首页 > 最新文献

2015 IEEE Trustcom/BigDataSE/ISPA最新文献

英文 中文
You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data 你说得太多了:在众包环境数据中评估用户隐私
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.415
Julien Mineraud, Federico Lancerin, S. Balasubramaniam, M. Conti, S. Tarkoma
With the availability of inexpensive sensors, the attractiveness of participatory sensing has increased tremendously in the last decade. However, when sensing is performed with devices owned by individuals, it raises several privacy issues with respect to the data producers, and hence reduces the incentive to contribute to the services. In this paper, we evaluate the extent to which a malicious server in a crowdsourcing air quality monitoring service can track the locations of users that contribute to the service. The participants periodically send information, such as temperature, relative humidity, carbon monoxide, and luminosity of their surrounding, using an off-the-shelf sensor connected to their mobile phones. The participants also send their coarse-grain location (i.e., disclosing the ID of the cell tower to which their mobile is coupled) along with the air quality data. We evaluate the precision with which the attacker can track the participants using only air quality data and location of the cell tower. We perform a thorough analysis of the privacy attack and show that it can accurately discover the destination of the users with a precision of more than 85% (up to 97%), if at least five consecutive samples are provided by the participants. We also discovered that the precision drops when the environmental sensors are affected by outside conditions (e.g., exposition to direct sunlight) but remains significant (54.5% for 20 consecutive samples).
随着廉价传感器的出现,参与式传感的吸引力在过去十年中大大增加。然而,当使用个人拥有的设备进行传感时,它会引起数据生产者的几个隐私问题,从而减少了为服务做出贡献的动机。在本文中,我们评估了众包空气质量监测服务中的恶意服务器可以跟踪为该服务做出贡献的用户位置的程度。参与者定期发送信息,如温度、相对湿度、一氧化碳和周围的亮度,使用一个现成的传感器连接到他们的手机。参与者还会发送他们的粗粒度位置(即,披露他们的手机所连接的蜂窝塔的ID)以及空气质量数据。我们评估攻击者仅使用空气质量数据和手机信号塔位置跟踪参与者的精度。我们对隐私攻击进行了彻底的分析,并表明如果参与者提供至少五个连续的样本,它可以准确地发现用户的目的地,精度超过85%(高达97%)。我们还发现,当环境传感器受到外部条件(例如,暴露在阳光直射下)的影响时,精度会下降,但仍然显著(连续20个样本的54.5%)。
{"title":"You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental Data","authors":"Julien Mineraud, Federico Lancerin, S. Balasubramaniam, M. Conti, S. Tarkoma","doi":"10.1109/Trustcom.2015.415","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.415","url":null,"abstract":"With the availability of inexpensive sensors, the attractiveness of participatory sensing has increased tremendously in the last decade. However, when sensing is performed with devices owned by individuals, it raises several privacy issues with respect to the data producers, and hence reduces the incentive to contribute to the services. In this paper, we evaluate the extent to which a malicious server in a crowdsourcing air quality monitoring service can track the locations of users that contribute to the service. The participants periodically send information, such as temperature, relative humidity, carbon monoxide, and luminosity of their surrounding, using an off-the-shelf sensor connected to their mobile phones. The participants also send their coarse-grain location (i.e., disclosing the ID of the cell tower to which their mobile is coupled) along with the air quality data. We evaluate the precision with which the attacker can track the participants using only air quality data and location of the cell tower. We perform a thorough analysis of the privacy attack and show that it can accurately discover the destination of the users with a precision of more than 85% (up to 97%), if at least five consecutive samples are provided by the participants. We also discovered that the precision drops when the environmental sensors are affected by outside conditions (e.g., exposition to direct sunlight) but remains significant (54.5% for 20 consecutive samples).","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Trusted Execution Environment: What It is, and What It is Not 可信执行环境:它是什么,它不是什么
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.357
M. Sabt, Mohammed Achemlal, A. Bouabdallah
Nowadays, there is a trend to design complex, yet secure systems. In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms. TEE is commonly known as an isolated processing environment in which applications can be securely executed irrespective of the rest of the system. However, TEE still lacks a precise definition as well as representative building blocks that systematize its design. Existing definitions of TEE are largely inconsistent and unspecific, which leads to confusion in the use of the term and its differentiation from related concepts, such as secure execution environment (SEE). In this paper, we propose a precise definition of TEE and analyze its core properties. Furthermore, we discuss important concepts related to TEE, such as trust and formal verification. We give a short survey on the existing academic and industrial ARM TrustZone-based TEE, and compare them using our proposed definition. Finally, we discuss some known attacks on deployed TEE as well as its wide use to guarantee security in diverse applications.
如今,设计复杂但安全的系统是一种趋势。在这种情况下,可信执行环境(TEE)被设计为丰富先前定义的可信平台。TEE通常被称为隔离处理环境,在该环境中,应用程序可以安全地执行,而与系统的其余部分无关。然而,TEE仍然缺乏一个精确的定义,以及系统化其设计的代表性构建块。TEE的现有定义在很大程度上是不一致和不具体的,这导致在使用该术语及其与相关概念(如安全执行环境(SEE))的区别方面存在混淆。本文提出了TEE的精确定义,并分析了其核心性质。此外,我们还讨论了与TEE相关的重要概念,如信任和形式验证。我们对现有的基于ARM trustzone的学术和工业TEE进行了简要的调查,并使用我们提出的定义对它们进行了比较。最后,我们讨论了针对已部署TEE的一些已知攻击,以及TEE在各种应用程序中的广泛应用,以保证安全性。
{"title":"Trusted Execution Environment: What It is, and What It is Not","authors":"M. Sabt, Mohammed Achemlal, A. Bouabdallah","doi":"10.1109/Trustcom.2015.357","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.357","url":null,"abstract":"Nowadays, there is a trend to design complex, yet secure systems. In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms. TEE is commonly known as an isolated processing environment in which applications can be securely executed irrespective of the rest of the system. However, TEE still lacks a precise definition as well as representative building blocks that systematize its design. Existing definitions of TEE are largely inconsistent and unspecific, which leads to confusion in the use of the term and its differentiation from related concepts, such as secure execution environment (SEE). In this paper, we propose a precise definition of TEE and analyze its core properties. Furthermore, we discuss important concepts related to TEE, such as trust and formal verification. We give a short survey on the existing academic and industrial ARM TrustZone-based TEE, and compare them using our proposed definition. Finally, we discuss some known attacks on deployed TEE as well as its wide use to guarantee security in diverse applications.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121095862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 383
Mobile Guard Demo: Network Based Malware Detection 移动防护演示:基于网络的恶意软件检测
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.501
Vikramajeet Khatri, J. Abendroth
The growing trend of data traffic in mobile networks brings new security threats such as malwares, botnets, premium SMS frauds etc, and these threats affect the network resources in terms of revenue as well as performance. Some end user devices are using antivirus and anti-malware clients for protection against malware attacks, but the malicious activity affects mobile network elements as well. Therefore, a network based malware detection system, such as Mobile Guard, is essential in detecting malicious activities within a network, as well as protecting end users from malware attacks that are propagated through mobile operator's network. We present Mobile Guard -- a network based malware detection system and discuss its necessity, solution architecture and key features.
移动网络中数据流量的增长趋势带来了新的安全威胁,如恶意软件、僵尸网络、付费短信诈骗等,这些威胁在影响网络资源的同时也影响了网络的收益和性能。一些终端用户设备使用防病毒和反恶意软件客户端来防止恶意软件攻击,但恶意活动也会影响移动网络元素。因此,基于网络的恶意软件检测系统,例如Mobile Guard,对于检测网络中的恶意活动以及保护终端用户免受通过移动运营商网络传播的恶意软件攻击至关重要。本文介绍了一种基于网络的恶意软件检测系统Mobile Guard,并讨论了其必要性、解决方案架构和主要特点。
{"title":"Mobile Guard Demo: Network Based Malware Detection","authors":"Vikramajeet Khatri, J. Abendroth","doi":"10.1109/Trustcom.2015.501","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.501","url":null,"abstract":"The growing trend of data traffic in mobile networks brings new security threats such as malwares, botnets, premium SMS frauds etc, and these threats affect the network resources in terms of revenue as well as performance. Some end user devices are using antivirus and anti-malware clients for protection against malware attacks, but the malicious activity affects mobile network elements as well. Therefore, a network based malware detection system, such as Mobile Guard, is essential in detecting malicious activities within a network, as well as protecting end users from malware attacks that are propagated through mobile operator's network. We present Mobile Guard -- a network based malware detection system and discuss its necessity, solution architecture and key features.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127094213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Contextual Sub-network Extraction in Contextual Social Networks 情境社交网络中的情境子网络提取
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.365
Xiaoming Zheng, Yan Wang, M. Orgun
Predicting the trust between a source participant and a target participant in a social network is important in many applications, e.g., assessing the recommendation from a target participant from the perspective of a source participant. In general, social networks contain participants, the links and trust relations between them and the contextual information for their interactions. All such information has important influence on trust prediction. However, predicting the trust between two participants based on the whole network is ineffective and inefficient. Thus, prior to trust prediction, it is necessary to extract a small-scale contextual network that contains most of the important participants as well as trust and contextual information. However, extracting such a sub-network has been proved to be an NP-Complete problem. To solve this challenging problem, we propose a social context-aware trust sub-network extraction model to search near-optimal solutions effectively and efficiently. In our proposed model, we first present the important factors that affect the trust between participants in OSNs. Then, we define a utility function to measure the trust factors of each node in a social network. At last, we design an ant colony algorithm with a newly designed mutation process for sub-network extraction. The experiments, conducted on two popular datasets of Epinions and Slashdot, demonstrate that our approach can extract those sub-networks covering important participants and contextual information while keeping a high density rate. Our approach is superior to the state-of-the-art approaches in terms of the quality of extracted sub-networks within the same execution time.
预测社交网络中源参与者和目标参与者之间的信任在许多应用中都很重要,例如,从源参与者的角度评估目标参与者的推荐。一般来说,社交网络包含参与者、他们之间的链接和信任关系以及他们互动的上下文信息。这些信息都对信任预测有重要影响。然而,基于整个网络来预测两个参与者之间的信任是无效和低效的。因此,在进行信任预测之前,有必要提取一个包含大多数重要参与者以及信任和上下文信息的小规模上下文网络。然而,这种子网络的提取已被证明是一个np完全问题。为了解决这一具有挑战性的问题,我们提出了一种社会上下文感知的信任子网络提取模型,以有效地搜索近最优解。在我们提出的模型中,我们首先提出了影响osn中参与者之间信任的重要因素。然后,我们定义了一个效用函数来衡量社会网络中每个节点的信任系数。最后,采用蚁群算法设计了一种新的变异过程,用于子网络的提取。在Epinions和Slashdot两个流行的数据集上进行的实验表明,我们的方法可以在保持高密度率的同时提取覆盖重要参与者和上下文信息的子网络。我们的方法在相同执行时间内提取子网络的质量方面优于最先进的方法。
{"title":"Contextual Sub-network Extraction in Contextual Social Networks","authors":"Xiaoming Zheng, Yan Wang, M. Orgun","doi":"10.1109/Trustcom.2015.365","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.365","url":null,"abstract":"Predicting the trust between a source participant and a target participant in a social network is important in many applications, e.g., assessing the recommendation from a target participant from the perspective of a source participant. In general, social networks contain participants, the links and trust relations between them and the contextual information for their interactions. All such information has important influence on trust prediction. However, predicting the trust between two participants based on the whole network is ineffective and inefficient. Thus, prior to trust prediction, it is necessary to extract a small-scale contextual network that contains most of the important participants as well as trust and contextual information. However, extracting such a sub-network has been proved to be an NP-Complete problem. To solve this challenging problem, we propose a social context-aware trust sub-network extraction model to search near-optimal solutions effectively and efficiently. In our proposed model, we first present the important factors that affect the trust between participants in OSNs. Then, we define a utility function to measure the trust factors of each node in a social network. At last, we design an ant colony algorithm with a newly designed mutation process for sub-network extraction. The experiments, conducted on two popular datasets of Epinions and Slashdot, demonstrate that our approach can extract those sub-networks covering important participants and contextual information while keeping a high density rate. Our approach is superior to the state-of-the-art approaches in terms of the quality of extracted sub-networks within the same execution time.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface JoKER:通过JTAG接口对Android设备中的内核rootkit进行可信检测
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.358
Mordechai Guri, Yuri Poliak, Bracha Shapira, Y. Elovici
Smartphones and tablets have become prime targets for malware, due to the valuable private and corporate information they hold. While Anti-Virus (AV) program may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism run on the same physical device as the monitored OS can be compromised via application, kernel or boot-loader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task in practice. In this paper we present 'JoKER' - a system which aims at detecting rootkits in the Android kernel by utilizing the hardware's Joint Test Action Group (JTAG) interface for trusted memory forensics. Our framework consists of components that extract areas of a kernel's memory and reconstruct it for further analysis. We present the overall architecture along with its implementation, and demonstrate that the system can successfully detect the presence of stealthy rootkits in the kernel. The results show that although JTAG's main purpose is system testing, it can also be used for malware detection where traditional methods fail.
智能手机和平板电脑已成为恶意软件的主要目标,因为它们持有宝贵的私人和企业信息。虽然反病毒(AV)程序可以成功检测恶意应用程序(应用程序),但它们对低级rootkit仍然无效,这些rootkit通过掩盖自己的存在来逃避检测机制。此外,与被监视的操作系统在同一物理设备上运行的任何检测机制都可能通过应用程序、内核或引导加载程序漏洞受到损害。因此,移动设备中内核rootkit的可信检测在实践中是一项具有挑战性的任务。在本文中,我们介绍了“JoKER”——一个旨在通过利用硬件的联合测试行动组(JTAG)接口进行可信内存取证来检测Android内核中的rootkit的系统。我们的框架由一些组件组成,这些组件提取内核的内存区域并对其进行重构以供进一步分析。我们给出了整体架构及其实现,并证明了系统可以成功地检测内核中隐形rootkit的存在。结果表明,尽管JTAG的主要目的是系统测试,但它也可以用于传统方法无法检测的恶意软件。
{"title":"JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface","authors":"Mordechai Guri, Yuri Poliak, Bracha Shapira, Y. Elovici","doi":"10.1109/Trustcom.2015.358","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.358","url":null,"abstract":"Smartphones and tablets have become prime targets for malware, due to the valuable private and corporate information they hold. While Anti-Virus (AV) program may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism run on the same physical device as the monitored OS can be compromised via application, kernel or boot-loader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task in practice. In this paper we present 'JoKER' - a system which aims at detecting rootkits in the Android kernel by utilizing the hardware's Joint Test Action Group (JTAG) interface for trusted memory forensics. Our framework consists of components that extract areas of a kernel's memory and reconstruct it for further analysis. We present the overall architecture along with its implementation, and demonstrate that the system can successfully detect the presence of stealthy rootkits in the kernel. The results show that although JTAG's main purpose is system testing, it can also be used for malware detection where traditional methods fail.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127250570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor 基于多因素的无线传感器网络动态信任评估
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.354
Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng
Most of the existing trust evaluation methods of wireless sensor networks focus on communication behaviors in building paths without considering transmission behaviors in sensing environment. Therefore, a potential threat tothe network security exists in wireless sensor networks. Wepropose a dynamic trust evaluation method based on multi-factor including direct trust factor and indirect trust factor in this paper. Firstly, direct trust factor is composed of communication trust factor and transmission trust factor, both of which can be got from observing the interaction process. Secondly, indirect trust factorcomes from other nodes' recommendations, which are classified into certainand uncertain ones. Such two kinds of recommendation trust values are computed respectively. Finally, nodes' trustworthinessis measured by combining direct trust with indirect trust dynamically. Besides, both the involved classification standard and dynamic weight assignment are dependent on the interaction times between nodes, which are put forward under the background of Hoeffding's Inequality in Probability Theory. Experiments on NS-2 platform show that the proposed method is effective in increasing the network throughput and the network packet delivery ratio.
现有的无线传感器网络信任评估方法大多关注路径构建中的通信行为,而没有考虑感知环境中的传输行为。因此,无线传感器网络存在着对网络安全的潜在威胁。本文提出了一种基于直接信任因子和间接信任因子的多因素动态信任评估方法。首先,直接信任因子由通信信任因子和传输信任因子组成,这两个因子都可以通过观察交互过程得到。其次,间接信任因素来自于其他节点的推荐,并将其分为确定和不确定两类。分别计算这两种推荐的信任值。最后,通过直接信任和间接信任的动态结合来衡量节点的可信度。此外,所涉及的分类标准和动态权重分配都依赖于节点之间的交互次数,这是在概率论中的Hoeffding不等式背景下提出的。在NS-2平台上进行的实验表明,该方法能够有效提高网络吞吐量和网络数据包传输率。
{"title":"Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor","authors":"Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng","doi":"10.1109/Trustcom.2015.354","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.354","url":null,"abstract":"Most of the existing trust evaluation methods of wireless sensor networks focus on communication behaviors in building paths without considering transmission behaviors in sensing environment. Therefore, a potential threat tothe network security exists in wireless sensor networks. Wepropose a dynamic trust evaluation method based on multi-factor including direct trust factor and indirect trust factor in this paper. Firstly, direct trust factor is composed of communication trust factor and transmission trust factor, both of which can be got from observing the interaction process. Secondly, indirect trust factorcomes from other nodes' recommendations, which are classified into certainand uncertain ones. Such two kinds of recommendation trust values are computed respectively. Finally, nodes' trustworthinessis measured by combining direct trust with indirect trust dynamically. Besides, both the involved classification standard and dynamic weight assignment are dependent on the interaction times between nodes, which are put forward under the background of Hoeffding's Inequality in Probability Theory. Experiments on NS-2 platform show that the proposed method is effective in increasing the network throughput and the network packet delivery ratio.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"3151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127471646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries 云上的数据共享:用于隐私保护查询的可扩展的基于代理的协议
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.530
Maryam Sepehri, S. Cimato, E. Damiani, C. Yeun
Outsourcing data on the cloud poses many challenges related to data owners and users privacy, specially when some data processing capabilities are delegated to the cloud infrastructure. In this paper we address the problem of executing privacy-preserving equality queries in a scenario where multiple data owners outsource their databases to an untrusted cloud service provider, accepting encrypted queries coming from authorized users. We propose a highly scalable proxy re-encryption scheme so that (i) the cloud service provider can return only the encrypted data that satisfies user's query without decrypting it, and (ii) the encrypted results can be decrypted using the user's key. We analyze the computation efficiency and the security of the scheme against proxy under the standard Diffie-Hellman assumption, reporting also some experimental results, which show encouraging speed up in comparison with previously proposed similar schemes.
在云上外包数据带来了许多与数据所有者和用户隐私相关的挑战,特别是当一些数据处理能力委托给云基础设施时。在本文中,我们解决了在多个数据所有者将其数据库外包给不受信任的云服务提供商,接受来自授权用户的加密查询的情况下执行隐私保护相等查询的问题。我们提出了一种高度可扩展的代理重加密方案,使得(i)云服务提供商可以只返回满足用户查询的加密数据而无需解密,(ii)加密结果可以使用用户的密钥解密。在标准Diffie-Hellman假设下,分析了该方案的计算效率和抗代理的安全性,并给出了一些实验结果,与之前提出的类似方案相比,速度有了令人鼓舞的提高。
{"title":"Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries","authors":"Maryam Sepehri, S. Cimato, E. Damiani, C. Yeun","doi":"10.1109/Trustcom.2015.530","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.530","url":null,"abstract":"Outsourcing data on the cloud poses many challenges related to data owners and users privacy, specially when some data processing capabilities are delegated to the cloud infrastructure. In this paper we address the problem of executing privacy-preserving equality queries in a scenario where multiple data owners outsource their databases to an untrusted cloud service provider, accepting encrypted queries coming from authorized users. We propose a highly scalable proxy re-encryption scheme so that (i) the cloud service provider can return only the encrypted data that satisfies user's query without decrypting it, and (ii) the encrypted results can be decrypted using the user's key. We analyze the computation efficiency and the security of the scheme against proxy under the standard Diffie-Hellman assumption, reporting also some experimental results, which show encouraging speed up in comparison with previously proposed similar schemes.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124817560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Dynamic Game Access Control Based on Trust 基于信任的动态博弈访问控制
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.532
Shunan Ma
Access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, MAC and RBAC, the functionality of these access control models is to make authorization decisions based on established access control policies. When the malicious access is identified, the access control system denies the request. However, the malicious entities may keep issuing more malicious access requests not afraid of punishment from the access control system. Such access control models are not adequate in open networks where the identities of entities may not be known. In this paper, we first apply some principles in game theory to analyze current access control models. With respect to behavior of entities, access control can be treated as a game between the requester and the provider entities. Then we propose a dynamic game access control model based on trust, which can respond to malicious access. The proposed model should follow the principles of bringing interactive entities to a state of Nash Equilibrium to make access control more effective. In the proposed model, we use access behavior trigger strategy along with a constraint mechanism that provides incentives for entities to perform honest access.
访问控制是指一整套用于管理用户通过网络访问计算机系统提供的资源的机制。尽管已经提出了许多访问控制模型,如DAC、MAC和RBAC,但这些访问控制模型的功能是基于已建立的访问控制策略做出授权决策。当识别出恶意访问时,门禁系统会拒绝该请求。然而,恶意实体可能会不断发出更多的恶意访问请求,而不怕访问控制系统的惩罚。这种访问控制模型不适用于可能不知道实体身份的开放网络。本文首先运用博弈论的一些原理对现有的访问控制模型进行分析。对于实体的行为,访问控制可以看作是请求者和提供者实体之间的博弈。在此基础上,提出了一种基于信任的动态博弈访问控制模型,该模型能够有效应对恶意访问。所提出的模型应遵循使交互实体达到纳什均衡状态的原则,以使访问控制更加有效。在提出的模型中,我们使用访问行为触发策略和约束机制,为实体执行诚实访问提供激励。
{"title":"Dynamic Game Access Control Based on Trust","authors":"Shunan Ma","doi":"10.1109/Trustcom.2015.532","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.532","url":null,"abstract":"Access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, MAC and RBAC, the functionality of these access control models is to make authorization decisions based on established access control policies. When the malicious access is identified, the access control system denies the request. However, the malicious entities may keep issuing more malicious access requests not afraid of punishment from the access control system. Such access control models are not adequate in open networks where the identities of entities may not be known. In this paper, we first apply some principles in game theory to analyze current access control models. With respect to behavior of entities, access control can be treated as a game between the requester and the provider entities. Then we propose a dynamic game access control model based on trust, which can respond to malicious access. The proposed model should follow the principles of bringing interactive entities to a state of Nash Equilibrium to make access control more effective. In the proposed model, we use access behavior trigger strategy along with a constraint mechanism that provides incentives for entities to perform honest access.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126099380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Logic Based Prosumer Agent in a Modular Smart Grid Prosumer Architecture 模块化智能电网Prosumer体系结构中基于模糊逻辑的Prosumer Agent
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.642
Chen-Wei Yang, Kashif Gulzar, S. Sierla, V. Vyatkin
The investment to DERs (Distributed Energy Resources) in the emerging smart energy grids are critical to achieving goals for environmental protection, reducing energy costs and coping with failures. An architecture and market mechanism is needed to support the participation of owners of DERs that aim to maximize the profit from this investment within a system that is also able to achieve grid level objectives. Due to privacy requirements, owners of DERs should not be requested to divulge information such as the state of charge of a local energy store, and yet such information is very relevant for operating the grid in such a way that meets the objectives of the owner of the grid, who may operate a large power plant that is ultimately responsible for satisfying the load that cannot be covered by DERs. This paper builds on previous work to propose a modular multi-agent architecture in which prosumer agents represent DER owners and an auctioneer agent represents the power plant operator. The architecture allows the different agents to use different algorithms aiming at satisfying local and grid level objectives while meeting the privacy requirement. In particular, a fuzzy logic based algorithm is developed for the distributed automation platform that supports the architecture. The capability of the architecture to flexibly evaluate the performance of various algorithms from the DER owner and plant operator perspective is demonstrated with a case study in the district heating domain.
在新兴的智能电网中,对分布式能源的投资对于实现环境保护、降低能源成本和应对故障的目标至关重要。需要一个架构和市场机制来支持分布式存储系统所有者的参与,这些所有者的目标是在一个能够实现网格级目标的系统中实现投资利润最大化。由于隐私要求,不应要求储能系统的所有者泄露诸如当地储能系统的充电状态等信息,然而,这些信息与以满足电网所有者目标的方式运营电网非常相关,电网所有者可能运营一个大型发电厂,最终负责满足储能系统无法覆盖的负荷。本文在前人研究的基础上,提出了一种模块化的多代理体系结构,其中产消代理代表DER所有者,拍卖商代理代表发电厂运营商。该体系结构允许不同的代理使用不同的算法,以满足局部和网格级目标,同时满足隐私要求。特别针对支持该体系结构的分布式自动化平台,提出了一种基于模糊逻辑的算法。通过区域供热领域的一个案例研究,证明了该体系结构从DER所有者和工厂运营商的角度灵活评估各种算法性能的能力。
{"title":"Fuzzy Logic Based Prosumer Agent in a Modular Smart Grid Prosumer Architecture","authors":"Chen-Wei Yang, Kashif Gulzar, S. Sierla, V. Vyatkin","doi":"10.1109/Trustcom.2015.642","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.642","url":null,"abstract":"The investment to DERs (Distributed Energy Resources) in the emerging smart energy grids are critical to achieving goals for environmental protection, reducing energy costs and coping with failures. An architecture and market mechanism is needed to support the participation of owners of DERs that aim to maximize the profit from this investment within a system that is also able to achieve grid level objectives. Due to privacy requirements, owners of DERs should not be requested to divulge information such as the state of charge of a local energy store, and yet such information is very relevant for operating the grid in such a way that meets the objectives of the owner of the grid, who may operate a large power plant that is ultimately responsible for satisfying the load that cannot be covered by DERs. This paper builds on previous work to propose a modular multi-agent architecture in which prosumer agents represent DER owners and an auctioneer agent represents the power plant operator. The architecture allows the different agents to use different algorithms aiming at satisfying local and grid level objectives while meeting the privacy requirement. In particular, a fuzzy logic based algorithm is developed for the distributed automation platform that supports the architecture. The capability of the architecture to flexibly evaluate the performance of various algorithms from the DER owner and plant operator perspective is demonstrated with a case study in the district heating domain.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection 一种FPGA IP保护容错水印算法
Pub Date : 2015-08-20 DOI: 10.1109/Trustcom.2015.379
Jing Long, Dafang Zhang, W. Liang, Wenwei Li
Intellectual Property (IP) is difficult to identify when the watermarks are impaired in previous work. To address this issue, we propose a fault-tolerant watermarking scheme for FPGA IP design. The scheme employs Blakley threshold method for signature sharing. The watermarks are then encoded with Reed-Solomon (RS) coding and finally embedded into unused LUTs of used slice. The signature sharing makes it unnecessary to extract all embedded watermarks in authentication. The complete signature can be retrieved with several watermarks even if other watermarks are damaged. The experiments show that the fault-tolerant scheme incurs no extra resource and timing overhead and has good robustness against removal attacks.
在以前的工作中,当水印受损时,知识产权(IP)难以识别。为了解决这个问题,我们提出了一种用于FPGA IP设计的容错水印方案。该方案采用Blakley阈值方法进行签名共享。然后用RS (Reed-Solomon)编码对水印进行编码,最后嵌入到已使用切片的未使用lut中。签名共享使得认证过程中不需要提取所有嵌入的水印。即使其他水印被损坏,也可以用几个水印检索完整的签名。实验表明,该容错方案不增加额外的资源和时间开销,对移除攻击具有良好的鲁棒性。
{"title":"A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection","authors":"Jing Long, Dafang Zhang, W. Liang, Wenwei Li","doi":"10.1109/Trustcom.2015.379","DOIUrl":"https://doi.org/10.1109/Trustcom.2015.379","url":null,"abstract":"Intellectual Property (IP) is difficult to identify when the watermarks are impaired in previous work. To address this issue, we propose a fault-tolerant watermarking scheme for FPGA IP design. The scheme employs Blakley threshold method for signature sharing. The watermarks are then encoded with Reed-Solomon (RS) coding and finally embedded into unused LUTs of used slice. The signature sharing makes it unnecessary to extract all embedded watermarks in authentication. The complete signature can be retrieved with several watermarks even if other watermarks are damaged. The experiments show that the fault-tolerant scheme incurs no extra resource and timing overhead and has good robustness against removal attacks.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 IEEE Trustcom/BigDataSE/ISPA
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1