首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Telecommunication traffic through submarine cables: Security and vulnerabilities 海底电缆通信:安全性和脆弱性
Aisha Suliaman Alazri
This paper highlight the idea of submarine cables and its security trends. At the beginning , history of cables and its development have been introduced. The main structure of fiber optic have been discussed as well. Finally, threats and vulnerabilities of submarine cable introduced in details and supported by examples from the world such as natural disaster and habitats, commercial fishing, anchoring, oil and gas development.
本文重点介绍了海底电缆的思想及其安全发展趋势。首先,介绍了电缆的历史及其发展。并对光纤的主要结构进行了讨论。最后,详细介绍了海底电缆的威胁和脆弱性,并以自然灾害和栖息地、商业捕鱼、锚泊、油气开发等世界实例为佐证。
{"title":"Telecommunication traffic through submarine cables: Security and vulnerabilities","authors":"Aisha Suliaman Alazri","doi":"10.1109/ICITST.2016.7856733","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856733","url":null,"abstract":"This paper highlight the idea of submarine cables and its security trends. At the beginning , history of cables and its development have been introduced. The main structure of fiber optic have been discussed as well. Finally, threats and vulnerabilities of submarine cable introduced in details and supported by examples from the world such as natural disaster and habitats, commercial fishing, anchoring, oil and gas development.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experience-based learning for identifying sub-regions in Wireless Sensor Networks 基于经验的无线传感器网络子区域识别方法
Aiman Ghannami, C. Shao
In this paper, we propose a novel mechanism to calculate sub-regions (overlapped areas) in Wireless Sensor networks (WSNs). As the major part of WSN tasks are monitoring and reporting events in sensors' sensing range, those reported events' locations can be used, by means of convex hulls, to accumulatively learn the boundaries of those overlapped areas between the ranges of sensors. Although the proposed mechanism targeted clustered networks, the mechanism also can be used with non-clustered networks. Besides, the proposed method provides two levels of abstraction, the first level is the selection of the proper algorithm to calculate convex hulls, and the second is the selection of the clustering algorithm at implementation time. The main contribution of this work is to provide a new perspective to solve this problem in WSNs and new avenues for future research.
在本文中,我们提出了一种新的机制来计算无线传感器网络(WSNs)中的子区域(重叠区域)。由于WSN的主要任务是监测和报告传感器感知范围内的事件,因此可以利用这些报告事件的位置,通过凸包的方法来累积学习传感器范围之间重叠区域的边界。虽然提出的机制针对的是集群网络,但该机制也适用于非集群网络。此外,该方法提供了两个层次的抽象,第一级是选择合适的算法来计算凸包,第二级是在实现时选择聚类算法。本工作的主要贡献是为解决这一问题提供了一个新的视角,并为未来的研究提供了新的途径。
{"title":"Experience-based learning for identifying sub-regions in Wireless Sensor Networks","authors":"Aiman Ghannami, C. Shao","doi":"10.1109/ICITST.2016.7856722","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856722","url":null,"abstract":"In this paper, we propose a novel mechanism to calculate sub-regions (overlapped areas) in Wireless Sensor networks (WSNs). As the major part of WSN tasks are monitoring and reporting events in sensors' sensing range, those reported events' locations can be used, by means of convex hulls, to accumulatively learn the boundaries of those overlapped areas between the ranges of sensors. Although the proposed mechanism targeted clustered networks, the mechanism also can be used with non-clustered networks. Besides, the proposed method provides two levels of abstraction, the first level is the selection of the proper algorithm to calculate convex hulls, and the second is the selection of the clustering algorithm at implementation time. The main contribution of this work is to provide a new perspective to solve this problem in WSNs and new avenues for future research.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack 一种抗伽玛校正攻击的低失真QR码数字彩色图像水印方案
Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez
The use of Internet and new technologies have changed the way in which digital content is provided, unfortunately due to the ease with which such data can be copied and modified, the illegal copying of digital content has been notably increased. This problem has created the need to protect digital content to avoid the illegal use and handling of such information. The watermarking is one of the most popular technologies focused on copyright protection. This technique involves inserting a message that contains information about the copyright owner. An alternative for storing this information is the use of QR Codes (Quick Response Codes) whose maximum symbol size can encoding 4296 alphanumeric data. This paper presents a Rational Dither Modulation based watermarking scheme for QR code embedding into color images. Each watermarked image was measured with the PSNR, SSIM and MSE. Results showed that the obtained values of the used measured were into the valid ranges. Also, the proposed scheme shows robustness to gamma correction attack.
互联网和新技术的使用改变了提供数字内容的方式,不幸的是,由于这些数据很容易被复制和修改,非法复制数字内容的情况明显增加。这个问题产生了保护数字内容的需要,以避免非法使用和处理这些信息。水印技术是目前版权保护领域最流行的技术之一。该技术涉及插入包含有关版权所有者信息的消息。存储这些信息的另一种方法是使用QR码(快速响应码),其最大符号大小可以编码4296个字母数字数据。提出了一种基于理性抖动调制的彩色图像QR码嵌入水印方案。用PSNR、SSIM和MSE测量每幅水印图像。结果表明,所得到的测量值均在有效范围内。同时,该方案对伽马校正攻击具有较强的鲁棒性。
{"title":"A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack","authors":"Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez","doi":"10.1109/ICITST.2016.7856659","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856659","url":null,"abstract":"The use of Internet and new technologies have changed the way in which digital content is provided, unfortunately due to the ease with which such data can be copied and modified, the illegal copying of digital content has been notably increased. This problem has created the need to protect digital content to avoid the illegal use and handling of such information. The watermarking is one of the most popular technologies focused on copyright protection. This technique involves inserting a message that contains information about the copyright owner. An alternative for storing this information is the use of QR Codes (Quick Response Codes) whose maximum symbol size can encoding 4296 alphanumeric data. This paper presents a Rational Dither Modulation based watermarking scheme for QR code embedding into color images. Each watermarked image was measured with the PSNR, SSIM and MSE. Results showed that the obtained values of the used measured were into the valid ranges. Also, the proposed scheme shows robustness to gamma correction attack.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features 使用轻量级功能提高基于搜索引擎的反网络钓鱼解决方案的准确性
G. Varshney, M. Misra, P. Atrey
A drawback of the Search Engine (SE) based anti-phishing technique is that authentic websites that are newly launched over the web are classified as phishing websites due to their low ranking. This causes a noticeable reduction in the True Negative Rate (TNR) of such schemes. Some SE based techniques use other complex anti-phishing techniques or features in combination to increase the TNR which results in higher accuracy. However, such an addition dilutes the importance of SE based techniques, which are intended to make anti-phishing lightweight, client side implementable and efficient. In this paper, we study a set of lightweight features including https, digits in domain name and Google Safe Browsing (GSB) API check, and the effect of their addition to the results of a SE based solution. An eventual effect on the accuracy of the existing SE based schemes is also reflected in this paper. A total shift of nearly 96% from False Positive Rate (FPR) to TNR is recorded with a slight decrease of 0.1% in True Positive Rate (TPR), thus increasing the accuracy by 3.28%.
基于搜索引擎(SE)的反钓鱼技术的缺点是,在网络上新推出的真实网站由于排名较低而被归类为钓鱼网站。这导致此类计划的真负率(TNR)显著降低。一些基于SE的技术结合使用其他复杂的反网络钓鱼技术或特性来增加TNR,从而提高准确性。然而,这样的添加削弱了基于SE的技术的重要性,这些技术旨在使反网络钓鱼变得轻量级、客户端可实现且高效。在本文中,我们研究了一组轻量级特性,包括https,域名中的数字和谷歌安全浏览(GSB) API检查,以及它们的加入对基于SE的解决方案的结果的影响。本文还反映了对现有基于SE的方案的精度的最终影响。从假阳性率(False Positive Rate, FPR)到TNR的总偏移量接近96%,而真阳性率(True Positive Rate, TPR)略有下降0.1%,从而提高了3.28%的准确率。
{"title":"Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features","authors":"G. Varshney, M. Misra, P. Atrey","doi":"10.1109/ICITST.2016.7856731","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856731","url":null,"abstract":"A drawback of the Search Engine (SE) based anti-phishing technique is that authentic websites that are newly launched over the web are classified as phishing websites due to their low ranking. This causes a noticeable reduction in the True Negative Rate (TNR) of such schemes. Some SE based techniques use other complex anti-phishing techniques or features in combination to increase the TNR which results in higher accuracy. However, such an addition dilutes the importance of SE based techniques, which are intended to make anti-phishing lightweight, client side implementable and efficient. In this paper, we study a set of lightweight features including https, digits in domain name and Google Safe Browsing (GSB) API check, and the effect of their addition to the results of a SE based solution. An eventual effect on the accuracy of the existing SE based schemes is also reflected in this paper. A total shift of nearly 96% from False Positive Rate (FPR) to TNR is recorded with a slight decrease of 0.1% in True Positive Rate (TPR), thus increasing the accuracy by 3.28%.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning History Transition Graphs for understanding the programming learning situations 学习历史过渡图用于理解编程学习情况
H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera
This research project aims at enabling easier understanding of a learning situation on the basis of a student's learning process (compile error history) in programming exercise currently conducted at universities. We express transition of learning history of a student in graph form of time series (we call it Learning History Transition Graph (LHTG)). Facilitators or a learner can refer to an LHTG along with additional information regarding the learner. Moreover, this paper describes a prototype of the support system for grasping the learning situation introducing LHTG along with the flow of our support. Application of this system enables a novel learning support with an emphasis on context.
这个研究项目的目的是使学生更容易理解目前在大学进行的编程练习的学习过程(编译错误历史)的基础上的学习情况。我们用时间序列的图形形式来表示学生学习历史的过渡(我们称之为学习历史过渡图(LHTG))。辅导员或学习者可以参考LHTG以及有关学习者的其他信息。此外,本文还描述了一个用于掌握学习情况的支持系统的原型,并介绍了LHTG以及我们的支持流程。该系统的应用提供了一种强调上下文的新颖学习支持。
{"title":"Learning History Transition Graphs for understanding the programming learning situations","authors":"H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera","doi":"10.1109/ICITST.2016.7856758","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856758","url":null,"abstract":"This research project aims at enabling easier understanding of a learning situation on the basis of a student's learning process (compile error history) in programming exercise currently conducted at universities. We express transition of learning history of a student in graph form of time series (we call it Learning History Transition Graph (LHTG)). Facilitators or a learner can refer to an LHTG along with additional information regarding the learner. Moreover, this paper describes a prototype of the support system for grasping the learning situation introducing LHTG along with the flow of our support. Application of this system enables a novel learning support with an emphasis on context.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks 基于集群的无线传感器网络智能动态连通性控制算法
S. M. Jameii, M. Maadani
Connectivity and energy efficiency are two important issues in wireless sensor networks. Clustering is a mechanism to organize the sensor nodes into clusters and manage the connectivity and energy consumption of the network. In this paper, we consider cluster-based wireless sensor network and propose a Connectivity Control Algorithm based on Learning Automata called CCALA. This algorithm dynamically adjusts the transmission radius of sensor nodes to maintain the desirable connectivity. The simulation results demonstrate the efficiency of the proposed algorithm in terms of average transmission radius of nodes, percentage of connected nodes, balanced energy consumption in the network and network lifetime.
连接和能源效率是无线传感器网络中的两个重要问题。聚类是一种将传感器节点组织成簇并管理网络连通性和能耗的机制。本文考虑基于集群的无线传感器网络,提出了一种基于学习自动机(CCALA)的连接控制算法。该算法动态调整传感器节点的传输半径以保持理想的连通性。仿真结果表明,该算法在节点平均传输半径、连接节点百分比、网络平衡能耗和网络生存时间等方面具有较高的效率。
{"title":"Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks","authors":"S. M. Jameii, M. Maadani","doi":"10.1109/ICITST.2016.7856744","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856744","url":null,"abstract":"Connectivity and energy efficiency are two important issues in wireless sensor networks. Clustering is a mechanism to organize the sensor nodes into clusters and manage the connectivity and energy consumption of the network. In this paper, we consider cluster-based wireless sensor network and propose a Connectivity Control Algorithm based on Learning Automata called CCALA. This algorithm dynamically adjusts the transmission radius of sensor nodes to maintain the desirable connectivity. The simulation results demonstrate the efficiency of the proposed algorithm in terms of average transmission radius of nodes, percentage of connected nodes, balanced energy consumption in the network and network lifetime.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure cloud distributed file system 安全的云分布式文件系统
Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang
Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be layered transparently on existing public cloud storage infrastructure. Our approach combines secret sharing and information dispersal algorithm with more flexible authentication and access control security measures to provide secure storage for enterprise data in the cloud. Our proposed architecture supports a clear separation of roles of storage owner and information owner.
传统的数据保护方法受到云的特定性质和体系结构的挑战。随着网络攻击者的日益成熟和密码分析技术的进步,仅靠加密已不足以确保数据安全。因此,需要一种更具适应性和灵活性的数据安全方法。在本文中,我们介绍了一个安全的分布式文件系统,它可以透明地分层在现有的公共云存储基础设施上。我们的方法将秘密共享和信息分散算法与更灵活的身份验证和访问控制安全措施相结合,为企业数据在云中提供安全存储。我们建议的体系结构支持存储所有者和信息所有者角色的清晰分离。
{"title":"Secure cloud distributed file system","authors":"Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang","doi":"10.1109/ICITST.2016.7856692","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856692","url":null,"abstract":"Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be layered transparently on existing public cloud storage infrastructure. Our approach combines secret sharing and information dispersal algorithm with more flexible authentication and access control security measures to provide secure storage for enterprise data in the cloud. Our proposed architecture supports a clear separation of roles of storage owner and information owner.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131603189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust chaos-based stream-cipher for secure public communication channels 用于安全公共通信信道的鲁棒混沌流密码
Ons Jallouli, S. E. Assad, M. Chetto
In this paper, we propose a novel stream cipher based on a chaotic system. In order to get the cipher text, the plain text is simply XORed with the key-stream generated by a strong pseudo chaotic number generator (PCNG). Then, all the security of the system is based on the used PCNG. The structure of the proposed PCNG includes two chaotic maps which are weakly coupled by a predefined matrix and integrates a swap function. The PCNG passes all statistical NIST's randomness tests. Also, analysis and experimental results show that the proposed stream cipher has a large key space, a high key sensitivity, and can resist against chosen-plaintext attack and chosen-ciphertext attack. Indeed, for each new execution of the system using the same secret key, the generated key-stream is different due to the IV-setup function. The computing performance of the proposed system is comparable to the main algorithms of eStream such as Rabbit and HC-128.
本文提出了一种新的基于混沌系统的流密码。为了获得密文,只需将明文与强伪混沌数发生器(PCNG)生成的密钥流进行xor即可。然后,系统的所有安全性都是基于使用的PCNG。所提出的PCNG结构包括两个混沌映射,它们通过预定义矩阵弱耦合并集成交换函数。PCNG通过所有统计NIST的随机性测试。分析和实验结果表明,所提出的流密码具有密钥空间大、密钥灵敏度高的特点,能够抵御选择明文攻击和选择密文攻击。实际上,对于使用相同密钥的系统的每次新执行,由于IV-setup功能,生成的密钥流是不同的。该系统的计算性能可与eStream的主要算法Rabbit和HC-128相媲美。
{"title":"Robust chaos-based stream-cipher for secure public communication channels","authors":"Ons Jallouli, S. E. Assad, M. Chetto","doi":"10.1109/ICITST.2016.7856658","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856658","url":null,"abstract":"In this paper, we propose a novel stream cipher based on a chaotic system. In order to get the cipher text, the plain text is simply XORed with the key-stream generated by a strong pseudo chaotic number generator (PCNG). Then, all the security of the system is based on the used PCNG. The structure of the proposed PCNG includes two chaotic maps which are weakly coupled by a predefined matrix and integrates a swap function. The PCNG passes all statistical NIST's randomness tests. Also, analysis and experimental results show that the proposed stream cipher has a large key space, a high key sensitivity, and can resist against chosen-plaintext attack and chosen-ciphertext attack. Indeed, for each new execution of the system using the same secret key, the generated key-stream is different due to the IV-setup function. The computing performance of the proposed system is comparable to the main algorithms of eStream such as Rabbit and HC-128.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Range query integrity in the cloud: the case of video surveillance 范围查询完整性在云:视频监控的情况
F. Buccafurri, G. Lax, S. Nicolazzo, Antonino Nocera
Cloud computing provides users with the possibility to store their data in third-party servers, but these data centers may be untrusted or susceptible to attacks. This issue becomes particularly crucial in the case a third-party cloud is used to store video surveillance data. A number of methods have been proposed in the literature to allow users to verify that query results are correct. However, in the considered scenario, in which efficiency is a critical factor, classical techniques for query integrity are little suitable. This paper proposes a new solution to overcome these drawbacks.
云计算为用户提供了将数据存储在第三方服务器上的可能性,但这些数据中心可能不受信任或容易受到攻击。在使用第三方云存储视频监控数据的情况下,这个问题变得尤为重要。文献中提出了许多方法来允许用户验证查询结果是否正确。然而,在考虑效率是关键因素的场景中,用于查询完整性的经典技术不太适合。本文提出了一种新的解决方案来克服这些缺点。
{"title":"Range query integrity in the cloud: the case of video surveillance","authors":"F. Buccafurri, G. Lax, S. Nicolazzo, Antonino Nocera","doi":"10.1109/ICITST.2016.7856691","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856691","url":null,"abstract":"Cloud computing provides users with the possibility to store their data in third-party servers, but these data centers may be untrusted or susceptible to attacks. This issue becomes particularly crucial in the case a third-party cloud is used to store video surveillance data. A number of methods have been proposed in the literature to allow users to verify that query results are correct. However, in the considered scenario, in which efficiency is a critical factor, classical techniques for query integrity are little suitable. This paper proposes a new solution to overcome these drawbacks.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System and Protocols for secure Intercloud Communications 安全云间通信的系统和协议
C. Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong
In recent years, there has been considerable interest in Intercloud. Inspired by the Internet, Intercloud allows clouds to be interconnected, forming a cloud/network of clouds. With Intercloud, many new and powerful cloud computing services can be provided. One of the basic problems with supporting Intercloud is the need to address the issue of how to ensure that clouds can communicate with each other effectively and efficiently. Inspired by the HyperText Transfer Protocol (HTTP), this paper presents an Intercloud Communications Protocol (ICCP). ICCP allows clouds to communicate with each other using a common protocol, which is transparent to the underlying application programming interfaces of different clouds. It also includes security functions to ensure confidentiality and integrity. Essentially, clouds can communicate with each other based on XML-based request/response messages in a secure manner. An Intercloud Gateway prototype has been developed to demonstrate the basic functionalities of the ICCP, such as transferring data objects securely. The proposed framework is expected to inspire innovative cloud computing services as well as pose challenging research problems.
近年来,人们对Intercloud产生了相当大的兴趣。受互联网的启发,Intercloud允许云相互连接,形成云/云网络。使用Intercloud,可以提供许多新的和强大的云计算服务。支持Intercloud的一个基本问题是需要解决如何确保云能够有效地相互通信的问题。本文在超文本传输协议(HTTP)的启发下,提出了一种云间通信协议(ICCP)。ICCP允许云使用公共协议相互通信,该协议对不同云的底层应用程序编程接口是透明的。它还包括安全功能,以确保机密性和完整性。从本质上讲,云可以基于基于xml的请求/响应消息以一种安全的方式相互通信。已经开发了一个云间网关原型来演示ICCP的基本功能,例如安全地传输数据对象。拟议的框架预计将激发创新的云计算服务,并提出具有挑战性的研究问题。
{"title":"System and Protocols for secure Intercloud Communications","authors":"C. Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong","doi":"10.1109/ICITST.2016.7856739","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856739","url":null,"abstract":"In recent years, there has been considerable interest in Intercloud. Inspired by the Internet, Intercloud allows clouds to be interconnected, forming a cloud/network of clouds. With Intercloud, many new and powerful cloud computing services can be provided. One of the basic problems with supporting Intercloud is the need to address the issue of how to ensure that clouds can communicate with each other effectively and efficiently. Inspired by the HyperText Transfer Protocol (HTTP), this paper presents an Intercloud Communications Protocol (ICCP). ICCP allows clouds to communicate with each other using a common protocol, which is transparent to the underlying application programming interfaces of different clouds. It also includes security functions to ensure confidentiality and integrity. Essentially, clouds can communicate with each other based on XML-based request/response messages in a secure manner. An Intercloud Gateway prototype has been developed to demonstrate the basic functionalities of the ICCP, such as transferring data objects securely. The proposed framework is expected to inspire innovative cloud computing services as well as pose challenging research problems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1