首页 > 最新文献

2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)最新文献

英文 中文
Towards an Out-of-the-Box Cloud Application Monitoring Framework 面向开箱即用的云应用程序监控框架
Jianjun Li, Wei Li, Ming Li
To monitor virtual machines and applications in IaaS cloud environments, cloud providers require installing agents in tenants' virtual machines. It is inconvenient for users and is prone to cyber attacks. In this paper, we propose oMon, a out-of-the-box application monitoring framework for cloud applications. oMon does not requires installing any agent in the guest OS of tenants' virtual machines, thus is transparent to the cloud applications, and could supports a wide range of guest OS and legacy systems. We design and implement several modules in oMon which can not only obtain the performance statistics of tenants' virtual machines, but also collect information on process, system call, disk I/O and network communications. oMon also enables comprehensive analysis by correlating these information. We evaluate the effectiveness and efficiency of oMon through several experiments. The results shown that oMon could successfully provide fine-grained monitoring for cloud applications with small overhead.
为了监控IaaS云环境中的虚拟机和应用程序,云提供商需要在租户的虚拟机中安装代理。给用户带来不便,容易受到网络攻击。在本文中,我们提出了oMon,一个用于云应用程序的开箱即用的应用程序监视框架。oMon不需要在租户虚拟机的客户操作系统中安装任何代理,因此对云应用程序是透明的,并且可以支持广泛的客户操作系统和遗留系统。我们在oMon中设计并实现了几个模块,这些模块不仅可以获取租户虚拟机的性能统计信息,还可以收集进程、系统调用、磁盘I/O和网络通信等信息。oMon还可以通过关联这些信息进行综合分析。我们通过几个实验来评估oMon的有效性和效率。结果表明,oMon可以成功地以较小的开销为云应用程序提供细粒度监视。
{"title":"Towards an Out-of-the-Box Cloud Application Monitoring Framework","authors":"Jianjun Li, Wei Li, Ming Li","doi":"10.1109/CSCloud.2016.39","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.39","url":null,"abstract":"To monitor virtual machines and applications in IaaS cloud environments, cloud providers require installing agents in tenants' virtual machines. It is inconvenient for users and is prone to cyber attacks. In this paper, we propose oMon, a out-of-the-box application monitoring framework for cloud applications. oMon does not requires installing any agent in the guest OS of tenants' virtual machines, thus is transparent to the cloud applications, and could supports a wide range of guest OS and legacy systems. We design and implement several modules in oMon which can not only obtain the performance statistics of tenants' virtual machines, but also collect information on process, system call, disk I/O and network communications. oMon also enables comprehensive analysis by correlating these information. We evaluate the effectiveness and efficiency of oMon through several experiments. The results shown that oMon could successfully provide fine-grained monitoring for cloud applications with small overhead.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115998718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preparation of Graphene and Its Performance Analysis 石墨烯的制备及其性能分析
W. Sheng
Graphene, a single layer of carbon atoms in a two-dimensional honeycomb lattice, have attracted tremendous attention from researchers in recent years, due to its excellent electrical, mechanical and optical performances. However, preparation of grapheme with simple methods is still a huge challenge. In this paper, graphene oxide is prepared by Hummers method. The graphene prepared by hydrazine hydrate chemical reduction of graphite oxide are characterized by Fourier transform infrared (FTIR) spectroscopy, Raman spectroscopy. Additionally, the electrochemical performance is tested. Results show that the prepared graphene has good performance and safe manufacturing process.
石墨烯是二维蜂窝晶格中的单层碳原子,由于其优异的电学、力学和光学性能,近年来引起了研究人员的极大关注。然而,用简单的方法制备石墨素仍然是一个巨大的挑战。本文采用Hummers法制备氧化石墨烯。利用傅里叶变换红外光谱(FTIR)、拉曼光谱对氧化石墨化学还原制备的石墨烯进行了表征。并对其电化学性能进行了测试。结果表明,制备的石墨烯具有良好的性能和安全的制备工艺。
{"title":"Preparation of Graphene and Its Performance Analysis","authors":"W. Sheng","doi":"10.1109/CSCloud.2016.20","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.20","url":null,"abstract":"Graphene, a single layer of carbon atoms in a two-dimensional honeycomb lattice, have attracted tremendous attention from researchers in recent years, due to its excellent electrical, mechanical and optical performances. However, preparation of grapheme with simple methods is still a huge challenge. In this paper, graphene oxide is prepared by Hummers method. The graphene prepared by hydrazine hydrate chemical reduction of graphite oxide are characterized by Fourier transform infrared (FTIR) spectroscopy, Raman spectroscopy. Additionally, the electrochemical performance is tested. Results show that the prepared graphene has good performance and safe manufacturing process.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment 隐法:云环境下异构策略相似度分析方法
Li Lin, Jian Hu, Xinya Mao, Jian-biao Zhang
Analyzing similarity of access control policies is very important in many application sceneries, for example, conducting similarity analysis to reduce policy scale in cloud services composition, or through similar policies to find cloud services which have same function. Existing methods of policy similarity analysis are mainly based on logical reasoning or Boolean function comparison, which are computationally expensive and do not scale well for large heterogeneous distributed cloud environments. In this paper, we propose a lightweight approach for analyzing the similarity of heterogeneous policy in cloud environment, called Saphena. In Saphena, paired attributes are used to unify and simplify heterogeneous policies and the similarity of attribute is calculated by utilizing semantic-based analysis method. The similarity of policies is obtained by digging the similarities of all attributes in policies and controlling the corresponding weighting factor. We design a threshold that is used to judge whether similarity among policies. Cloud service providers can set threshold through interface flexibly based on their difference request. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the classic cosine similarity analysis arithmetic.
分析访问控制策略的相似度在很多应用场景中都是非常重要的,例如通过相似度分析来减少云服务组合中的策略规模,或者通过相似的策略来发现具有相同功能的云服务。现有的策略相似度分析方法主要基于逻辑推理或布尔函数比较,这些方法计算成本高,并且不能很好地用于大型异构分布式云环境。在本文中,我们提出了一种轻量级的方法来分析云环境中异构策略的相似性,称为Saphena。在Saphena中,使用配对属性来统一和简化异构策略,并利用基于语义的分析方法计算属性的相似度。策略的相似度是通过挖掘策略中所有属性的相似度并控制相应的权重因子来获得的。我们设计了一个阈值,用来判断策略之间是否相似。云服务提供商可以根据不同的需求,通过接口灵活设置阈值。通过与经典余弦相似度分析算法的比较,验证了该方法的有效性。
{"title":"Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment","authors":"Li Lin, Jian Hu, Xinya Mao, Jian-biao Zhang","doi":"10.1109/CSCloud.2016.13","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.13","url":null,"abstract":"Analyzing similarity of access control policies is very important in many application sceneries, for example, conducting similarity analysis to reduce policy scale in cloud services composition, or through similar policies to find cloud services which have same function. Existing methods of policy similarity analysis are mainly based on logical reasoning or Boolean function comparison, which are computationally expensive and do not scale well for large heterogeneous distributed cloud environments. In this paper, we propose a lightweight approach for analyzing the similarity of heterogeneous policy in cloud environment, called Saphena. In Saphena, paired attributes are used to unify and simplify heterogeneous policies and the similarity of attribute is calculated by utilizing semantic-based analysis method. The similarity of policies is obtained by digging the similarities of all attributes in policies and controlling the corresponding weighting factor. We design a threshold that is used to judge whether similarity among policies. Cloud service providers can set threshold through interface flexibly based on their difference request. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the classic cosine similarity analysis arithmetic.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130984488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CloudAuditor: A Cloud Auditing Framework Based on Nested Virtualization CloudAuditor:基于嵌套虚拟化的云审计框架
Zhe Wang, Jin Zeng, Tao Lv, Bin Shi, Bo Li
Recent years witness the successful adoption of Cloud computing. However, security remains the top concern for cloud users. The fundamental issue is that cloud providers cannot convince cloud users the trustworthiness of cloud platforms. In this paper, we propose a cloud auditing framework, named CloudAuditor, to examine the behaviors of cloud platforms. By leveraging nested virtualization technology, CloudAuditor could identify the stealthy memory and disk access from cloud platforms to users' virtual machines and can support the mainstream IaaS platforms such as VMware, Xen and KVM. We evaluate the effectiveness and efficiency of CloudAuditor through comprehensive experiments. The results show that CloudAuditor can identify the suspicious behaviors of cloud platforms with acceptable performance overhead.
近年来,云计算的应用取得了成功。然而,安全性仍然是云用户最关心的问题。最根本的问题是,云提供商无法让云用户相信云平台的可靠性。在本文中,我们提出了一个名为CloudAuditor的云审计框架来检查云平台的行为。通过利用嵌套虚拟化技术,CloudAuditor可以识别从云平台到用户虚拟机的内存和磁盘的秘密访问,并且可以支持主流的IaaS平台,如VMware、Xen和KVM。我们通过全面的实验来评估CloudAuditor的有效性和效率。结果表明,CloudAuditor可以识别出性能开销可接受的云平台的可疑行为。
{"title":"CloudAuditor: A Cloud Auditing Framework Based on Nested Virtualization","authors":"Zhe Wang, Jin Zeng, Tao Lv, Bin Shi, Bo Li","doi":"10.1109/CSCloud.2016.40","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.40","url":null,"abstract":"Recent years witness the successful adoption of Cloud computing. However, security remains the top concern for cloud users. The fundamental issue is that cloud providers cannot convince cloud users the trustworthiness of cloud platforms. In this paper, we propose a cloud auditing framework, named CloudAuditor, to examine the behaviors of cloud platforms. By leveraging nested virtualization technology, CloudAuditor could identify the stealthy memory and disk access from cloud platforms to users' virtual machines and can support the mainstream IaaS platforms such as VMware, Xen and KVM. We evaluate the effectiveness and efficiency of CloudAuditor through comprehensive experiments. The results show that CloudAuditor can identify the suspicious behaviors of cloud platforms with acceptable performance overhead.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video 基于H.264视频的改进矩阵编码隐写算法
Liyun Qian, Zhitang Li, Pei-Zhang Zhou, Jian Chen
The paper uses EMD to construct a new transformation matrix to improve the original matrix coding algorithm and proposes a new video steganography algorithm:Improved Matrix Encoding (IME). The proposed algorithmretains the advantages of EMD and matrix encoding that it can greatly reduce the modifications of embed carrier to achieve a high embedding efficiency under the conditions of same embedding capacity. At the same time, the proposed algorithm solves the problem that the embedding rate of matrix encoding is relatively low. The experiment compared with similar algorithms show that the algorithm has advantages in PSNR, SSIM, and bitrate increase.
本文利用EMD构造一个新的变换矩阵来改进原有的矩阵编码算法,提出了一种新的视频隐写算法:改进矩阵编码(Improved matrix Encoding, IME)。该算法保留了EMD和矩阵编码的优点,可以大大减少嵌入载波的修改,在相同嵌入容量的条件下实现较高的嵌入效率。同时,该算法解决了矩阵编码嵌入率较低的问题。实验结果表明,该算法在PSNR、SSIM、比特率提高等方面具有一定的优势。
{"title":"An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video","authors":"Liyun Qian, Zhitang Li, Pei-Zhang Zhou, Jian Chen","doi":"10.1109/CSCloud.2016.8","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.8","url":null,"abstract":"The paper uses EMD to construct a new transformation matrix to improve the original matrix coding algorithm and proposes a new video steganography algorithm:Improved Matrix Encoding (IME). The proposed algorithmretains the advantages of EMD and matrix encoding that it can greatly reduce the modifications of embed carrier to achieve a high embedding efficiency under the conditions of same embedding capacity. At the same time, the proposed algorithm solves the problem that the embedding rate of matrix encoding is relatively low. The experiment compared with similar algorithms show that the algorithm has advantages in PSNR, SSIM, and bitrate increase.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Software Defined Networking Framework for Cloud Environments 一种用于云环境的新型软件定义网络框架
Yukun Zhang, B. Li
Virtual network management is a basic component provided by cloud computing system. In cloud environment, the fact that VMs in the same subnet are located in different hosts, the traffic of VMs attached to different users should be isolated, the VM would be migrated to other hosts makes network management different from that in physical network. Technology like overlay and SDN is usually introduced to establish a reliable and efficient virtual network management scheme. However, there are many drawbacks such as flexibility and hardware costs in most schemes introducing technology above-mentioned. We addressing these problems by designing a scheme on the hyper-visor layer of physical hosts based on overlay and SDN technology, which means the tradition virtual network can be easily transformed to our system without purchasing new devices supported OpenFlow or VXLAN(a kind of technology in overlay) protocol. Besides additional functions like monitor and traffic mirror can be customized by users' needs for the system's flexibility and scalability the SDN technology endowing. We also design a Distributed Virtual Router(DVR) on each host to solve the general problem of traffic between Internet and Intranet concentrating in most schemes. The experimental evaluation shows that our system has achieve the basic intercommunication under the situation of tenant isolation and its performance of communication between Internet and Intranet acts obviously better than that in OpenStack scheme for our DVR design.
虚拟网络管理是云计算系统提供的一个基本组成部分。在云环境下,同一子网的虚拟机分布在不同的主机上,不同用户的虚拟机流量需要隔离,虚拟机会迁移到其他主机上,这使得网络管理与物理网络中的管理有所不同。为了建立可靠、高效的虚拟网络管理方案,通常会引入覆盖、SDN等技术。然而,大多数引入上述技术的方案都存在灵活性和硬件成本等缺点。为了解决这些问题,我们在物理主机的hypervisor层上设计了一个基于overlay和SDN技术的方案,这意味着传统的虚拟网络可以很容易地转换到我们的系统中,而不需要购买支持OpenFlow或VXLAN(overlay中的一种技术)协议的新设备。此外,监控、流量镜像等附加功能可根据用户需求定制,SDN技术赋予了系统的灵活性和可扩展性。我们还在每个主机上设计了一个分布式虚拟路由器(DVR),以解决大多数方案中Internet和Intranet之间流量集中的普遍问题。实验评估表明,我们设计的DVR系统在租户隔离的情况下实现了基本的互联互通,其Internet和Intranet之间的通信性能明显优于OpenStack方案。
{"title":"A Novel Software Defined Networking Framework for Cloud Environments","authors":"Yukun Zhang, B. Li","doi":"10.1109/CSCloud.2016.22","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.22","url":null,"abstract":"Virtual network management is a basic component provided by cloud computing system. In cloud environment, the fact that VMs in the same subnet are located in different hosts, the traffic of VMs attached to different users should be isolated, the VM would be migrated to other hosts makes network management different from that in physical network. Technology like overlay and SDN is usually introduced to establish a reliable and efficient virtual network management scheme. However, there are many drawbacks such as flexibility and hardware costs in most schemes introducing technology above-mentioned. We addressing these problems by designing a scheme on the hyper-visor layer of physical hosts based on overlay and SDN technology, which means the tradition virtual network can be easily transformed to our system without purchasing new devices supported OpenFlow or VXLAN(a kind of technology in overlay) protocol. Besides additional functions like monitor and traffic mirror can be customized by users' needs for the system's flexibility and scalability the SDN technology endowing. We also design a Distributed Virtual Router(DVR) on each host to solve the general problem of traffic between Internet and Intranet concentrating in most schemes. The experimental evaluation shows that our system has achieve the basic intercommunication under the situation of tenant isolation and its performance of communication between Internet and Intranet acts obviously better than that in OpenStack scheme for our DVR design.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114974816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph 利用知识图谱驱动网络安全生态系统过滤过程
C. Asamoah, Lixin Tao, Keke Gai, Ning Jiang
Cyber Security breaches and attacks are on the ascendancy as corporations, governments, universities, and private individuals are conducting their business and personal transactions on the web. This increasing participating on the web necessitates that robust and efficient cyber security systems need to be put in place by these entities to safeguard their cyber assets. Intelligent Systems needs to be employed to buttress the cyber security protocols established in cloud computing for proper decision-making, which may depend on the effective knowledge representation. However, as one of the dominant industry standards for knowledge representation, Web Ontology Language (OWL) has limitations, such as the lack of support for custom relations. Pace University has extended OWL to support Knowledge Graph as a replacement to better support knowledge representation and decision making. This paper examines using KG as the basis in the design of a knowledge-representation system that drives the filtration process of a company's cyber security ecosystem in cloud computing by employing a use case of cyber security communications in-order to identify the entity relations of threat types for the filtration process.
随着企业、政府、大学和个人在网络上进行商业和个人交易,网络安全漏洞和攻击正在上升。随着网络参与度的不断提高,这些实体需要建立强大而高效的网络安全系统来保护其网络资产。为了实现正确的决策,需要使用智能系统来支持云计算中建立的网络安全协议,而这可能取决于有效的知识表示。然而,作为知识表示的主要行业标准之一,Web本体语言(OWL)存在局限性,如缺乏对定制关系的支持。佩斯大学扩展了OWL来支持知识图谱,以更好地支持知识表示和决策制定。本文将KG作为知识表示系统设计的基础,该系统采用网络安全通信用例来驱动云计算中公司网络安全生态系统的过滤过程,以便识别过滤过程中威胁类型的实体关系。
{"title":"Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph","authors":"C. Asamoah, Lixin Tao, Keke Gai, Ning Jiang","doi":"10.1109/CSCloud.2016.36","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.36","url":null,"abstract":"Cyber Security breaches and attacks are on the ascendancy as corporations, governments, universities, and private individuals are conducting their business and personal transactions on the web. This increasing participating on the web necessitates that robust and efficient cyber security systems need to be put in place by these entities to safeguard their cyber assets. Intelligent Systems needs to be employed to buttress the cyber security protocols established in cloud computing for proper decision-making, which may depend on the effective knowledge representation. However, as one of the dominant industry standards for knowledge representation, Web Ontology Language (OWL) has limitations, such as the lack of support for custom relations. Pace University has extended OWL to support Knowledge Graph as a replacement to better support knowledge representation and decision making. This paper examines using KG as the basis in the design of a knowledge-representation system that drives the filtration process of a company's cyber security ecosystem in cloud computing by employing a use case of cyber security communications in-order to identify the entity relations of threat types for the filtration process.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Threshold Multi-server Protocol for Password-Based Authentication 基于密码认证的阈值多服务器协议
M. Guan, Jiaxing Song, Weidong Liu
Password-based user authentication service is widely used in Internet. Most of the password-based authentication protocols are constructed under the single-server structure that a authencitation server stores cleartext passwords or verification data derived from password and responds to users' authentication request. The security of single-server authentication system is very fragile. In particular, when the server is comprimised, all of users' verification data is exposed to the attacker. Nowadays, development of mobile Internet leads the demand of authentication on roaming device. In this scenario, easily memorable short password and simple secret is accepted by most people despite of its security limitation. The utilization of short password worsens the situation of single-server authentication protocol. Attackers controlling the system can launch off-line dictionary attack from internal of server side to obtain users' original password. Multi-server authentication protocols can improve the security of verification data by distributed storing data on the cluster. This approach increases the difficulty of internal attack and guarantees security even if a portion of servers in the cluster are controlled by adversary. But in practice, There are some problems in existing multi-server protocols. For example, communicating with multiple servers brings extra network and computational burden to client device. To address these problems, in this paper we propose a novel password-based multi-server authenication protocol which not only require less computation on client device but remain functional and secure even if adversary controls some servers and forces them collude to attack our protocol.
基于密码的用户认证服务在互联网中得到了广泛的应用。大多数基于密码的认证协议都是在单服务器结构下构建的,即认证服务器存储明文密码或由密码导出的验证数据,并响应用户的认证请求。单服务器认证系统的安全性非常脆弱。特别是,当服务器被攻破时,所有用户的验证数据都会暴露给攻击者。如今,移动互联网的发展带动了对漫游设备认证的需求。在这种情况下,易于记忆的短密码和简单的秘密被大多数人所接受,尽管它的安全限制。短密码的使用加剧了单服务器认证协议的现状。控制系统的攻击者可以从服务器端内部发起离线字典攻击,获取用户的原始密码。多服务器认证协议通过在集群中分布式存储验证数据,提高了验证数据的安全性。这种方法增加了内部攻击的难度,即使集群中的一部分服务器被对手控制,也能保证安全性。但是在实际应用中,现有的多服务器协议存在一些问题。例如,与多个服务器通信会给客户端设备带来额外的网络和计算负担。为了解决这些问题,本文提出了一种新的基于密码的多服务器认证协议,该协议不仅在客户端设备上需要较少的计算,而且即使对手控制一些服务器并迫使它们串通攻击我们的协议,也能保持功能和安全性。
{"title":"A Threshold Multi-server Protocol for Password-Based Authentication","authors":"M. Guan, Jiaxing Song, Weidong Liu","doi":"10.1109/CSCloud.2016.26","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.26","url":null,"abstract":"Password-based user authentication service is widely used in Internet. Most of the password-based authentication protocols are constructed under the single-server structure that a authencitation server stores cleartext passwords or verification data derived from password and responds to users' authentication request. The security of single-server authentication system is very fragile. In particular, when the server is comprimised, all of users' verification data is exposed to the attacker. Nowadays, development of mobile Internet leads the demand of authentication on roaming device. In this scenario, easily memorable short password and simple secret is accepted by most people despite of its security limitation. The utilization of short password worsens the situation of single-server authentication protocol. Attackers controlling the system can launch off-line dictionary attack from internal of server side to obtain users' original password. Multi-server authentication protocols can improve the security of verification data by distributed storing data on the cluster. This approach increases the difficulty of internal attack and guarantees security even if a portion of servers in the cluster are controlled by adversary. But in practice, There are some problems in existing multi-server protocols. For example, communicating with multiple servers brings extra network and computational burden to client device. To address these problems, in this paper we propose a novel password-based multi-server authenication protocol which not only require less computation on client device but remain functional and secure even if adversary controls some servers and forces them collude to attack our protocol.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133543402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Keystroke Biometric User Verification Using Hidden Markov Model 使用隐马尔可夫模型的击键生物识别用户验证
M. Ali, Kutub Thakur, C. Tappert, Meikang Qiu
Biometric systems such as fingerprint, iris, DNA became popular methods in user authentication. Compared to these biometric systems, keystroke biometric authentication systems have not gained so much attention because of lower accuracy compared to other biometric systems. A number of researches have been conducted on keystroke biometric using different generative and discriminative classifiers. As Hidden Markov Models have proven a great success in voice recognition, this study investigates Hidden Markov Models in keystroke dynamic. This paper proposes a novel user verification technique using 1-substate Hidden Markov Model through keystroke dynamic. To verify the effectiveness of the proposed system, extensive experiments have been conducted and 80% accuracy was achieved by the proposed system.
指纹、虹膜、DNA等生物识别系统成为用户认证的常用方法。与这些生物识别系统相比,击键生物识别认证系统由于准确性较低而没有得到太多关注。使用不同的生成分类器和判别分类器对击键生物识别进行了大量的研究。由于隐马尔可夫模型在语音识别中取得了巨大的成功,本研究对隐马尔可夫模型在按键动态中的应用进行了研究。本文提出了一种新的基于1-子态隐马尔可夫模型的用户验证技术。为了验证所提系统的有效性,进行了大量的实验,所提系统的准确率达到80%。
{"title":"Keystroke Biometric User Verification Using Hidden Markov Model","authors":"M. Ali, Kutub Thakur, C. Tappert, Meikang Qiu","doi":"10.1109/CSCloud.2016.23","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.23","url":null,"abstract":"Biometric systems such as fingerprint, iris, DNA became popular methods in user authentication. Compared to these biometric systems, keystroke biometric authentication systems have not gained so much attention because of lower accuracy compared to other biometric systems. A number of researches have been conducted on keystroke biometric using different generative and discriminative classifiers. As Hidden Markov Models have proven a great success in voice recognition, this study investigates Hidden Markov Models in keystroke dynamic. This paper proposes a novel user verification technique using 1-substate Hidden Markov Model through keystroke dynamic. To verify the effectiveness of the proposed system, extensive experiments have been conducted and 80% accuracy was achieved by the proposed system.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1