien Yang, Guo-Chung Chen","doi":"10.1109/DSC49826.2021.9346277","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346277","url":null,"abstract":"In the field of mobile malware detection, the problem of sample imbalance often occurs in the dataset, making the classifier unable to learn features through sufficient data during the training process. This research used the generative adversarial networks (GAN). In this paper, features of malwares are transformed into image expressions, and data is generated from a small number of malicious families to balance and expand the original dataset. We also compare other data augmentation techniques to explore whether they are beneficial to identify a small number of malicious samples. Experiments show that both traditional techniques and GAN can improve the accuracy of classification, but GAN can more effectively improve the classification model to detect that the dataset originally has a small number of datasets and the recognition accuracy is lower. The experimental results show that in the different datasets of 4,000 data in Drebin and 20,000 data in AMD, the types with a relatively small number of samples are augmented by the GAN. Compared with before and after data augmentation, the difference in F1-score accuracy can reach 5%~20%.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating 基于边缘计算的基于区块链的车联网:高效且保护隐私的车辆通信和动态更新
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346240
Qian Mei, H. Xiong, Yanan Zhao, Kuo-Hui Yeh
By virtue of intelligent data processing and vehicular network, Internet of Vehicle (IoV) provides the transport system with real-time traffic information, which greatly improves the traffic conditions of the city. Moreover, to ease the computing and storage burden of the increasing number of the vehicle, edge computing is introduced to offload computing tasks on the local with low latency. But it still suffers from data integrity and privacy concerns. To meet these challenges, this paper proposes an efficient and conditional privacy-preserving authentication protocol using blockchain-enabled IoV with edge computing. Specifically, edge computing and consortium blockchains are combined to support efficient computation and storage capabilities with low communication delay while providing data auditability. Also, a pseudonym mechanism and identity-based signature are utilized to achieve identity privacy-preserving conditionally and messages authentication of vehicles, respectively. Moreover, for the dynamic change of vehicles, a clustering selection algorithm and a key updating algorithm based on Chinese remainder theorem are given, which guarantees the forward and backward security of transmission information. Security analysis and experiment evaluation with respect of communication and computation cost demonstrate the effectiveness of the proposed protocol.
车联网(Internet of Vehicle, IoV)通过智能数据处理和车联网,为交通系统提供实时交通信息,极大地改善了城市交通状况。此外,为了减轻日益增加的车辆数量带来的计算和存储负担,引入了边缘计算,将计算任务以低延迟的方式卸载到本地。但它仍然受到数据完整性和隐私问题的困扰。为了应对这些挑战,本文提出了一种高效的、有条件的隐私保护认证协议,该协议使用具有边缘计算的区块链支持的车联网。具体来说,边缘计算和联盟区块链相结合,以低通信延迟支持高效的计算和存储能力,同时提供数据可审计性。利用假名机制和基于身份的签名分别实现车辆的有条件身份隐私保护和消息认证。针对车辆的动态变化,给出了基于中国剩余定理的聚类选择算法和密钥更新算法,保证了传输信息的前向和后向安全性。从通信和计算成本两方面对协议进行了安全性分析和实验评估,验证了协议的有效性。
{"title":"Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating","authors":"Qian Mei, H. Xiong, Yanan Zhao, Kuo-Hui Yeh","doi":"10.1109/DSC49826.2021.9346240","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346240","url":null,"abstract":"By virtue of intelligent data processing and vehicular network, Internet of Vehicle (IoV) provides the transport system with real-time traffic information, which greatly improves the traffic conditions of the city. Moreover, to ease the computing and storage burden of the increasing number of the vehicle, edge computing is introduced to offload computing tasks on the local with low latency. But it still suffers from data integrity and privacy concerns. To meet these challenges, this paper proposes an efficient and conditional privacy-preserving authentication protocol using blockchain-enabled IoV with edge computing. Specifically, edge computing and consortium blockchains are combined to support efficient computation and storage capabilities with low communication delay while providing data auditability. Also, a pseudonym mechanism and identity-based signature are utilized to achieve identity privacy-preserving conditionally and messages authentication of vehicles, respectively. Moreover, for the dynamic change of vehicles, a clustering selection algorithm and a key updating algorithm based on Chinese remainder theorem are given, which guarantees the forward and backward security of transmission information. Security analysis and experiment evaluation with respect of communication and computation cost demonstrate the effectiveness of the proposed protocol.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122535689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Perpetual Secret Sharing from Dynamic Data Structures 动态数据结构的永久秘密共享
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346272
S. S. Chaudhury, Sabyasachi Dutta, K. Sakurai
In this paper we propose a secret sharing scheme where the access structure changes over time following a dynamic data structure. The proposed scheme can accommodate an unbounded number of new parties and when the number of parties become very large, the scheme utilizes the dynamic data structure to search, add and delete parties which makes the scheme practical. Evolving Secret sharing was proposed in the literature to include unbounded number of parties into the scheme. We introduce a related idea called perpetual secret sharing which has the following advantages over the existing evolving schemes:- our construction reduces the memory usage of a dealer to a large extent and our scheme is implementable by constant-depth circuits $(AC^{0})$. Moreover, the construction is flexible and with some modifications, the construction can handle dynamic and evolving versions of several other multipartite access structures such as hierarchical access structures, compartmental access structures etc.
本文提出了一种基于动态数据结构的访问结构随时间变化的秘密共享方案。该方案可以容纳无限数量的新参与方,当参与方数量变得非常大时,该方案利用动态数据结构来搜索、添加和删除参与方,使方案具有实用性。文献中提出了将无限数量的参与方纳入方案的进化秘密共享。我们引入了一个相关的思想,称为永久秘密共享,与现有的发展方案相比,它具有以下优点:-我们的结构在很大程度上减少了经销商的内存使用,并且我们的方案可以通过定深电路实现。此外,该结构具有一定的灵活性,只要稍加修改,就可以处理多层存取结构(如分层存取结构、分区存取结构等)的动态演进版本。
{"title":"Perpetual Secret Sharing from Dynamic Data Structures","authors":"S. S. Chaudhury, Sabyasachi Dutta, K. Sakurai","doi":"10.1109/DSC49826.2021.9346272","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346272","url":null,"abstract":"In this paper we propose a secret sharing scheme where the access structure changes over time following a dynamic data structure. The proposed scheme can accommodate an unbounded number of new parties and when the number of parties become very large, the scheme utilizes the dynamic data structure to search, add and delete parties which makes the scheme practical. Evolving Secret sharing was proposed in the literature to include unbounded number of parties into the scheme. We introduce a related idea called perpetual secret sharing which has the following advantages over the existing evolving schemes:- our construction reduces the memory usage of a dealer to a large extent and our scheme is implementable by constant-depth circuits $(AC^{0})$. Moreover, the construction is flexible and with some modifications, the construction can handle dynamic and evolving versions of several other multipartite access structures such as hierarchical access structures, compartmental access structures etc.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126117919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Data Aggregation: A New Secure Framework based on Lightweight Cryptographic Algorithms 分散式数据聚合:一种基于轻量级加密算法的新安全框架
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346260
Xin Xie, Yu-Chi Chen
Blockchain has become very popular and suitable to the Internet of Things (IoT) field due to its non-tamperabaility and decentralization properties. The number of IoT devices and leaders (who own IoT devices) is increased exponentially, and thus data privacy and security are undoubtedly significant concerns. In this paper, we summarize some issues for the BeeKeeper system, a blockchain-based IoT system, proposed by Zhou et al., and then aim for presenting an improved solution for dencentralized data aggregation (DDA) on IoT. We propose our DDA system by using secret sharing to improve its efficiency, and smart contracts as the computing processors. In order to achieves data sharing (e.g., a leader to access data of others' devices), we use local differential privacy and cryptographic primitives such as token-based encryption. Finally, to show the feasibility, we provide some implementations and experiments for the DDA systems.
区块链由于其不可篡改和去中心化的特性,已经变得非常流行,适合于物联网(IoT)领域。物联网设备和领导者(拥有物联网设备)的数量呈指数级增长,因此数据隐私和安全无疑是重要的问题。在本文中,我们总结了由Zhou等人提出的基于区块链的物联网系统BeeKeeper系统的一些问题,然后旨在为物联网上的分散数据聚合(DDA)提出改进的解决方案。我们提出了采用秘密共享来提高DDA系统的效率,并采用智能合约作为计算处理器的DDA系统。为了实现数据共享(例如,领导者访问其他设备的数据),我们使用本地差分隐私和加密原语,如基于令牌的加密。最后,为了证明该方法的可行性,给出了DDA系统的一些实现和实验。
{"title":"Decentralized Data Aggregation: A New Secure Framework based on Lightweight Cryptographic Algorithms","authors":"Xin Xie, Yu-Chi Chen","doi":"10.1109/DSC49826.2021.9346260","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346260","url":null,"abstract":"Blockchain has become very popular and suitable to the Internet of Things (IoT) field due to its non-tamperabaility and decentralization properties. The number of IoT devices and leaders (who own IoT devices) is increased exponentially, and thus data privacy and security are undoubtedly significant concerns. In this paper, we summarize some issues for the BeeKeeper system, a blockchain-based IoT system, proposed by Zhou et al., and then aim for presenting an improved solution for dencentralized data aggregation (DDA) on IoT. We propose our DDA system by using secret sharing to improve its efficiency, and smart contracts as the computing processors. In order to achieves data sharing (e.g., a leader to access data of others' devices), we use local differential privacy and cryptographic primitives such as token-based encryption. Finally, to show the feasibility, we provide some implementations and experiments for the DDA systems.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Retrieving Input from Touch Interfaces via Acoustic Emanations 通过声发射从触摸界面检索输入
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346271
K. Teo, T. BalamuraliB., Jer-Ming Chen, Jianying Zhou
Security for mobile devices have largely focused on the development of trusted hardware and securing software, however these secure platforms are still vulnerable to physical side channel attacks. Side channel attacks bypass secure hardware access controls, exploiting the physical characteristics of devices and onboard sensors to compromise and leak sensitive information. In this paper, we investigate the use of onboard sensors to recover user input on touchscreen interfaces. We evaluate the use of motion and acoustic sensors to categories user interactions with the device and apply machine learning techniques to find a strong correlation between acoustic emanations and user input. The acoustic output of a touch-screen mobile device is used to build a model that predicts user input with up to 86 % accuracy in a rpa listie scpnario_
移动设备的安全主要集中在可信硬件和安全软件的开发上,然而这些安全平台仍然容易受到物理侧信道攻击。侧信道攻击绕过安全的硬件访问控制,利用设备和板载传感器的物理特性来破坏和泄露敏感信息。在本文中,我们研究了使用板载传感器来恢复触摸屏界面上的用户输入。我们评估了运动和声学传感器的使用,以分类用户与设备的交互,并应用机器学习技术来发现声学发射和用户输入之间的强相关性。触摸屏移动设备的声学输出被用来建立一个模型,该模型在rpa listie场景中预测用户输入的准确率高达86%
{"title":"Retrieving Input from Touch Interfaces via Acoustic Emanations","authors":"K. Teo, T. BalamuraliB., Jer-Ming Chen, Jianying Zhou","doi":"10.1109/DSC49826.2021.9346271","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346271","url":null,"abstract":"Security for mobile devices have largely focused on the development of trusted hardware and securing software, however these secure platforms are still vulnerable to physical side channel attacks. Side channel attacks bypass secure hardware access controls, exploiting the physical characteristics of devices and onboard sensors to compromise and leak sensitive information. In this paper, we investigate the use of onboard sensors to recover user input on touchscreen interfaces. We evaluate the use of motion and acoustic sensors to categories user interactions with the device and apply machine learning techniques to find a strong correlation between acoustic emanations and user input. The acoustic output of a touch-screen mobile device is used to build a model that predicts user input with up to 86 % accuracy in a rpa listie scpnario_","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131993756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generate Realistic Traffic Sign Image using Deep Convolutional Generative Adversarial Networks 使用深度卷积生成对抗网络生成逼真的交通标志图像
Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346266
Yan-Ting Liu, R. Chen, Christine Dewi
Convolutional Neural Networks (CNNs) achieve excellent in traffic sign detection and recognition with sufficient annotated training data. The quality of the whole vision system based on neural networks depend on the dataset. However, it is complicated to find traffic sign datasets from most of the countries of the world. In this context, Deep Convolutional Generative Adversarial Networks (DCGAN) can synthesize realistic and diverse additional training images to fill the data lack in the real image distribution. This paper mainly discusses how is the quality of the pictures generated by the DCGAN with various parameters. We use an image with a different number and size for training. Further, the Structural Similarity Index (SSIM) and MSE were used to evaluate the quality of the image. Our work measured SSIM values between generated images and corresponding real images. The generated images show high similarity with the actual image while using more images for training. The highest SSIM values reached when using 200 total images as input and images size 32×32.
卷积神经网络(Convolutional Neural Networks, cnn)在有足够的带注释的训练数据的情况下,在交通标志检测和识别方面取得了优异的成绩。整个基于神经网络的视觉系统的质量取决于数据集。然而,寻找世界上大多数国家的交通标志数据集是很复杂的。在这种情况下,深度卷积生成对抗网络(Deep Convolutional Generative Adversarial Networks, DCGAN)可以合成真实多样的附加训练图像,以填补真实图像分布中的数据不足。本文主要讨论了DCGAN在不同参数下生成的图像质量如何。我们使用不同数量和大小的图像进行训练。进一步,使用结构相似指数(SSIM)和MSE来评价图像的质量。我们的工作测量了生成的图像和相应的真实图像之间的SSIM值。当使用更多的图像进行训练时,生成的图像与实际图像具有较高的相似性。当使用总共200张图像作为输入和图像大小32×32时达到的最高SSIM值。
{"title":"Generate Realistic Traffic Sign Image using Deep Convolutional Generative Adversarial Networks","authors":"Yan-Ting Liu, R. Chen, Christine Dewi","doi":"10.1109/DSC49826.2021.9346266","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346266","url":null,"abstract":"Convolutional Neural Networks (CNNs) achieve excellent in traffic sign detection and recognition with sufficient annotated training data. The quality of the whole vision system based on neural networks depend on the dataset. However, it is complicated to find traffic sign datasets from most of the countries of the world. In this context, Deep Convolutional Generative Adversarial Networks (DCGAN) can synthesize realistic and diverse additional training images to fill the data lack in the real image distribution. This paper mainly discusses how is the quality of the pictures generated by the DCGAN with various parameters. We use an image with a different number and size for training. Further, the Structural Similarity Index (SSIM) and MSE were used to evaluate the quality of the image. Our work measured SSIM values between generated images and corresponding real images. The generated images show high similarity with the actual image while using more images for training. The highest SSIM values reached when using 200 total images as input and images size 32×32.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE Conference on Dependable and Secure Computing (DSC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1