首页 > 最新文献

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

英文 中文
A High Performance and High Reliability Storage Server for Parallel File System 一种高性能、高可靠性的并行文件系统存储服务器
Liang Ming, D. Feng, F. Wang, H. Sun, Sen Wu
To meet the increasingly demand of massive storage system, we have designed and implemented a parallel file system called Cappella. It consists of Client, Object Storage Server (OSS) and Metadata Server (MDS). Its I/O performance and data reliability mostly rely on the OSS. In this paper, we present the design and implementation of the OSS. By comparing with existing OSS implementation, our OSS can easily achieve high performance and high reliability by an operation abstraction layer.
为了满足海量存储系统日益增长的需求,我们设计并实现了并行文件系统Cappella。由客户端、OSS (Object Storage Server)和MDS (Metadata Server)三部分组成。它的I/O性能和数据可靠性主要依赖于OSS。在本文中,我们提出了OSS的设计和实现。通过与现有OSS实现的比较,我们的OSS通过一个操作抽象层可以很容易地实现高性能和高可靠性。
{"title":"A High Performance and High Reliability Storage Server for Parallel File System","authors":"Liang Ming, D. Feng, F. Wang, H. Sun, Sen Wu","doi":"10.1109/CyberC.2012.20","DOIUrl":"https://doi.org/10.1109/CyberC.2012.20","url":null,"abstract":"To meet the increasingly demand of massive storage system, we have designed and implemented a parallel file system called Cappella. It consists of Client, Object Storage Server (OSS) and Metadata Server (MDS). Its I/O performance and data reliability mostly rely on the OSS. In this paper, we present the design and implementation of the OSS. By comparing with existing OSS implementation, our OSS can easily achieve high performance and high reliability by an operation abstraction layer.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Internet of Things in Power-Line Monitoring 物联网在电力线监控中的应用
X. Chen, Limin Sun, Hongsong Zhu, Y. Zhen, Hongbin Chen
The Internet of Things (IoT) has been considered as the third revolution in the digital technology after the computer and the Internet, and it brings significant advantages to smart grid. Disaster prediction and prevention of power-lines is one of the most difficult problems for electricity transmission companies. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the power-lines, and hence improve the reliability and stability of power transmission. In this paper, a three-layer architecture model of the Internet of things for smart grid (SG-IoT) is proposed. An overview of the key technologies in SG-IoT is given. An IoT based power-lines online monitoring system is presented.
物联网(IoT)被认为是继计算机和互联网之后的第三次数字技术革命,它给智能电网带来了显著的优势。输电线路的灾害预测与预防是输电公司面临的难题之一。物联网先进的传感和通信技术可以有效避免或减少自然灾害对电力线路的破坏,从而提高电力传输的可靠性和稳定性。本文提出了一种智能电网物联网(SG-IoT)的三层架构模型。概述了SG-IoT的关键技术。提出了一种基于物联网的电力线在线监测系统。
{"title":"Application of Internet of Things in Power-Line Monitoring","authors":"X. Chen, Limin Sun, Hongsong Zhu, Y. Zhen, Hongbin Chen","doi":"10.1109/CyberC.2012.77","DOIUrl":"https://doi.org/10.1109/CyberC.2012.77","url":null,"abstract":"The Internet of Things (IoT) has been considered as the third revolution in the digital technology after the computer and the Internet, and it brings significant advantages to smart grid. Disaster prediction and prevention of power-lines is one of the most difficult problems for electricity transmission companies. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the power-lines, and hence improve the reliability and stability of power transmission. In this paper, a three-layer architecture model of the Internet of things for smart grid (SG-IoT) is proposed. An overview of the key technologies in SG-IoT is given. An IoT based power-lines online monitoring system is presented.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Collection System for Pressure Information of Buildings Based on the IoT and CAN Bus 基于物联网和CAN总线的楼宇压力信息采集系统
Weiyuan Sun, Xing Chen, Fangyi Liu, Liang Zhao
To monitor the healthy status of the buildings, such as buildings and houses, it is necessary to collect the pressure information of these buildings. For the defects of traditional pressure information collection system, the paper designs a system to collect the pressure information of buildings. The presented system combines the IoT and CAN bus to improve the quality of collection. Our system sends the pressure information from sensors to the data processing center through the CAN bus. Because some information collected by sensors is incomplete, so the system will fill the incomplete pressure information before storing the pressure information into the database. Simulation experiments show the system can collect the pressure information of buildings in real time and provide the experts with some useful information.
为了监测建筑物和房屋等建筑物的健康状态,有必要收集这些建筑物的压力信息。针对传统压力信息采集系统存在的缺陷,设计了一种建筑压力信息采集系统。该系统结合了物联网和CAN总线,提高了采集质量。本系统通过CAN总线将传感器的压力信息发送到数据处理中心。由于传感器采集到的一些信息是不完整的,所以系统在将不完整的压力信息填充后,将压力信息存储到数据库中。仿真实验表明,该系统能够实时采集建筑物的压力信息,为专家提供一些有用的信息。
{"title":"Collection System for Pressure Information of Buildings Based on the IoT and CAN Bus","authors":"Weiyuan Sun, Xing Chen, Fangyi Liu, Liang Zhao","doi":"10.1109/CyberC.2012.53","DOIUrl":"https://doi.org/10.1109/CyberC.2012.53","url":null,"abstract":"To monitor the healthy status of the buildings, such as buildings and houses, it is necessary to collect the pressure information of these buildings. For the defects of traditional pressure information collection system, the paper designs a system to collect the pressure information of buildings. The presented system combines the IoT and CAN bus to improve the quality of collection. Our system sends the pressure information from sensors to the data processing center through the CAN bus. Because some information collected by sensors is incomplete, so the system will fill the incomplete pressure information before storing the pressure information into the database. Simulation experiments show the system can collect the pressure information of buildings in real time and provide the experts with some useful information.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient TCB for a Generic Content Distribution System 通用内容分发系统的高效TCB
S. Mohanty, A. Velagapalli, M. Ramkumar
We consider the security requirements for a broad class of content distribution systems where the content distribution infrastructure is required to strictly abide by access control policies prescribed by owners of content. We propose a security solution that identifies a minimal trusted computing base (TCB) for a content distribution infrastructure, and leverages the TCB to provide all desired assurances regarding the operation of the infrastructure. It is assumed that the contents and access control policies associated with contents are dynamic.
我们考虑了广泛类别的内容分发系统的安全需求,其中内容分发基础设施需要严格遵守内容所有者规定的访问控制策略。我们提出了一种安全解决方案,该解决方案为内容分发基础设施确定最小可信计算基础(TCB),并利用TCB提供有关基础设施操作的所有所需保证。假设内容和与内容关联的访问控制策略是动态的。
{"title":"An Efficient TCB for a Generic Content Distribution System","authors":"S. Mohanty, A. Velagapalli, M. Ramkumar","doi":"10.1109/CyberC.2012.11","DOIUrl":"https://doi.org/10.1109/CyberC.2012.11","url":null,"abstract":"We consider the security requirements for a broad class of content distribution systems where the content distribution infrastructure is required to strictly abide by access control policies prescribed by owners of content. We propose a security solution that identifies a minimal trusted computing base (TCB) for a content distribution infrastructure, and leverages the TCB to provide all desired assurances regarding the operation of the infrastructure. It is assumed that the contents and access control policies associated with contents are dynamic.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Multi-Objective Optimization Framework for Cluster-Based Wireless Sensor Networks 基于集群的无线传感器网络多目标优化框架
Chi-Tsun Cheng, H. Leung
Wireless sensor nodes are battery-powered communication devices. Their limited capabilities have imposed various constraints to the system design of wireless sensor networks (WSNs). These constraints are interrelated, and are usually in conflict with each other. Clustering is often used to reduce energy consumption in WSNs. However, an arbitrary selection of clustering parameters may lead to severe degradation in other aspects, such as extra delays in data collection processes (DCPs). In this paper, a multi-objective optimization (MOO) framework for cluster-based WSNs is proposed. The proposed framework considers both the energy consumption and the duration of a DCP as its objective functions. Simulation results show that networks optimized using the proposed framework can obtain reasonable trade-offs between the two objectives. Nevertheless, the networks optimized using the proposed framework can obtain non-dominated solutions that cannot be achieved by using energy-aware clustering algorithms.
无线传感器节点是由电池供电的通信设备。它们有限的性能给无线传感器网络(WSNs)的系统设计带来了各种限制。这些约束是相互关联的,并且通常彼此冲突。在无线传感器网络中,聚类通常用于降低能耗。但是,任意选择聚类参数可能会导致其他方面的严重退化,例如数据收集过程(dcp)的额外延迟。提出了一种基于聚类的无线传感器网络多目标优化框架。提出的框架将能量消耗和DCP持续时间作为其目标函数。仿真结果表明,使用该框架优化的网络可以在两个目标之间获得合理的权衡。然而,使用该框架优化的网络可以获得非支配解,这是使用能量感知聚类算法无法实现的。
{"title":"A Multi-Objective Optimization Framework for Cluster-Based Wireless Sensor Networks","authors":"Chi-Tsun Cheng, H. Leung","doi":"10.1109/CyberC.2012.64","DOIUrl":"https://doi.org/10.1109/CyberC.2012.64","url":null,"abstract":"Wireless sensor nodes are battery-powered communication devices. Their limited capabilities have imposed various constraints to the system design of wireless sensor networks (WSNs). These constraints are interrelated, and are usually in conflict with each other. Clustering is often used to reduce energy consumption in WSNs. However, an arbitrary selection of clustering parameters may lead to severe degradation in other aspects, such as extra delays in data collection processes (DCPs). In this paper, a multi-objective optimization (MOO) framework for cluster-based WSNs is proposed. The proposed framework considers both the energy consumption and the duration of a DCP as its objective functions. Simulation results show that networks optimized using the proposed framework can obtain reasonable trade-offs between the two objectives. Nevertheless, the networks optimized using the proposed framework can obtain non-dominated solutions that cannot be achieved by using energy-aware clustering algorithms.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114707805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems 上下文感知系统中隐私保护的概念框架与评述
A. Pandit, Anup Kumar
Advent of 4 G networks, IPv6 and increasing number of subscribers to these indicate that each mobile device will have its own IP address and virtually become a hotspot. In the coming years, systems that track and record our movements will indispensably be integrated in our everyday life. Location-based systems: dashboard navigation systems, Internet enabled smart phones with GPS features, and electronic tags that help us at various locations are extensively in use. In near future, location-aware/ context aware tools will become more common and sophisticated. Increasing number of services (apps)/devices that will track not only the location, but also the context / environment of the user will enter the market. The perils of exposure on Internet and subsequent exploitation have been widely recorded in literature. Some of the services provided do necessitate the knowledge of exact location, context and some personal details, like in case of assistance during accidents, but generally, applications like finding the restaurants or movies playing in an area do not require the exact location and context of the user. When a user's movement in public spaces is tracked and systematically recorded along with the context of his actions, his contextual privacy is under threat. This paper surveys current state of research in this area and analyses the effect of threat on the privacy of context aware system users. Based on the insight, we propose a novel framework to tackle the privacy preservation issue comprehensively: from user perspective as well as service provider perspective.
4g网络、IPv6的出现以及用户数量的增加表明,每个移动设备都将拥有自己的IP地址,并实际上成为一个热点。在未来几年,跟踪和记录我们运动的系统将不可缺少地融入我们的日常生活。基于位置的系统:仪表盘导航系统,具有GPS功能的互联网智能手机,以及在不同位置帮助我们的电子标签被广泛使用。在不久的将来,位置感知/上下文感知工具将变得更加普遍和复杂。越来越多的服务(应用程序)/设备将进入市场,这些服务(应用程序)/设备不仅可以跟踪位置,还可以跟踪用户的背景/环境。在互联网上曝光和随后的剥削的危险已经在文学中广泛记录。提供的一些服务确实需要了解确切的位置、环境和一些个人细节,比如在发生事故时提供帮助,但通常情况下,寻找某个地区的餐馆或电影等应用程序不需要用户的确切位置和环境。当一个用户在公共空间的活动被跟踪并系统地记录下来时,他的上下文隐私就受到了威胁。本文综述了该领域的研究现状,分析了威胁对上下文感知系统用户隐私的影响。在此基础上,我们提出了一个从用户视角和服务提供商视角全面解决隐私保护问题的新框架。
{"title":"Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems","authors":"A. Pandit, Anup Kumar","doi":"10.1109/CyberC.2012.79","DOIUrl":"https://doi.org/10.1109/CyberC.2012.79","url":null,"abstract":"Advent of 4 G networks, IPv6 and increasing number of subscribers to these indicate that each mobile device will have its own IP address and virtually become a hotspot. In the coming years, systems that track and record our movements will indispensably be integrated in our everyday life. Location-based systems: dashboard navigation systems, Internet enabled smart phones with GPS features, and electronic tags that help us at various locations are extensively in use. In near future, location-aware/ context aware tools will become more common and sophisticated. Increasing number of services (apps)/devices that will track not only the location, but also the context / environment of the user will enter the market. The perils of exposure on Internet and subsequent exploitation have been widely recorded in literature. Some of the services provided do necessitate the knowledge of exact location, context and some personal details, like in case of assistance during accidents, but generally, applications like finding the restaurants or movies playing in an area do not require the exact location and context of the user. When a user's movement in public spaces is tracked and systematically recorded along with the context of his actions, his contextual privacy is under threat. This paper surveys current state of research in this area and analyses the effect of threat on the privacy of context aware system users. Based on the insight, we propose a novel framework to tackle the privacy preservation issue comprehensively: from user perspective as well as service provider perspective.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Sequential Scheduling in Space Missions 空间任务中的顺序调度
Jinjiang Xing, Yan Zhang, Jian Li, Yuncheng Feng
By analyzing the defects of traditional scheduling in space missions, sequential mission scheduling architecture, SMSA, is proposed in this paper to cope with progressively increasing number of state modes of spacecrafts and space missions. The improvements of SMSA lie in both methodologies and ideologies, which make it closer to the core of resource and activity scheduling. The key technologies that the scheduling architecture concerns are indicated and the typical process of scheduling is given. With this methodology as well as corresponding software and systems, human work spent in mission scheduling can be remarkably reduced. And also, efficiency in mission scheduling and flexibility of emergency control is increased. SMSA reveals brand new trends of research and development for the upcoming 10 years of China's space explorations.
通过分析传统空间任务调度方法的缺陷,提出了一种序列任务调度体系结构SMSA,以适应航天器和空间任务状态模式不断增多的情况。SMSA的改进主要体现在方法和思想上,使其更接近资源和活动调度的核心。指出了调度体系结构所涉及的关键技术,并给出了典型的调度过程。使用这种方法以及相应的软件和系统,可以显著减少在任务调度中花费的人力。提高了任务调度的效率和应急控制的灵活性。SMSA揭示了未来10年中国空间探索的全新研发趋势。
{"title":"Sequential Scheduling in Space Missions","authors":"Jinjiang Xing, Yan Zhang, Jian Li, Yuncheng Feng","doi":"10.1109/CyberC.2012.57","DOIUrl":"https://doi.org/10.1109/CyberC.2012.57","url":null,"abstract":"By analyzing the defects of traditional scheduling in space missions, sequential mission scheduling architecture, SMSA, is proposed in this paper to cope with progressively increasing number of state modes of spacecrafts and space missions. The improvements of SMSA lie in both methodologies and ideologies, which make it closer to the core of resource and activity scheduling. The key technologies that the scheduling architecture concerns are indicated and the typical process of scheduling is given. With this methodology as well as corresponding software and systems, human work spent in mission scheduling can be remarkably reduced. And also, efficiency in mission scheduling and flexibility of emergency control is increased. SMSA reveals brand new trends of research and development for the upcoming 10 years of China's space explorations.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128992542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analysis on the Delay-Aware Data Collection Network Structure Using Pareto Optimality 基于Pareto最优的延迟感知数据采集网络结构分析
Chi-Tsun Cheng, C. K. Tse
Clustering techniques are effective techniques in reducing energy consumption in wireless sensor networks (WSNs). A data collection process (DCP) is an operation for a base station (BS) to collect a complete set of data from a WSN. Clustering techniques may, however, introduce bottlenecks to a DCP and cause extra delays. For time-sensitive applications, a delay-aware network structure is necessary. A delay-aware network structure should not only minimize the duration of a single DCP, but also shorten the duration of consecutive DCPs. Furthermore, for better sensing quality, a delay-aware network structure should try to accommodate as many wireless sensor nodes as possible. This paper investigates the trade-offs among the above objective functions in a delay-aware data collection network structure using the concepts of Pareto optimality. The analyses provide an insight into selecting the most suitable network parameters.
聚类技术是降低无线传感器网络能耗的有效技术。数据收集过程(DCP)是基站(BS)从无线传感器网络(WSN)收集一整套数据的操作。然而,集群技术可能会给DCP带来瓶颈,并导致额外的延迟。对于时间敏感的应用,延迟感知网络结构是必要的。延迟感知网络结构不仅要使单个DCP的持续时间最小化,而且要缩短连续DCP的持续时间。此外,为了获得更好的传感质量,延迟感知网络结构应该尝试容纳尽可能多的无线传感器节点。本文利用帕累托最优的概念研究了延迟感知数据采集网络结构中上述目标函数之间的权衡。这些分析为选择最合适的网络参数提供了见解。
{"title":"An Analysis on the Delay-Aware Data Collection Network Structure Using Pareto Optimality","authors":"Chi-Tsun Cheng, C. K. Tse","doi":"10.1109/CyberC.2012.65","DOIUrl":"https://doi.org/10.1109/CyberC.2012.65","url":null,"abstract":"Clustering techniques are effective techniques in reducing energy consumption in wireless sensor networks (WSNs). A data collection process (DCP) is an operation for a base station (BS) to collect a complete set of data from a WSN. Clustering techniques may, however, introduce bottlenecks to a DCP and cause extra delays. For time-sensitive applications, a delay-aware network structure is necessary. A delay-aware network structure should not only minimize the duration of a single DCP, but also shorten the duration of consecutive DCPs. Furthermore, for better sensing quality, a delay-aware network structure should try to accommodate as many wireless sensor nodes as possible. This paper investigates the trade-offs among the above objective functions in a delay-aware data collection network structure using the concepts of Pareto optimality. The analyses provide an insight into selecting the most suitable network parameters.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain 实数域上初等运算的同态加密算法
Zhang Tong, Wu Qi, Liu Wen, Chen Liang
Based on the homomorphism of Lee et al, Xiang Guangli et al proposed similar module and implemented encrypting operations of addition, subtraction, multiplication and division over real number domain. There was additive and multiplicative homomorphism heretofore. But their cipher text leaks the information of decimal fraction, sign and relationship of big and small. We propose additive, subtractive, multiplicative and divisive homomorphism over real number domain based on representation of real number by positive integer and Fermat's Little Theorem. We prove the security and correctness of the proposed homomorphism encryption system. The results of instances show that there are no the problems mentioned above in our algorithm.
在Lee等人同态的基础上,向广利等人提出了相似的模块,并在实数域上实现了加、减、乘、除的加密运算。在此之前存在着加法同态和乘法同态。而他们的密文泄露了小数、符号和大小关系的信息。基于实数的正整数表示和费马小定理,提出了实数域上的加、减、乘、分同态。证明了所提出的同态加密系统的安全性和正确性。实例结果表明,该算法不存在上述问题。
{"title":"Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain","authors":"Zhang Tong, Wu Qi, Liu Wen, Chen Liang","doi":"10.1109/CYBERC.2012.35","DOIUrl":"https://doi.org/10.1109/CYBERC.2012.35","url":null,"abstract":"Based on the homomorphism of Lee et al, Xiang Guangli et al proposed similar module and implemented encrypting operations of addition, subtraction, multiplication and division over real number domain. There was additive and multiplicative homomorphism heretofore. But their cipher text leaks the information of decimal fraction, sign and relationship of big and small. We propose additive, subtractive, multiplicative and divisive homomorphism over real number domain based on representation of real number by positive integer and Fermat's Little Theorem. We prove the security and correctness of the proposed homomorphism encryption system. The results of instances show that there are no the problems mentioned above in our algorithm.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Provably Secure Identity-Based Aggregate Signature Scheme 可证明安全的基于身份的聚合签名方案
J. Kar
This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length. The proposed scheme can be implimentated on Wireless Sensor Networks application. Security of the proposed scheme is based on difficulty of breaking Bilinear Diffie-Hellman problem (BDHP). The scheme is secure in random oracle models under the assumption of computational infeasibility of solving BDHP. It is existential unforgerable under adaptive-chosen-identity and adaptive-chosen-message attack In On-line/Off-line signature scheme, the signing process can be broken into two phases. The first phase, performed off-line, is independent of the particular message to be signed, while the second phase is performed on-line, once the message is presented.
提出了一种高效、安全的基于身份的随机预言机在线和离线聚合签名方案。聚合签名提供了一种将n个不同消息的n个不同签名组合成一个固定长度的签名的技术。该方案可在无线传感器网络中实现。该方案的安全性基于双线性Diffie-Hellman问题(BDHP)的难解性。在求解BDHP计算不可行的假设下,该方案在随机oracle模型下是安全的。在自适应选择身份攻击和自适应选择消息攻击下,签名是存在不可伪造的。第一阶段脱机执行,独立于要签名的特定消息,而第二阶段在消息出现后在线执行。
{"title":"Provably Secure Identity-Based Aggregate Signature Scheme","authors":"J. Kar","doi":"10.1109/CyberC.2012.30","DOIUrl":"https://doi.org/10.1109/CyberC.2012.30","url":null,"abstract":"This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length. The proposed scheme can be implimentated on Wireless Sensor Networks application. Security of the proposed scheme is based on difficulty of breaking Bilinear Diffie-Hellman problem (BDHP). The scheme is secure in random oracle models under the assumption of computational infeasibility of solving BDHP. It is existential unforgerable under adaptive-chosen-identity and adaptive-chosen-message attack In On-line/Off-line signature scheme, the signing process can be broken into two phases. The first phase, performed off-line, is independent of the particular message to be signed, while the second phase is performed on-line, once the message is presented.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1