首页 > 最新文献

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)最新文献

英文 中文
A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment 众包环境下基于区块链的车辆信任管理框架
Dawei Wang, Xiao Chen, Haiqin Wu, Ruozhou Yu, Yishi Zhao
Vehicular crowdsourcing networks (VCNs) enable vehicles to provide or obtain traffic-related services in a costefficient and flexible manner. Therefore, it is crucial to provide trusted management in VCNs for high reliability towards both service producers and consumers. However, most recent VCN platforms rely on a third party to manage crowdsourcing services which might be not fully trusted by users. For the issue, this paper proposes a blockchain-based trust management scheme for VCNs to provide a decentralized and trusted service management. A comprehensive trust evaluation model (TEM) is designed to quantify the trust degree of each vehicular node, and a vehicle-trust blockchain framework called VTchain is proposed to preserve the trust values of nodes while guaranteeing transparency and trustworthiness. Particularly, we leverage a trusted execution environment (TEE) to provide secure trust evaluation to tackle possible untrusted road-side units. In addition, we introduce TEM-based Proof of Trust to support blockchain maintenance, which works together with an efficient consensus algorithm Zyzzyva for improved scalability. Finally, extensive experiments are conducted by developing a testbed deployed on cloud servers for measurements.
车辆众包网络(VCNs)使车辆能够以经济、灵活的方式提供或获得与交通相关的服务。因此,在vcn中提供可信的管理以实现对服务生产者和消费者的高可靠性至关重要。然而,大多数最新的VCN平台依赖于第三方来管理众包服务,这可能不会得到用户的完全信任。针对这一问题,本文提出了一种基于区块链的vcn信任管理方案,为vcn提供去中心化、可信任的服务管理。设计了一种综合信任评估模型(TEM)来量化每个车辆节点的信任程度,并提出了一种称为VTchain的车辆信任区块链框架,在保证透明度和可信度的同时保持节点的信任值。特别是,我们利用可信执行环境(TEE)来提供安全的信任评估,以解决可能不可信的路边单元。此外,我们引入了基于tem的信任证明来支持区块链维护,它与高效的共识算法Zyzzyva一起工作,以提高可扩展性。最后,通过开发部署在云服务器上的测试平台进行了广泛的实验。
{"title":"A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment","authors":"Dawei Wang, Xiao Chen, Haiqin Wu, Ruozhou Yu, Yishi Zhao","doi":"10.1109/TrustCom50675.2020.00266","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00266","url":null,"abstract":"Vehicular crowdsourcing networks (VCNs) enable vehicles to provide or obtain traffic-related services in a costefficient and flexible manner. Therefore, it is crucial to provide trusted management in VCNs for high reliability towards both service producers and consumers. However, most recent VCN platforms rely on a third party to manage crowdsourcing services which might be not fully trusted by users. For the issue, this paper proposes a blockchain-based trust management scheme for VCNs to provide a decentralized and trusted service management. A comprehensive trust evaluation model (TEM) is designed to quantify the trust degree of each vehicular node, and a vehicle-trust blockchain framework called VTchain is proposed to preserve the trust values of nodes while guaranteeing transparency and trustworthiness. Particularly, we leverage a trusted execution environment (TEE) to provide secure trust evaluation to tackle possible untrusted road-side units. In addition, we introduce TEM-based Proof of Trust to support blockchain maintenance, which works together with an efficient consensus algorithm Zyzzyva for improved scalability. Finally, extensive experiments are conducted by developing a testbed deployed on cloud servers for measurements.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129262635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role 基于量化角色的实用拜占庭容错一致性算法
Zhujun Zhang, Dali Zhu, Weiping Fan
Practical Byzantine Fault Tolerance (PBFT) is an optional consensus protocol for consortium blockchains scenarios where strong consistency is required. However, it also inevitably incurs high energy consumption, low efficiency and poor scalability. What is more, the reliability of the consensus node cannot be guaranteed by itself. For addressing these problems, this paper proposes practical byzantine consensus algorithm based on quantified-role (QPBFT), which can achieve the following advantages: (1) Improving the security and reliability of the blockchain. The reliability attributes of nodes are quantified based on analytic hierarchy process (AHP), those nodes with high reliability evaluation scores are more likely to participate in block production by introduction of the quantified-role, which can ensure the reliability of blockchain network; (2) Realizing high efficiency and low energy consumption. Voting mechanism is adopted to simplify and optimize the PBFT consensus process; (3) Implementing adaptation to dynamic network environments. Management nodes, voting nodes, candidate nodes, and ordinary nodes are dynamically adjusted according to node reliability evaluation score for optimizing consensus performance. The paper demonstrates the security feature including reliability and fault tolerance. Meanwhile, simulation experiments are conducted to validate the higher efficiency and less resource consumption of QPBFT compared with PBFT.
实用拜占庭容错(PBFT)是一种可选的共识协议,适用于需要强一致性的联盟区块链场景。但是,它也不可避免地带来了高能耗、低效率和可扩展性差的问题。更重要的是,共识节点的可靠性不能由自身保证。针对这些问题,本文提出了实用的基于量化角色的拜占庭共识算法(QPBFT),可以实现以下优势:(1)提高区块链的安全性和可靠性。采用层次分析法(AHP)对节点的可靠性属性进行量化,通过引入量化角色,可靠性评价得分高的节点更有可能参与区块生产,从而保证区块链网络的可靠性;(2)实现高效率、低能耗。采用投票机制,简化和优化PBFT共识过程;(3)实现对动态网络环境的适应。根据节点可靠性评估评分动态调整管理节点、投票节点、候选节点和普通节点,优化共识性能。本文论证了该系统的安全特性,包括可靠性和容错性。同时,通过仿真实验验证了QPBFT比PBFT具有更高的效率和更少的资源消耗。
{"title":"QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role","authors":"Zhujun Zhang, Dali Zhu, Weiping Fan","doi":"10.1109/TrustCom50675.2020.00132","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00132","url":null,"abstract":"Practical Byzantine Fault Tolerance (PBFT) is an optional consensus protocol for consortium blockchains scenarios where strong consistency is required. However, it also inevitably incurs high energy consumption, low efficiency and poor scalability. What is more, the reliability of the consensus node cannot be guaranteed by itself. For addressing these problems, this paper proposes practical byzantine consensus algorithm based on quantified-role (QPBFT), which can achieve the following advantages: (1) Improving the security and reliability of the blockchain. The reliability attributes of nodes are quantified based on analytic hierarchy process (AHP), those nodes with high reliability evaluation scores are more likely to participate in block production by introduction of the quantified-role, which can ensure the reliability of blockchain network; (2) Realizing high efficiency and low energy consumption. Voting mechanism is adopted to simplify and optimize the PBFT consensus process; (3) Implementing adaptation to dynamic network environments. Management nodes, voting nodes, candidate nodes, and ordinary nodes are dynamically adjusted according to node reliability evaluation score for optimizing consensus performance. The paper demonstrates the security feature including reliability and fault tolerance. Meanwhile, simulation experiments are conducted to validate the higher efficiency and less resource consumption of QPBFT compared with PBFT.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116769254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Policy Evaluation and Dynamic Management Based on Matching Tree for XACML 基于匹配树的XACML策略评估与动态管理
Hongzhaoning Kang, Gang Liu, Quan Wang, Runnan Zhang, Zichao Zhong, Yu-min Tian
As a widely recognized policy language of access control, the eXtensible Access Control Markup Language (XACML) is widely used with its fine-grained and easy-to-read. With the application of XACML, researchers find that the XACML based policy evaluation and policy management methods can no longer meet the current large-scale requests for efficient access and dynamic management requirements. To improve the performance of policy evaluation based on XACML, we propose a policy evaluation method based on the matching tree to search policy efficiently and avoid the extra consumption of invalid policy participation. Furthermore, we propose a policy dynamic management method based on the matching tree to reduce the scale of the policy to be disabled for management, by adding locks in the tree node and the information mapping table. Through theoretical derivation and the factors that may affect its evaluation performance, we verify the improvement of evaluation efficiency. The simulation also shows the improvement of the evaluation engine based on the matching tree compared with OuenAz.
XACML (eXtensible access control Markup language,可扩展访问控制标记语言)是一种被广泛认可的访问控制策略语言,它具有细粒度和易于阅读的特点,被广泛使用。随着XACML的应用,研究人员发现基于XACML的策略评估和策略管理方法已经不能满足当前大规模高效访问和动态管理的要求。为了提高基于XACML的策略评估性能,提出了一种基于匹配树的策略评估方法,有效地搜索策略,避免了无效策略参与的额外消耗。在此基础上,提出了一种基于匹配树的策略动态管理方法,通过在树节点和信息映射表中添加锁,减少了待禁用策略管理的规模。通过理论推导和可能影响其评价绩效的因素,验证了评价效率的提高。仿真结果表明,基于匹配树的评价引擎与OuenAz相比有了很大的改进。
{"title":"Policy Evaluation and Dynamic Management Based on Matching Tree for XACML","authors":"Hongzhaoning Kang, Gang Liu, Quan Wang, Runnan Zhang, Zichao Zhong, Yu-min Tian","doi":"10.1109/TrustCom50675.2020.00209","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00209","url":null,"abstract":"As a widely recognized policy language of access control, the eXtensible Access Control Markup Language (XACML) is widely used with its fine-grained and easy-to-read. With the application of XACML, researchers find that the XACML based policy evaluation and policy management methods can no longer meet the current large-scale requests for efficient access and dynamic management requirements. To improve the performance of policy evaluation based on XACML, we propose a policy evaluation method based on the matching tree to search policy efficiently and avoid the extra consumption of invalid policy participation. Furthermore, we propose a policy dynamic management method based on the matching tree to reduce the scale of the policy to be disabled for management, by adding locks in the tree node and the information mapping table. Through theoretical derivation and the factors that may affect its evaluation performance, we verify the improvement of evaluation efficiency. The simulation also shows the improvement of the evaluation engine based on the matching tree compared with OuenAz.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127161494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness 无随机性分片区块链的安全分片重构协议
Yizhong Liu, Jianwei Liu, Yiming Hei, W. Tan, Qianhong Wu
In permissionless blockchains, due to the corruption attack of an adversary, nodes participating the protocol need to be updated regularly. In the process of node selection and committee reconfiguration, there may exist some problems. First, a complicated secure randomness generation protocol is in need. Besides, an adversary might obtain a mining puzzle in advance and start mining in ahead of honest nodes. Moreover, an adversary usually has an advantage of network delay. In order to solve the above problems, we conduct the following research. Firstly, we propose a PoW solution withhold attack against PoW-based member selection methods. An adversary might withhold his mining results in an epoch to obtain the mining puzzle of the next epoch in advance of honest nodes. Secondly, a secure shard reconfiguration protocol is designed, which does not rely on any complicated randomness generation protocol. Our shard reconfiguration protocol is proved rigorously to be secure, which means that in each selected committee, the honest node fraction exceeds a predefined target value. Thirdly, we implement our shard reconfiguration protocol. By carefully setting related system parameters, our protocol could be applied easily to most sharding blockchains. To our best knowledge, the shard reconfiguration protocol proposed in this paper is the first protocol that could safely implement node selection and committee reconfiguration of a sharding blockchain without using a secure randomness, which greatly reduces the communication and time overhead caused by the generation of a randomness.
在无许可区块链中,由于对手的破坏攻击,参与协议的节点需要定期更新。在节点选择和委员会重构过程中,可能存在一些问题。首先,需要一个复杂的安全的随机生成协议。此外,对手可能提前获得挖掘谜题,并在诚实节点之前开始挖掘。此外,攻击者通常具有网络延迟的优势。为了解决上述问题,我们进行了以下研究。首先,我们提出了一种针对基于PoW的成员选择方法的PoW解决方案。对手可能会在一个时代保留他的挖掘结果,以便在诚实节点之前获得下一个时代的挖掘谜题。其次,设计了一种安全的分片重构协议,该协议不依赖于任何复杂的随机生成协议。我们的分片重构协议被严格证明是安全的,这意味着在每个选定的委员会中,诚实节点分数超过预定义的目标值。第三,我们实现了分片重构协议。通过仔细设置相关的系统参数,我们的协议可以很容易地应用于大多数分片区块链。据我们所知,本文提出的分片重构协议是第一个可以在不使用安全随机性的情况下安全地实现分片区块链的节点选择和委员会重构的协议,大大减少了随机性产生带来的通信开销和时间开销。
{"title":"A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness","authors":"Yizhong Liu, Jianwei Liu, Yiming Hei, W. Tan, Qianhong Wu","doi":"10.1109/TrustCom50675.2020.00135","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00135","url":null,"abstract":"In permissionless blockchains, due to the corruption attack of an adversary, nodes participating the protocol need to be updated regularly. In the process of node selection and committee reconfiguration, there may exist some problems. First, a complicated secure randomness generation protocol is in need. Besides, an adversary might obtain a mining puzzle in advance and start mining in ahead of honest nodes. Moreover, an adversary usually has an advantage of network delay. In order to solve the above problems, we conduct the following research. Firstly, we propose a PoW solution withhold attack against PoW-based member selection methods. An adversary might withhold his mining results in an epoch to obtain the mining puzzle of the next epoch in advance of honest nodes. Secondly, a secure shard reconfiguration protocol is designed, which does not rely on any complicated randomness generation protocol. Our shard reconfiguration protocol is proved rigorously to be secure, which means that in each selected committee, the honest node fraction exceeds a predefined target value. Thirdly, we implement our shard reconfiguration protocol. By carefully setting related system parameters, our protocol could be applied easily to most sharding blockchains. To our best knowledge, the shard reconfiguration protocol proposed in this paper is the first protocol that could safely implement node selection and committee reconfiguration of a sharding blockchain without using a secure randomness, which greatly reduces the communication and time overhead caused by the generation of a randomness.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125712450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Revocable Attribute-Based Encryption with Hidden Policies 具有隐藏策略的高效可撤销的基于属性的加密
Dominik Ziegler, Alexander Marsalek
We present a novel Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, which bridges the gap between highly dynamic (industrial) environments and resource-constrained devices. Our construction combines outsourced-decryption, hidden policies and revocation to cope with the requirements posed by such environments. In contrast to existing schemes, which typically rely on composite order bilinear groups, we present a scheme in prime order groups. The resulting scheme is more efficient as it relies on smaller group orders. We prove our scheme is secure under the Symmetric External Diffie-Hellman (SXDH) assumption. Lastly, we compare our scheme against existing schemes and provide timing results of our software implementation. Our evaluation shows that the proposed scheme is flexible enough for the targeted environment while improving performance by an order of magnitude.
我们提出了一种新的基于密文策略属性的加密(CP-ABE)方案,它弥合了高度动态(工业)环境和资源受限设备之间的差距。我们的结构结合了外包解密、隐藏策略和撤销,以应对这种环境带来的需求。相对于现有的依赖于复合阶双线性群的方案,我们提出了一种基于素阶群的方案。由此产生的方案更有效,因为它依赖于较小的组订单。在对称外部Diffie-Hellman (SXDH)假设下证明了该方案的安全性。最后,将本方案与现有方案进行了比较,并给出了软件实现的时序结果。我们的评估表明,所提出的方案对于目标环境具有足够的灵活性,同时将性能提高了一个数量级。
{"title":"Efficient Revocable Attribute-Based Encryption with Hidden Policies","authors":"Dominik Ziegler, Alexander Marsalek","doi":"10.1109/TrustCom50675.2020.00226","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00226","url":null,"abstract":"We present a novel Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, which bridges the gap between highly dynamic (industrial) environments and resource-constrained devices. Our construction combines outsourced-decryption, hidden policies and revocation to cope with the requirements posed by such environments. In contrast to existing schemes, which typically rely on composite order bilinear groups, we present a scheme in prime order groups. The resulting scheme is more efficient as it relies on smaller group orders. We prove our scheme is secure under the Symmetric External Diffie-Hellman (SXDH) assumption. Lastly, we compare our scheme against existing schemes and provide timing results of our software implementation. Our evaluation shows that the proposed scheme is flexible enough for the targeted environment while improving performance by an order of magnitude.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cross Platform IoT- Malware Family Classification based on Printable Strings 跨平台物联网-基于可打印字符串的恶意软件家族分类
Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue
In this era of rapid network development, Internet of Things (IoT) security considerations receive a lot of attention from both the research and commercial sectors. With limited computation resource, unfriendly interface, and poor software implementation, legacy IoT devices are vulnerable to many infamous mal ware attacks. Moreover, the heterogeneity of IoT platforms and the diversity of IoT malware make the detection and classification of IoT malware even more challenging. In this paper, we propose to use printable strings as an easy-to-get but effective cross-platform feature to identify IoT malware on different IoT platforms. The discriminating capability of these strings are verified using a set of machine learning algorithms on malware family classification across different platforms. The proposed scheme shows a 99% accuracy on a large scale IoT malware dataset consisted of 120K executable fils in executable and linkable format when the training and test are done on the same platform. Meanwhile, it also achieves a 96% accuracy when training is carried out on a few popular IoT platforms but test is done on different platforms. Efficient malware prevention and mitigation solutions can be enabled based on the proposed method to prevent and mitigate IoT malware damages across different platforms.
在这个网络快速发展的时代,物联网(IoT)的安全问题受到了研究和商业部门的广泛关注。由于有限的计算资源、不友好的接口和糟糕的软件实现,传统的物联网设备容易受到许多臭名昭著的恶意软件攻击。此外,物联网平台的异质性和物联网恶意软件的多样性使得物联网恶意软件的检测和分类更具挑战性。在本文中,我们建议使用可打印字符串作为易于获取但有效的跨平台功能来识别不同物联网平台上的物联网恶意软件。使用一组机器学习算法在不同平台的恶意软件家族分类上验证了这些字符串的判别能力。当训练和测试在同一平台上进行时,所提出的方案在由120K可执行文件组成的可执行和可链接格式的大规模物联网恶意软件数据集上显示出99%的准确率。同时,当在几个流行的物联网平台上进行训练,但在不同的平台上进行测试时,它也达到了96%的准确率。基于所提出的方法,可以实现有效的恶意软件预防和缓解解决方案,以防止和减轻跨不同平台的物联网恶意软件损害。
{"title":"Cross Platform IoT- Malware Family Classification based on Printable Strings","authors":"Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, D. Inoue","doi":"10.1109/TrustCom50675.2020.00106","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00106","url":null,"abstract":"In this era of rapid network development, Internet of Things (IoT) security considerations receive a lot of attention from both the research and commercial sectors. With limited computation resource, unfriendly interface, and poor software implementation, legacy IoT devices are vulnerable to many infamous mal ware attacks. Moreover, the heterogeneity of IoT platforms and the diversity of IoT malware make the detection and classification of IoT malware even more challenging. In this paper, we propose to use printable strings as an easy-to-get but effective cross-platform feature to identify IoT malware on different IoT platforms. The discriminating capability of these strings are verified using a set of machine learning algorithms on malware family classification across different platforms. The proposed scheme shows a 99% accuracy on a large scale IoT malware dataset consisted of 120K executable fils in executable and linkable format when the training and test are done on the same platform. Meanwhile, it also achieves a 96% accuracy when training is carried out on a few popular IoT platforms but test is done on different platforms. Efficient malware prevention and mitigation solutions can be enabled based on the proposed method to prevent and mitigate IoT malware damages across different platforms.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks 从漏洞评分框架评估安全度量的可靠性
Joe Frederick Samuel, Khalil Aalab, Jason Jaskolka
Over the years, a number of vulnerability scoring frameworks have been proposed to characterize the severity of known vulnerabilities in software-dependent systems. These frameworks provide security metrics to support decision-making in system development and security evaluation and assurance activities. When used in this context, it is imperative that these security metrics be sound, meaning that they can be consistently measured in a reproducible, objective, and unbiased fashion while providing contextually relevant, actionable information for decision makers. In this paper, we evaluate the soundness of the security metrics obtained via several vulnerability scoring frameworks. The evaluation is based on the Method for Designing Sound Security Metrics (MDSSM). We also present several recommendations to improve vulnerability scoring frameworks to yield more sound security metrics to support the development of secure software-dependent systems.
多年来,已经提出了许多漏洞评分框架来描述软件依赖系统中已知漏洞的严重程度。这些框架提供安全度量来支持系统开发和安全评估及保证活动中的决策。当在此上下文中使用时,这些安全度量必须是可靠的,这意味着它们可以以可重复的、客观的和无偏见的方式进行一致的度量,同时为决策者提供与上下文相关的、可操作的信息。在本文中,我们评估了通过几个漏洞评分框架获得的安全度量的可靠性。该评估基于设计健全安全度量方法(MDSSM)。我们还提出了一些改进漏洞评分框架的建议,以产生更可靠的安全度量,以支持安全软件依赖系统的开发。
{"title":"Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks","authors":"Joe Frederick Samuel, Khalil Aalab, Jason Jaskolka","doi":"10.1109/TrustCom50675.2020.00067","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00067","url":null,"abstract":"Over the years, a number of vulnerability scoring frameworks have been proposed to characterize the severity of known vulnerabilities in software-dependent systems. These frameworks provide security metrics to support decision-making in system development and security evaluation and assurance activities. When used in this context, it is imperative that these security metrics be sound, meaning that they can be consistently measured in a reproducible, objective, and unbiased fashion while providing contextually relevant, actionable information for decision makers. In this paper, we evaluate the soundness of the security metrics obtained via several vulnerability scoring frameworks. The evaluation is based on the Method for Designing Sound Security Metrics (MDSSM). We also present several recommendations to improve vulnerability scoring frameworks to yield more sound security metrics to support the development of secure software-dependent systems.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125015811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reversible data hiding based on improved rhombus predictor and prediction error expansion 基于改进菱形预测器和预测误差扩展的可逆数据隐藏
Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xin-yi Lü
Rhombus predictor is an effective technique to achieve prediction error expansion based reversible data hiding. Considering the correlation of adjacent pixels, it achieves high performance prediction of the central pixel with the help of its surrounding four pixels in a rhombus cell. However, for cells with large fluctuation, such correlation is rather weak, leading to poor accuracy of prediction. In this paper, we propose a reversible data hiding scheme based on improved rhombus predictor, which takes the lead to consider consistencies along horizontal, vertical and diagonal directions of the rhombus cell simultaneously so that pixels with higher consistency are employed together to make up the predictor. To reduce the prediction error once watermark bits are not fully embedded, we further present a corresponding fluctuation based sorting strategy. The experimental results show that, with the same amount of watermark bits embedded, the proposed scheme is able to achieve better performance comparing with the classic scheme and the state-of-the art.
菱形预测器是实现基于可逆数据隐藏的预测误差扩展的有效技术。考虑到相邻像素之间的相关性,该算法利用菱形单元中中心像素周围的4个像素,实现了对中心像素的高性能预测。但对于波动较大的细胞,这种相关性较弱,导致预测精度较差。本文提出了一种基于改进的菱形预测器的可逆数据隐藏方案,该方案首先同时考虑了菱形单元在水平、垂直和对角线方向上的一致性,从而将一致性较高的像素一起组成预测器。为了降低水印位未完全嵌入时的预测误差,我们进一步提出了相应的基于波动的排序策略。实验结果表明,在嵌入水印比特数相同的情况下,该方案比经典方案和现有方案具有更好的性能。
{"title":"Reversible data hiding based on improved rhombus predictor and prediction error expansion","authors":"Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xin-yi Lü","doi":"10.1109/TrustCom50675.2020.00016","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00016","url":null,"abstract":"Rhombus predictor is an effective technique to achieve prediction error expansion based reversible data hiding. Considering the correlation of adjacent pixels, it achieves high performance prediction of the central pixel with the help of its surrounding four pixels in a rhombus cell. However, for cells with large fluctuation, such correlation is rather weak, leading to poor accuracy of prediction. In this paper, we propose a reversible data hiding scheme based on improved rhombus predictor, which takes the lead to consider consistencies along horizontal, vertical and diagonal directions of the rhombus cell simultaneously so that pixels with higher consistency are employed together to make up the predictor. To reduce the prediction error once watermark bits are not fully embedded, we further present a corresponding fluctuation based sorting strategy. The experimental results show that, with the same amount of watermark bits embedded, the proposed scheme is able to achieve better performance comparing with the classic scheme and the state-of-the art.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125301896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach 基于频域水印的深度神经网络知识产权保护
Meng Li, Qi Zhong, L. Zhang, Yajuan Du, Jinchao Zhang, Yong Xiangt
Similar to other digital assets, deep neural network (DNN) models could suffer from piracy threat initiated by insider and/or outsider adversaries due to their inherent commercial value. DNN watermarking is a promising technique to mitigate this threat to intellectual property. This work focuses on black-box DNN watermarking, with which an owner can only verify his ownership by issuing special trigger queries to a remote suspicious model. However, informed attackers, who are aware of the watermark and somehow obtain the triggers, could forge fake triggers to claim their ownerships since the poor robustness of triggers and the lack of correlation between the model and the owner identity. This consideration calls for new watermarking methods that can achieve better trade-off for addressing the discrepancy. In this paper, we exploit frequency domain image watermarking to generate triggers and build our DNN watermarking algorithm accordingly. Since watermarking in the frequency domain is high concealment and robust to signal processing operation, the proposed algorithm is superior to existing schemes in resisting fraudulent claim attack. Besides, extensive experimental results on 3 datasets and 8 neural networks demonstrate that the proposed DNN watermarking algorithm achieves similar performance on functionality metrics and better performance on security metrics when compared with existing algorithms.
与其他数字资产类似,深度神经网络(DNN)模型由于其固有的商业价值,可能会受到内部和/或外部对手发起的盗版威胁。深度神经网络水印是一种很有前途的技术,可以减轻这种对知识产权的威胁。这项工作的重点是黑盒DNN水印,使用该水印,所有者只能通过向远程可疑模型发出特殊触发查询来验证其所有权。然而,知情的攻击者知道水印并以某种方式获得触发器,由于触发器的鲁棒性差,并且模型与所有者身份缺乏相关性,可以伪造假触发器来声明其所有权。考虑到这一点,需要新的水印方法来实现更好的权衡,以解决差异。在本文中,我们利用频域图像水印来生成触发器,并相应地构建我们的深度神经网络水印算法。由于频域水印具有较高的隐蔽性和对信号处理操作的鲁棒性,该算法在抵御欺诈性索赔攻击方面优于现有算法。此外,在3个数据集和8个神经网络上的大量实验结果表明,与现有算法相比,本文提出的DNN水印算法在功能指标上具有相似的性能,在安全指标上具有更好的性能。
{"title":"Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach","authors":"Meng Li, Qi Zhong, L. Zhang, Yajuan Du, Jinchao Zhang, Yong Xiangt","doi":"10.1109/TrustCom50675.2020.00062","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00062","url":null,"abstract":"Similar to other digital assets, deep neural network (DNN) models could suffer from piracy threat initiated by insider and/or outsider adversaries due to their inherent commercial value. DNN watermarking is a promising technique to mitigate this threat to intellectual property. This work focuses on black-box DNN watermarking, with which an owner can only verify his ownership by issuing special trigger queries to a remote suspicious model. However, informed attackers, who are aware of the watermark and somehow obtain the triggers, could forge fake triggers to claim their ownerships since the poor robustness of triggers and the lack of correlation between the model and the owner identity. This consideration calls for new watermarking methods that can achieve better trade-off for addressing the discrepancy. In this paper, we exploit frequency domain image watermarking to generate triggers and build our DNN watermarking algorithm accordingly. Since watermarking in the frequency domain is high concealment and robust to signal processing operation, the proposed algorithm is superior to existing schemes in resisting fraudulent claim attack. Besides, extensive experimental results on 3 datasets and 8 neural networks demonstrate that the proposed DNN watermarking algorithm achieves similar performance on functionality metrics and better performance on security metrics when compared with existing algorithms.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Name-Signature Lookup System: A Security Enhancement to Named Data Networking 名称签名查找系统:命名数据网络的安全增强
Zhicheng Song, Pushpendu Kar
Named Data Networking (NDN) is a content-centric networking, where the publisher of the packet signs and encapsulates the data packet with a name-content-signature encryption to verify the authenticity and integrity of itself. This scheme can solve many of the security issues inherently compared to IP networking. NDN also support mobility since it hides the point-to-point connection details. However, an extreme attack takes place when an NDN consumer newly connects to a network. A Man-in-the-middle (MITM) malicious node can block the consumer and keep intercepting the interest packets sent out so as to fake the corresponding data packets signed with its own private key. Without knowledge and trust to the network, the NDN consumer can by no means perceive the attack and thus exposed to severe security and privacy hazard. In this paper, the N ame-Signature Lookup System (NSLS) and corresponding Name-Signature Lookup Protocol (NSLP) is introduced to verify packets with their registered genuine publisher even in an untrusted network with the help of embedded keys inside Network Interface Controller (NIC), by which attacks like MITM is eliminated. A theoretical analysis of comparing NSLS with existing security model is provided. Digest algorithm SHA-256 and signature algorithm RSA are used in the NSLP model without specific preference.
命名数据网络(Named Data Networking, NDN)是一种以内容为中心的网络,数据包的发布者使用名称-内容-签名加密对数据包进行签名和封装,以验证自身的真实性和完整性。与IP网络相比,该方案可以解决许多固有的安全问题。NDN还支持移动性,因为它隐藏了点对点连接的细节。但是,当NDN使用者新连接到网络时,就会发生极端攻击。中间人(Man-in-the-middle, MITM)恶意节点可以阻断消费者并不断拦截发送出去的兴趣包,从而伪造出用自己的私钥签名的相应数据包。没有对网络的了解和信任,NDN消费者根本无法感知攻击,从而面临严重的安全和隐私风险。本文引入N名称签名查找系统(NSLS)和相应的名称签名查找协议(NSLP),利用网络接口控制器(NIC)内的嵌入式密钥,在不可信网络中与注册的正版发布者验证数据包,从而消除了MITM等攻击。对NSLS与现有安全模型进行了比较分析。NSLP模型使用摘要算法SHA-256和签名算法RSA,没有特定的优先级。
{"title":"Name-Signature Lookup System: A Security Enhancement to Named Data Networking","authors":"Zhicheng Song, Pushpendu Kar","doi":"10.1109/TrustCom50675.2020.00194","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00194","url":null,"abstract":"Named Data Networking (NDN) is a content-centric networking, where the publisher of the packet signs and encapsulates the data packet with a name-content-signature encryption to verify the authenticity and integrity of itself. This scheme can solve many of the security issues inherently compared to IP networking. NDN also support mobility since it hides the point-to-point connection details. However, an extreme attack takes place when an NDN consumer newly connects to a network. A Man-in-the-middle (MITM) malicious node can block the consumer and keep intercepting the interest packets sent out so as to fake the corresponding data packets signed with its own private key. Without knowledge and trust to the network, the NDN consumer can by no means perceive the attack and thus exposed to severe security and privacy hazard. In this paper, the N ame-Signature Lookup System (NSLS) and corresponding Name-Signature Lookup Protocol (NSLP) is introduced to verify packets with their registered genuine publisher even in an untrusted network with the help of embedded keys inside Network Interface Controller (NIC), by which attacks like MITM is eliminated. A theoretical analysis of comparing NSLS with existing security model is provided. Digest algorithm SHA-256 and signature algorithm RSA are used in the NSLP model without specific preference.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122235994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1