首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Security Solution for Secure Communication for Cross Layer Design in WSN WSN中跨层设计的安全通信安全解决方案
Pub Date : 2017-12-31 DOI: 10.14257/ijsia.2017.11.12.03
R. Saini, Ritika
{"title":"Security Solution for Secure Communication for Cross Layer Design in WSN","authors":"R. Saini, Ritika","doi":"10.14257/ijsia.2017.11.12.03","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42809227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISPAS: An Intelligent, Smart Parking Allotment System for Travelling Vehicles in Urban Areas ISPAS:一种用于城市出行车辆的智能智能停车分配系统
Pub Date : 2017-12-31 DOI: 10.14257/IJSIA.2017.11.12.05
A. Tyagi, Sreenath Niladhuri
{"title":"ISPAS: An Intelligent, Smart Parking Allotment System for Travelling Vehicles in Urban Areas","authors":"A. Tyagi, Sreenath Niladhuri","doi":"10.14257/IJSIA.2017.11.12.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46527210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation Metrics used in 3D Mesh Watermarking: A Study 三维网格水印中评价指标的研究
Pub Date : 2017-11-30 DOI: 10.14257/ijsia.2017.11.11.04
Sagarika Borah, B. Borah
Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.
对三维模型进行水印是为了在网络通信中保护其所有权信息并保持其完整性。这些水印操作在数据嵌入过程中改变了网格细节,进而影响网格的感知质量或几何细节。有两种不同的情况下,需要评估网格水印技术。一是确保水印嵌入函数对原始模型产生最小的感知失真;二是评估提取的水印与原始水印的相似度,以评估水印方案的鲁棒性。然而,表面网格质量的评估有两种方式:一种是主观方式(直接从人的角度观察),另一种是客观方式(研究人员制定了一些指标来衡量满足人类观察的网格质量)。本研究详细讨论了各种客观的网格质量评估指标,用于检测由于不同类型的水印技术导致的网格退化。本文还讨论了评估水印相似性的鲁棒性估计指标。
{"title":"Evaluation Metrics used in 3D Mesh Watermarking: A Study","authors":"Sagarika Borah, B. Borah","doi":"10.14257/ijsia.2017.11.11.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.11.04","url":null,"abstract":"Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.11.04","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45588755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Problems of SOA Applications SOA应用程序的安全问题
Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.03
M. Q. Saleem
Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.
面向服务的体系结构在市场上越来越受欢迎,因为业务流程的工作流可以很容易地通过服务的组合来实现。当新的业务流程可以通过组合现有的服务来实现,而新的应用程序可以通过组装现有的可重用服务来开发时,后开发阶段表达了SOA范式的真正优势。然而由于服务数量的增加,服务之间的连通性也随之增加,导致安全风险呈指数级上升。安全性是任何软件系统最重要的方面之一,在开发SOA应用程序时,它往往被忽视或不那么重要。本文汇集了SOA安全领域的不同研究人员的工作。本文的重点是介绍几位作者强调的SOA应用程序的安全问题。为了开发安全的面向服务的应用程序,必须解决这些安全问题。
{"title":"Security Problems of SOA Applications","authors":"M. Q. Saleem","doi":"10.14257/IJSIA.2017.11.11.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.03","url":null,"abstract":"Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44210226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Text Encryption 动态文本加密
Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.02
M. Al-Muhammed, R. A. Zitar
Although many encryption algorithms achieve high levels of security, they adopt a static computational behavior that is ensured only by the secret key. If the key is predicted, the ciphered text can be easily decrypted, and thus it is unclear how the security of these algorithms will play out given the tremendous increase in processor power and the availability of sophisticated tools that can analyze ciphered text and predict a key. This paper proposes a dynamic approach to encryption in which a static knowledge of symbols and mapping tools is defined, but also in which the computations of the algorithm, and consequently the encryption, is dynamically controlled by adjusting the behavior of the operations. In addition to a key, the dynamic behavior of the algorithm provides additional tools such as masking and mapping rules to protect ciphered. Experiments conducted with our prototype implementation showed that our system is effective with linear execution time and fixed space requirements.
尽管许多加密算法实现了高级别的安全性,但它们采用了只有密钥才能确保的静态计算行为。如果密钥被预测,密文就可以很容易地解密,因此,考虑到处理器能力的巨大提高以及可以分析密文和预测密钥的复杂工具的可用性,这些算法的安全性将如何发挥尚不清楚。本文提出了一种动态加密方法,其中定义了符号和映射工具的静态知识,但也通过调整操作的行为来动态控制算法的计算,从而控制加密。除了密钥之外,算法的动态行为还提供了额外的工具,如屏蔽和映射规则,以保护加密。用我们的原型实现进行的实验表明,我们的系统在线性执行时间和固定空间要求下是有效的。
{"title":"Dynamic Text Encryption","authors":"M. Al-Muhammed, R. A. Zitar","doi":"10.14257/IJSIA.2017.11.11.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.02","url":null,"abstract":"Although many encryption algorithms achieve high levels of security, they adopt a static computational behavior that is ensured only by the secret key. If the key is predicted, the ciphered text can be easily decrypted, and thus it is unclear how the security of these algorithms will play out given the tremendous increase in processor power and the availability of sophisticated tools that can analyze ciphered text and predict a key. This paper proposes a dynamic approach to encryption in which a static knowledge of symbols and mapping tools is defined, but also in which the computations of the algorithm, and consequently the encryption, is dynamically controlled by adjusting the behavior of the operations. In addition to a key, the dynamic behavior of the algorithm provides additional tools such as masking and mapping rules to protect ciphered. Experiments conducted with our prototype implementation showed that our system is effective with linear execution time and fixed space requirements.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47140095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Machine Learning Based Botnet Detection in Software Defined Networks 软件定义网络中基于机器学习的僵尸网络检测
Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.01
Farhan Tariq, S. Baig
This paper proposed a flow-based approach to detect botnet by applying machine learning algorithms to software defined networks without reading packet payload. The proposed work uses network flows as input and process it in two windows based modules to extract a statistical feature set to be used for classification. The first module process network flow stream to extract flow traces. The window size of this module is 10 which means a flow trace with 10 flows is considered as a trace of interest and forwarded to the next module for further processing. The second module processes the selected trace and fetches historical flows in last 60-minute window for the source and destination IPs of the trace. The feature set is extracted from selected trace and relevant historical flows. The approach applies supervised decision tree based machine learning algorithm to create a model during a training phase using extracted feature set. This model is then used to classify flow traces during the testing phase. The dataset for experimentation is extracted from publicly available real botnet and normal traces. The experimental findings show that the method is capable to detect unknown botnet. The results show detection rate of 97% for known botnets and 90% for unknown botnets.
本文提出了一种基于流的方法,通过将机器学习算法应用于软件定义的网络来检测僵尸网络,而无需读取数据包有效载荷。所提出的工作使用网络流作为输入,并在两个基于窗口的模块中对其进行处理,以提取用于分类的统计特征集。第一模块处理网络流以提取流迹。该模块的窗口大小为10,这意味着具有10个流的流跟踪被认为是感兴趣的跟踪,并被转发到下一个模块进行进一步处理。第二个模块处理选定的跟踪,并在最后60分钟窗口中获取跟踪的源IP和目标IP的历史流。特征集是从选定的轨迹和相关的历史流中提取的。该方法应用基于监督决策树的机器学习算法,在训练阶段使用提取的特征集创建模型。然后,该模型用于在测试阶段对流动痕迹进行分类。用于实验的数据集是从公开可用的真实僵尸网络和正常跟踪中提取的。实验结果表明,该方法能够检测未知僵尸网络。结果表明,已知僵尸网络和未知僵尸网络的检测率分别为97%和90%。
{"title":"Machine Learning Based Botnet Detection in Software Defined Networks","authors":"Farhan Tariq, S. Baig","doi":"10.14257/IJSIA.2017.11.11.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.01","url":null,"abstract":"This paper proposed a flow-based approach to detect botnet by applying machine learning algorithms to software defined networks without reading packet payload. The proposed work uses network flows as input and process it in two windows based modules to extract a statistical feature set to be used for classification. The first module process network flow stream to extract flow traces. The window size of this module is 10 which means a flow trace with 10 flows is considered as a trace of interest and forwarded to the next module for further processing. The second module processes the selected trace and fetches historical flows in last 60-minute window for the source and destination IPs of the trace. The feature set is extracted from selected trace and relevant historical flows. The approach applies supervised decision tree based machine learning algorithm to create a model during a training phase using extracted feature set. This model is then used to classify flow traces during the testing phase. The dataset for experimentation is extracted from publicly available real botnet and normal traces. The experimental findings show that the method is capable to detect unknown botnet. The results show detection rate of 97% for known botnets and 90% for unknown botnets.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47055728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Securing Publish-Subscribe Services with Dynamic Security Protocol in MQTT Enabled Internet of Things 基于MQTT的物联网动态安全协议保护发布-订阅服务
Pub Date : 2017-11-30 DOI: 10.14257/IJSIA.2017.11.11.05
A. Bashir, A. H. Mir
Rapid developments in the field of embedded system, sensor technology, IP addressing and wireless communication are driving the growth of Internet of Things (IoT) in a variety of applications which include environment monitoring, smart manufacturing, e-health and smart agriculture. Due to heterogeneous and constrained nature of IoT nodes, many new security and privacy issues are introduced. IoT devices and systems collect a lot of private data about people, for example an intelligent meter knows when you are home and what devices you use when you are there. This data is shared with other devices and also stored in database or cloud server. Absence of security protocols for these resource constrained smart devices averts their widespread implementation. To address this problem, we propose a mechanism for securing application layer MQTT (Message Queue Telemetry Transport) protocol messages in IoT. The proposed security method for Internet of Things is lightweight in nature and suits well for resource constricted devices. The proposed method counters most of the likely confidentiality attacks in IoT.
嵌入式系统、传感器技术、IP寻址和无线通信领域的快速发展正在推动物联网(IoT)在各种应用中的增长,包括环境监测、智能制造、电子健康和智能农业。由于物联网节点的异构性和约束性,引入了许多新的安全和隐私问题。物联网设备和系统收集了很多关于人的私人数据,例如,智能电表知道你什么时候在家,以及你在家时使用什么设备。这些数据与其他设备共享,也存储在数据库或云服务器中。缺乏用于这些资源受限的智能设备的安全协议阻碍了它们的广泛实施。为了解决这个问题,我们提出了一种在物联网中保护应用层MQTT(消息队列遥测传输)协议消息的机制。所提出的物联网安全方法本质上是轻量级的,非常适合资源受限的设备。所提出的方法对抗了物联网中大多数可能的保密攻击。
{"title":"Securing Publish-Subscribe Services with Dynamic Security Protocol in MQTT Enabled Internet of Things","authors":"A. Bashir, A. H. Mir","doi":"10.14257/IJSIA.2017.11.11.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.05","url":null,"abstract":"Rapid developments in the field of embedded system, sensor technology, IP addressing and wireless communication are driving the growth of Internet of Things (IoT) in a variety of applications which include environment monitoring, smart manufacturing, e-health and smart agriculture. Due to heterogeneous and constrained nature of IoT nodes, many new security and privacy issues are introduced. IoT devices and systems collect a lot of private data about people, for example an intelligent meter knows when you are home and what devices you use when you are there. This data is shared with other devices and also stored in database or cloud server. Absence of security protocols for these resource constrained smart devices averts their widespread implementation. To address this problem, we propose a mechanism for securing application layer MQTT (Message Queue Telemetry Transport) protocol messages in IoT. The proposed security method for Internet of Things is lightweight in nature and suits well for resource constricted devices. The proposed method counters most of the likely confidentiality attacks in IoT.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.05","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41837644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fast Hardware Implementation of AES-128 Algorithm in Streaming Output Feedback Mode for Real Time Ciphering 流输出反馈模式下实时加密AES-128算法的快速硬件实现
Pub Date : 2017-10-31 DOI: 10.14257/ijsia.2017.11.10.04
S. Zaidi, Samreen Hussain
Information security is one of the main challenges faced today in purview of the increase in trend of online purchases. Many ciphering schemes are available that provide data encryption. But the strength of stream ciphers available is very squat as compared to block ciphers. To ensure better security, block ciphers are used in various ways for streaming application at the cost of increased computational load. This paper discusses the implementation of AES-128 in output feedback (OFB) mode for real-time streaming applications. The target performance parameter for the implementation of the algorithm is speed as well as reduced memory resources. Implementation techniques for various blocks of the algorithm have been discussed for achieving the target performance. The implementation is functionally tested on Virtex – 6 FPGA. The performance achieved in terms of latency, speed, memory resources and other logic resources is also presented. This shows the effectiveness of the proposed hardware implementation for real-time streaming cipher applications.
随着网上购物的日益增多,资讯保安已成为当今社会面临的主要挑战之一。提供数据加密的许多加密方案都是可用的。但是与分组密码相比,可用的流密码的强度非常低。为了确保更好的安全性,分组密码以各种方式用于流应用程序,其代价是增加计算负载。本文讨论了在输出反馈(OFB)模式下AES-128在实时流应用中的实现。实现该算法的目标性能参数是速度和减少内存资源。为了实现目标性能,讨论了算法的各个块的实现技术。该实现在Virtex - 6 FPGA上进行了功能测试。给出了在延迟、速度、内存资源和其他逻辑资源方面所取得的性能。这表明了所提出的硬件实现在实时流密码应用中的有效性。
{"title":"Fast Hardware Implementation of AES-128 Algorithm in Streaming Output Feedback Mode for Real Time Ciphering","authors":"S. Zaidi, Samreen Hussain","doi":"10.14257/ijsia.2017.11.10.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.10.04","url":null,"abstract":"Information security is one of the main challenges faced today in purview of the increase in trend of online purchases. Many ciphering schemes are available that provide data encryption. But the strength of stream ciphers available is very squat as compared to block ciphers. To ensure better security, block ciphers are used in various ways for streaming application at the cost of increased computational load. This paper discusses the implementation of AES-128 in output feedback (OFB) mode for real-time streaming applications. The target performance parameter for the implementation of the algorithm is speed as well as reduced memory resources. Implementation techniques for various blocks of the algorithm have been discussed for achieving the target performance. The implementation is functionally tested on Virtex – 6 FPGA. The performance achieved in terms of latency, speed, memory resources and other logic resources is also presented. This shows the effectiveness of the proposed hardware implementation for real-time streaming cipher applications.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41278247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance 一个安全的分布式云存储系统,实现数据保密和负载均衡
Pub Date : 2017-10-31 DOI: 10.14257/ijsia.2017.11.10.01
Shin-Yan Chiou
Cloud storage is widely used and has become prevalent over the past decade. It has very desirable properties such as scalability, fault tolerance, robustness, and data availability and accessibility. Several Cloud index structures have been proposed for equality queries, range queries, or other purposes. However, Cloud system is fraught with security risks and many security issues still exist in Cloud system. For solving these security issues, in our paper, we propose a secure and balanced storage system for Cloud system. The system offers load balance, secrecy, integrity, and robustness for data protection. It is efficient, reliant, resilient and scalable.
云存储被广泛使用,并且在过去十年中变得普遍。它具有非常理想的特性,如可扩展性、容错性、健壮性以及数据可用性和可访问性。已经为相等查询、范围查询或其他目的提出了几种云索引结构。然而,云系统充满了安全风险,云系统中仍然存在许多安全问题。为了解决这些安全问题,在本文中,我们提出了一种用于云系统的安全、平衡的存储系统。该系统为数据保护提供了负载平衡、保密性、完整性和稳健性。它高效、可靠、有弹性且可扩展。
{"title":"A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance","authors":"Shin-Yan Chiou","doi":"10.14257/ijsia.2017.11.10.01","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.10.01","url":null,"abstract":"Cloud storage is widely used and has become prevalent over the past decade. It has very desirable properties such as scalability, fault tolerance, robustness, and data availability and accessibility. Several Cloud index structures have been proposed for equality queries, range queries, or other purposes. However, Cloud system is fraught with security risks and many security issues still exist in Cloud system. For solving these security issues, in our paper, we propose a secure and balanced storage system for Cloud system. The system offers load balance, secrecy, integrity, and robustness for data protection. It is efficient, reliant, resilient and scalable.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46920135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Two Time Delay Quarantine Model for the Transmission of Worms in Wireless Network 无线网络中蠕虫传播的双时延隔离模型
Pub Date : 2017-10-31 DOI: 10.14257/ijsia.2017.11.10.02
S. K. Srivastava, B. Mishra, B. Mishra
{"title":"Two Time Delay Quarantine Model for the Transmission of Worms in Wireless Network","authors":"S. K. Srivastava, B. Mishra, B. Mishra","doi":"10.14257/ijsia.2017.11.10.02","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.10.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41520685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1