首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Efficient Task Offloading for Mobile Edge Computing in Vehicular Networks 车载网络中移动边缘计算的高效任务卸载
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-17 DOI: 10.4018/ijdcf.349133
Xiao Han, Huiqiang Wang, Guoliang Yang, Chengbo Wang
In vechcular networks, a promising approach to enhance vehicle task processing capabilities involves using a combination of roadside base stations or vehicles, there are two challenges when integrating the two offloading modeth: 1) the high mobility of vehicles can easily lead to connectivity interruptions between nodes, which in turn affects the processing of the tasks that are being offloaded; and 2) vehicles on the road are not completely trustworthy, and vehicle tasks that contain private information may suffer from result errors or privacy leakage and other problems. This paper investigates the computing offloading problem for minimizing task completion delay in vehicular networks. Specifically, we design a trust model for mobile in-vehicle networks and construct a migration decision problem to minimize the overall delay of task execution for all vehicle users. The simulation results show that the scheme proposed in this paper can effectively reduce the execution delay of the task compared to the baseline scheme.
在车载网络中,利用路边基站或车辆组合来增强车辆任务处理能力是一种很有前景的方法,但这两种卸载模式的整合存在两个挑战:1)车辆的高流动性容易导致节点间的连接中断,进而影响被卸载任务的处理;2)道路上的车辆并非完全可信,包含隐私信息的车辆任务可能会出现结果错误或隐私泄露等问题。本文研究了计算卸载问题,以尽量减少车载网络中的任务完成延迟。具体来说,我们为移动车载网络设计了一个信任模型,并构建了一个迁移决策问题,以最小化所有车辆用户执行任务的总体延迟。仿真结果表明,与基线方案相比,本文提出的方案能有效减少任务的执行延迟。
{"title":"Efficient Task Offloading for Mobile Edge Computing in Vehicular Networks","authors":"Xiao Han, Huiqiang Wang, Guoliang Yang, Chengbo Wang","doi":"10.4018/ijdcf.349133","DOIUrl":"https://doi.org/10.4018/ijdcf.349133","url":null,"abstract":"In vechcular networks, a promising approach to enhance vehicle task processing capabilities involves using a combination of roadside base stations or vehicles, there are two challenges when integrating the two offloading modeth: 1) the high mobility of vehicles can easily lead to connectivity interruptions between nodes, which in turn affects the processing of the tasks that are being offloaded; and 2) vehicles on the road are not completely trustworthy, and vehicle tasks that contain private information may suffer from result errors or privacy leakage and other problems. This paper investigates the computing offloading problem for minimizing task completion delay in vehicular networks. Specifically, we design a trust model for mobile in-vehicle networks and construct a migration decision problem to minimize the overall delay of task execution for all vehicle users. The simulation results show that the scheme proposed in this paper can effectively reduce the execution delay of the task compared to the baseline scheme.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141829963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examining the Behavior of Web Browsers Using Popular Forensic Tools 使用流行的取证工具检查网络浏览器的行为
IF 0.6 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-17 DOI: 10.4018/ijdcf.349218
Emad-ul-Haq Qazi, Tanveer A. Zia, Areej Muqbil Alotibi, Salem Yahya Altaleedi
Mobile phones and computers are widely used devices these days, with almost everyone carrying a smartphone and multiple personal computing devices at their homes. Unfortunately, the perpetrator exploits these devices for their unlawful activities. They employ various tactics such as sending phishing emails, and malicious links to harvest confidential information and exploit users. The perpetrators often leave traces on search engines, where they search for illegal materials and weapons, or send threatening emails to victims. This paper primarily focuses on locating and retrieving browsers' artifacts while considering the challenges posed by private browsing modes, which perpetrator may use to cover their tracks. The study also compares well-known search engines like Edge, Safari, and Firefox, analyzing the strengths and weaknesses of their directories. Moreover, it explores evidence extraction from smartphones, comparing the success rates between rooted or jailbroken phones and evidence obtained from browsers versus applications.
如今,手机和电脑已成为广泛使用的设备,几乎每个人都会随身携带一部智能手机和多部个人计算设备。不幸的是,犯罪分子利用这些设备进行非法活动。他们采用各种策略,如发送网络钓鱼电子邮件和恶意链接,以获取机密信息并剥削用户。犯罪者通常会在搜索引擎上留下痕迹,搜索非法材料和武器,或向受害者发送恐吓邮件。本文主要侧重于定位和检索浏览器的人工痕迹,同时考虑了私人浏览模式带来的挑战,犯罪者可能会利用私人浏览模式来掩盖他们的踪迹。研究还比较了 Edge、Safari 和 Firefox 等知名搜索引擎,分析了它们目录的优缺点。此外,研究还探讨了从智能手机中提取证据的问题,比较了已root或已越狱手机的成功率,以及从浏览器和应用程序中获取的证据。
{"title":"Examining the Behavior of Web Browsers Using Popular Forensic Tools","authors":"Emad-ul-Haq Qazi, Tanveer A. Zia, Areej Muqbil Alotibi, Salem Yahya Altaleedi","doi":"10.4018/ijdcf.349218","DOIUrl":"https://doi.org/10.4018/ijdcf.349218","url":null,"abstract":"Mobile phones and computers are widely used devices these days, with almost everyone carrying a smartphone and multiple personal computing devices at their homes. Unfortunately, the perpetrator exploits these devices for their unlawful activities. They employ various tactics such as sending phishing emails, and malicious links to harvest confidential information and exploit users. The perpetrators often leave traces on search engines, where they search for illegal materials and weapons, or send threatening emails to victims. This paper primarily focuses on locating and retrieving browsers' artifacts while considering the challenges posed by private browsing modes, which perpetrator may use to cover their tracks. The study also compares well-known search engines like Edge, Safari, and Firefox, analyzing the strengths and weaknesses of their directories. Moreover, it explores evidence extraction from smartphones, comparing the success rates between rooted or jailbroken phones and evidence obtained from browsers versus applications.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141830366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm 基于深度学习算法的实验室危险操作行为检测系统
IF 0.7 Q3 Computer Science Pub Date : 2024-03-19 DOI: 10.4018/ijdcf.340934
Dawei Zhang
Aiming at the problem that dangerous operation behaviors in the laboratory is difficult to identify by monitoring the video. An algorithm of dangerous operation behavior detection in multi-task laboratory based on improved YOLOv5 structure is proposed. Firstly, the algorithm enhances, adaptively scales, and adaptively anchors box computing on the input of YOLO network. Then convolution operation is carried out to strengthen the ability of network feature fusion. Finally, the GIoU_Loss function is used at the output to optimize the network parameters and accelerate the convergence of the model. The experimental results show that the algorithm performs well in real-time head localization, head segmentation, and population regression, with significant innovation and superiority. Compared with traditional methods, this algorithm has better accuracy and real-time performance and can more effectively achieve human operation behaviors detection in laboratory application environments.
针对实验室中危险操作行为难以通过监控视频识别的问题。提出了一种基于改进的 YOLOv5 结构的多任务实验室危险操作行为检测算法。首先,该算法对 YOLO 网络的输入进行增强、自适应缩放和自适应锚定框计算。然后进行卷积运算,加强网络特征融合能力。最后,在输出端使用 GIoU_Loss 函数优化网络参数,加速模型收敛。实验结果表明,该算法在实时头部定位、头部分割和群体回归方面表现良好,具有显著的创新性和优越性。与传统方法相比,该算法具有更好的准确性和实时性,能更有效地实现实验室应用环境下的人体操作行为检测。
{"title":"Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm","authors":"Dawei Zhang","doi":"10.4018/ijdcf.340934","DOIUrl":"https://doi.org/10.4018/ijdcf.340934","url":null,"abstract":"Aiming at the problem that dangerous operation behaviors in the laboratory is difficult to identify by monitoring the video. An algorithm of dangerous operation behavior detection in multi-task laboratory based on improved YOLOv5 structure is proposed. Firstly, the algorithm enhances, adaptively scales, and adaptively anchors box computing on the input of YOLO network. Then convolution operation is carried out to strengthen the ability of network feature fusion. Finally, the GIoU_Loss function is used at the output to optimize the network parameters and accelerate the convergence of the model. The experimental results show that the algorithm performs well in real-time head localization, head segmentation, and population regression, with significant innovation and superiority. Compared with traditional methods, this algorithm has better accuracy and real-time performance and can more effectively achieve human operation behaviors detection in laboratory application environments.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140230485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers 针对第三方服务器中存储的音频数据的新型水印方案
IF 0.7 Q3 Computer Science Pub Date : 2024-03-12 DOI: 10.4018/ijdcf.340382
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu
To improve the security and privacy of audio data stored in third party servers, a novel watermarking scheme is proposed. Firstly, the authors split the host signal into frames and scramble each frame to get the encrypted signal. Secondly, they generate watermark bits by using the frame number and embed them into each frame of the encrypted signal, which is the data that will be uploaded to the third party servers. For the users, they can download the encrypted data and verify the data is intact or not. If the data is intact, the users decrypt the data to get the audio signal. If the audio signal is attacked in the process of transmission, they can also locate the location of the attacked frame. The experimental results show that the method proposed is effective not only for encrypted signals, but also for the encrypted signals after decryption.
为了提高存储在第三方服务器上的音频数据的安全性和私密性,提出了一种新颖的水印方案。首先,作者将主机信号分割成帧,并对每一帧进行加扰处理,得到加密信号。其次,他们利用帧号生成水印比特,并将其嵌入加密信号的每一帧,即上传到第三方服务器的数据。对于用户来说,他们可以下载加密数据并验证数据是否完好无损。如果数据完好无损,用户就可以解密数据,获取音频信号。如果音频信号在传输过程中受到攻击,用户还可以定位被攻击帧的位置。实验结果表明,所提出的方法不仅对加密信号有效,而且对解密后的加密信号也有效。
{"title":"A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers","authors":"Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu","doi":"10.4018/ijdcf.340382","DOIUrl":"https://doi.org/10.4018/ijdcf.340382","url":null,"abstract":"To improve the security and privacy of audio data stored in third party servers, a novel watermarking scheme is proposed. Firstly, the authors split the host signal into frames and scramble each frame to get the encrypted signal. Secondly, they generate watermark bits by using the frame number and embed them into each frame of the encrypted signal, which is the data that will be uploaded to the third party servers. For the users, they can download the encrypted data and verify the data is intact or not. If the data is intact, the users decrypt the data to get the audio signal. If the audio signal is attacked in the process of transmission, they can also locate the location of the attacked frame. The experimental results show that the method proposed is effective not only for encrypted signals, but also for the encrypted signals after decryption.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140248845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning 基于信息物理融合和深度学习的网络通信信息安全保障
Q3 Computer Science Pub Date : 2023-10-26 DOI: 10.4018/ijdcf.332858
Shi Cheng, Yan Qu, Chuyue Wang, Jie Wan
The internet brings high efficiency and convenience to society; however, the issue of information security in network communication has significantly affected every aspect of the society. How to ensure the security of this network communication information has become an important research topic. This paper proposes a diagnosis and prediction method based on cyber-physical fusion and deep learning, such as LSTM and CNN, to diagnose and predict network security in a complex network environment. The experiment results showed that the accuracy of network security diagnosis of the LSTM method in the training set was approximately 80%/ After the CNN training process, it has the highest accuracy rate of 95% on the test data set. This paper analysed the nature of network security problems from the perspective of cyber-physical fusion. CNN-based method to diagnose network security can obtain results with a higher accuracy rate so that technicians can better take measures to protect network security.
互联网给社会带来了高效率和便利性;然而,网络通信中的信息安全问题已经严重影响到社会的各个方面。如何保证这种网络通信信息的安全已成为一个重要的研究课题。本文提出了一种基于信息物理融合和深度学习的LSTM、CNN等诊断与预测方法,用于复杂网络环境下的网络安全诊断与预测。实验结果表明,LSTM方法在训练集上的网络安全诊断准确率约为80%/经过CNN训练过程后,在测试数据集上准确率最高,达到95%。本文从信息物理融合的角度分析了网络安全问题的本质。基于cnn的网络安全诊断方法可以获得准确率更高的结果,以便技术人员更好地采取措施保护网络安全。
{"title":"Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning","authors":"Shi Cheng, Yan Qu, Chuyue Wang, Jie Wan","doi":"10.4018/ijdcf.332858","DOIUrl":"https://doi.org/10.4018/ijdcf.332858","url":null,"abstract":"The internet brings high efficiency and convenience to society; however, the issue of information security in network communication has significantly affected every aspect of the society. How to ensure the security of this network communication information has become an important research topic. This paper proposes a diagnosis and prediction method based on cyber-physical fusion and deep learning, such as LSTM and CNN, to diagnose and predict network security in a complex network environment. The experiment results showed that the accuracy of network security diagnosis of the LSTM method in the training set was approximately 80%/ After the CNN training process, it has the highest accuracy rate of 95% on the test data set. This paper analysed the nature of network security problems from the perspective of cyber-physical fusion. CNN-based method to diagnose network security can obtain results with a higher accuracy rate so that technicians can better take measures to protect network security.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135013624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network 基于图神经网络的无人机边缘缓存内容推荐算法
Q3 Computer Science Pub Date : 2023-10-25 DOI: 10.4018/ijdcf.332774
Wei Wang, Longxing Xing, Na Xu, Jiatao Su, Wenting Su, Jiarong Cao
When responding to emergencies such as sudden natural disasters, communication networks face challenges such as network traffic surge and complex geographic environments. Aiming at the problems of high transmission delay and insensitivity to user's preference in the current UAV edge caching strategy, this paper proposes a UAV caching content recommendation algorithm based on graph neural network. Firstly, the location of UAV is determined by clustering algorithm; secondly, the interest preferences of user nodes in the cluster are predicted by GCLRSAN model, and the UAV cache content is designed according to the result; finally, simulation experiments show that the model and algorithm proposed in this paper can effectively reduce the backhaul link overhead and outperform the comparison algorithms in the indexes such as accuracy rate, recall rate, cache hit rate, and transmission delay.
在应对突发性自然灾害等突发事件时,通信网络面临着网络流量激增、地理环境复杂等挑战。针对当前无人机边缘缓存策略存在传输时延高、对用户偏好不敏感等问题,提出了一种基于图神经网络的无人机缓存内容推荐算法。首先,采用聚类算法确定无人机的位置;其次,利用GCLRSAN模型预测集群中用户节点的兴趣偏好,并根据预测结果设计无人机缓存内容;最后,仿真实验表明,本文提出的模型和算法能够有效降低回程链路开销,并在准确率、召回率、缓存命中率和传输延迟等指标上优于比较算法。
{"title":"UAV Edge Caching Content Recommendation Algorithm Based on Graph Neural Network","authors":"Wei Wang, Longxing Xing, Na Xu, Jiatao Su, Wenting Su, Jiarong Cao","doi":"10.4018/ijdcf.332774","DOIUrl":"https://doi.org/10.4018/ijdcf.332774","url":null,"abstract":"When responding to emergencies such as sudden natural disasters, communication networks face challenges such as network traffic surge and complex geographic environments. Aiming at the problems of high transmission delay and insensitivity to user's preference in the current UAV edge caching strategy, this paper proposes a UAV caching content recommendation algorithm based on graph neural network. Firstly, the location of UAV is determined by clustering algorithm; secondly, the interest preferences of user nodes in the cluster are predicted by GCLRSAN model, and the UAV cache content is designed according to the result; finally, simulation experiments show that the model and algorithm proposed in this paper can effectively reduce the backhaul link overhead and outperform the comparison algorithms in the indexes such as accuracy rate, recall rate, cache hit rate, and transmission delay.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Offloading in Cloud-Edge Environments 云边缘环境下的任务卸载
Q3 Computer Science Pub Date : 2023-10-12 DOI: 10.4018/ijdcf.332066
Suzhen Wang, Yongchen Deng, Zhongbo Hu
Cloud computing involves transferring data to remote data centers for processing, which consumes significant network bandwidth and transmission time. Edge computing can effectively address this issue by processing tasks at edge nodes, thereby reducing the amount of data transmitted and enhancing the utilization of network bandwidth. This paper investigates intelligent task offloading under the three-layer architecture of cloud-edge-device to fully exploit the cloud-edge collaboration potential. Specifically, an optimization objective function is constructed by modelling the processing cost of all computing tasks. Additionally, asynchronous advantage actor-critic (A3C) algorithm is proposed under cloud-edge collaboration to solve the optimization problem of minimizing the sum of the weights of task offloading delay and energy consumption. Experimental results indicate that the algorithm can effectively utilize the computing resources of the cloud center, reduce task execution delay and energy consumption, and compare favourably with three existing task offloading methods.
云计算需要将数据传输到远程数据中心进行处理,这将消耗大量的网络带宽和传输时间。边缘计算可以通过在边缘节点处理任务来有效解决这一问题,从而减少数据传输量,提高网络带宽利用率。本文研究了云边缘设备三层架构下的智能任务卸载,以充分挖掘云边缘协作潜力。具体而言,通过对所有计算任务的处理成本建模,构建了优化目标函数。此外,在云边缘协同下,提出了异步优势actor-critic (A3C)算法,解决了任务卸载延迟和能耗权重之和最小的优化问题。实验结果表明,该算法能够有效利用云中心的计算资源,降低任务执行延迟和能耗,并与现有的三种任务卸载方法进行了比较。
{"title":"Task Offloading in Cloud-Edge Environments","authors":"Suzhen Wang, Yongchen Deng, Zhongbo Hu","doi":"10.4018/ijdcf.332066","DOIUrl":"https://doi.org/10.4018/ijdcf.332066","url":null,"abstract":"Cloud computing involves transferring data to remote data centers for processing, which consumes significant network bandwidth and transmission time. Edge computing can effectively address this issue by processing tasks at edge nodes, thereby reducing the amount of data transmitted and enhancing the utilization of network bandwidth. This paper investigates intelligent task offloading under the three-layer architecture of cloud-edge-device to fully exploit the cloud-edge collaboration potential. Specifically, an optimization objective function is constructed by modelling the processing cost of all computing tasks. Additionally, asynchronous advantage actor-critic (A3C) algorithm is proposed under cloud-edge collaboration to solve the optimization problem of minimizing the sum of the weights of task offloading delay and energy consumption. Experimental results indicate that the algorithm can effectively utilize the computing resources of the cloud center, reduce task execution delay and energy consumption, and compare favourably with three existing task offloading methods.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136013668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MD-S3C3 MD-S3C3
IF 0.7 Q3 Computer Science Pub Date : 2023-08-29 DOI: 10.4018/ijdcf.329219
Heng Pan, Yaoyao Zhang, Jianmei Liu, Xueming Si, Zhongyuan Yao, Liang Zhao
In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and difficulties in tracking data sharing. This aarticle proposes a cooperation model of cloud and chain (CMCC) for the secure sharing of medical data. In the CMCC, the power equivalence of blockchain nodes limits the control authority asymmetry between doctors and patients in medical data sharing. Moreover, a cloud server is used to store medical data, and some of the node-side computations are handed over to the cloud, which addresses the asymmetric computing capability asymmetry between the cloud and ordinary nodes. Based on the CMCC, a secure medical data sharing scheme based on proxy re-encryption mechanism is proposed. This scheme realizes secure medical data sharing, especially the patient's complete control of the data. The security and performance analysis show that the proposed scheme outperforms the existing ones.
在医疗数据共享中,共享实体的数据访问控制权限和共享平台的计算能力是不对称的。这种不对称性导致患者对其数据的控制不力、隐私泄露以及跟踪数据共享的困难。本文提出了一种基于云与链的医疗数据安全共享合作模式。在CMCC中,区块链节点的权力对等限制了医疗数据共享中医患之间的控制权限不对称。此外,云服务器用于存储医疗数据,并且一些节点侧计算被移交给云,这解决了云和普通节点之间的不对称计算能力不对称问题。在CMCC的基础上,提出了一种基于代理重加密机制的安全医疗数据共享方案。该方案实现了安全的医疗数据共享,特别是患者对数据的完全控制。安全性和性能分析表明,该方案优于现有方案。
{"title":"MD-S3C3","authors":"Heng Pan, Yaoyao Zhang, Jianmei Liu, Xueming Si, Zhongyuan Yao, Liang Zhao","doi":"10.4018/ijdcf.329219","DOIUrl":"https://doi.org/10.4018/ijdcf.329219","url":null,"abstract":"In medical data sharing, the data access control authorities of the sharing entities and computing capabilities of the sharing platforms are asymmetric. This asymmetry leads to poor patient control over their data, privacy disclosure, and difficulties in tracking data sharing. This aarticle proposes a cooperation model of cloud and chain (CMCC) for the secure sharing of medical data. In the CMCC, the power equivalence of blockchain nodes limits the control authority asymmetry between doctors and patients in medical data sharing. Moreover, a cloud server is used to store medical data, and some of the node-side computations are handed over to the cloud, which addresses the asymmetric computing capability asymmetry between the cloud and ordinary nodes. Based on the CMCC, a secure medical data sharing scheme based on proxy re-encryption mechanism is proposed. This scheme realizes secure medical data sharing, especially the patient's complete control of the data. The security and performance analysis show that the proposed scheme outperforms the existing ones.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49139483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Crime Scene Reconstruction for Digital Forensic Analysis 数字法医分析的犯罪现场重建
IF 0.7 Q3 Computer Science Pub Date : 2023-07-31 DOI: 10.4018/ijdcf.327358
Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, O. Ilesanmi
The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this research, the authors apply DVF methodology to a SUV, simulating a real case by extracting and analyzing the data in the period leading up to an incident to evaluate the effectiveness of DVF in solving crime. The authors employ DVF approach to extract data to reveal evidential information for judicial evaluation and verdict. This data helped determine whether the incident represented an accident or an act of crime. This simulated case and the assumptions supported by the DVF evidence provides a compelling example of how law enforcement agencies can leverage DVF to collect and present evidence to relevant authorities. This form of forensics can assist government in planning for and regulating the deployment of DVF data, the judiciary in assessing the nature and admissibility of evidence, and vehicle manufacturers in complying with the regulations relating to the harvesting and retrieval of data.
现代车辆中丰富的数字数据使数字车辆取证(DVF)成为数字取证(DF)的一个有前途的分支领域,具有巨大的调查潜力。在这项研究中,作者将DVF方法应用于一辆SUV,通过提取和分析事件发生前的数据来模拟真实案例,以评估DVF在解决犯罪方面的有效性。采用DVF方法提取数据,揭示司法评价和判决的证据信息。这些数据有助于确定该事件是意外事故还是犯罪行为。这个模拟案例和DVF证据支持的假设提供了一个令人信服的例子,说明执法机构如何利用DVF收集证据并向有关当局提供证据。这种形式的取证可以帮助政府规划和规范DVF数据的部署,帮助司法机构评估证据的性质和可采性,帮助汽车制造商遵守与收集和检索数据有关的法规。
{"title":"A Crime Scene Reconstruction for Digital Forensic Analysis","authors":"Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, O. Ilesanmi","doi":"10.4018/ijdcf.327358","DOIUrl":"https://doi.org/10.4018/ijdcf.327358","url":null,"abstract":"The abundance of digital data within modern vehicles makes digital vehicle forensics (DVF) a promising subfield of digital forensics (DF), with significant potential for investigations. In this research, the authors apply DVF methodology to a SUV, simulating a real case by extracting and analyzing the data in the period leading up to an incident to evaluate the effectiveness of DVF in solving crime. The authors employ DVF approach to extract data to reveal evidential information for judicial evaluation and verdict. This data helped determine whether the incident represented an accident or an act of crime. This simulated case and the assumptions supported by the DVF evidence provides a compelling example of how law enforcement agencies can leverage DVF to collect and present evidence to relevant authorities. This form of forensics can assist government in planning for and regulating the deployment of DVF data, the judiciary in assessing the nature and admissibility of evidence, and vehicle manufacturers in complying with the regulations relating to the harvesting and retrieval of data.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42579618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder 基于深度自动编码器的实验室监控视频异常检索方法
IF 0.7 Q3 Computer Science Pub Date : 2023-07-07 DOI: 10.4018/ijdcf.325224
Dawei Zhang
Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep automatic encoder is proposed. Firstly, the fuzzy median filtering algorithm is used to reduce the noise of the collected laboratory security surveillance video, and then the YUV spatial chromaticity difference method is used to divide the foreground and background of the video, and the illumination degree in the video is determined. The diagonal model and codebook clustering idea are used to compensate for global and local lighting mutations. Finally, the preprocessed video is input into the mixture model, which is based on the deep automatic encoder and combined with the Gaussian mixture model, and the abnormal behavior retrieval results are output. The experimental results show that the proposed method has good security surveillance video preprocessing effect, large AUC, small error rate of abnormal behavior retrieval, and high operation efficiency.
针对实验室安防监控视频异常行为与正常行为难以区分的问题,提出了一种基于深度自动编码器的实验室安防监控视频异常行为检索方法。首先利用模糊中值滤波算法对采集到的实验室安防监控视频进行降噪处理,然后利用YUV空间色度差法对视频的前景和背景进行分割,确定视频中的照度。对角线模型和码本聚类思想用于补偿全局和局部光照突变。最后,将预处理后的视频输入到基于深度自动编码器并结合高斯混合模型的混合模型中,输出异常行为检索结果。实验结果表明,该方法具有良好的安防监控视频预处理效果,AUC大,异常行为检索错误率小,运行效率高。
{"title":"Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder","authors":"Dawei Zhang","doi":"10.4018/ijdcf.325224","DOIUrl":"https://doi.org/10.4018/ijdcf.325224","url":null,"abstract":"Aiming at the problem that abnormal behavior is difficult to distinguish from normal behavior, a retrieval method for abnormal behavior of laboratory security surveillance video based on deep automatic encoder is proposed. Firstly, the fuzzy median filtering algorithm is used to reduce the noise of the collected laboratory security surveillance video, and then the YUV spatial chromaticity difference method is used to divide the foreground and background of the video, and the illumination degree in the video is determined. The diagonal model and codebook clustering idea are used to compensate for global and local lighting mutations. Finally, the preprocessed video is input into the mixture model, which is based on the deep automatic encoder and combined with the Gaussian mixture model, and the abnormal behavior retrieval results are output. The experimental results show that the proposed method has good security surveillance video preprocessing effect, large AUC, small error rate of abnormal behavior retrieval, and high operation efficiency.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42831407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1