首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks AHA-BV:带批量验证的卫星-地面集成网络接入和切换验证协议
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-16 DOI: 10.1016/j.csi.2024.103870
Junyan Guo , Liyuan Chang , Yue Song , Shuang Yao , Zhi Zheng , Yihang Hao , Shixuan Zhu , Wei Guo , Ming Zhao

At present, the rapid development of satellite capabilities has prompted the proposal of satellite–terrestrial integrated networks (STIN), which solves the problem of limited signal coverage of terrestrial cellular networks, further promotes the globalization process, and realizes global data sharing and on-demand use. However, due to the high openness of satellite-to-ground links in STIN, users are vulnerable to attacks such as eavesdropping, replay, tampering, and impersonation when requesting access to satellite nodes and obtaining subscription services. To ensure the security and reliability, many authentication protocols have been proposed, but there are still some shortcomings, such as high authentication overhead, vulnerability to certain attacks. In addition, for inter-satellite handovers caused by the highly dynamic topology of satellites, the computational overhead of existing handover authentication mechanisms is too high to be applied to frequent inter-satellite handover scenarios in STIN. To address the above issues, in this paper, we propose a new access and handover authentication protocol with batch verification for STIN, namely the AHA-BV protocol. The AHA-BV protocol not only realizes mutual authentication and key negotiation between users and satellite access points without the participation of the network control center, but also ensures the conditional anonymity of users during the access authentication phase. Furthermore, the lightweight batch verification mechanism reduces the risk of computing bottlenecks when resource-constrained satellites receive a large number of access authentication requests. Not only that, the AHA-BV protocol can also achieve sustained trust in subscription services from STIN with low computational overhead during the inter-satellite handover authentication phase. Formal and heuristic security analysis show that the AHA-BV protocol can meet the security requirements of STIN. Performance analysis indicates that the AHA-BV protocol has low authentication overhead while ensuring security, and is more suitable for users under satellite dynamic topology to access and obtain subscription services from STIN.

目前,卫星能力的快速发展促使人们提出了星地一体化网络(STIN),它解决了地面蜂窝网络信号覆盖有限的问题,进一步推动了全球化进程,实现了全球数据共享和按需使用。然而,由于 STIN 中卫星到地面链路的高度开放性,用户在请求访问卫星节点和获取订阅服务时很容易受到窃听、重放、篡改和假冒等攻击。为确保安全性和可靠性,人们提出了许多认证协议,但仍存在一些不足,如认证开销大、易受某些攻击等。此外,对于卫星拓扑高度动态所导致的卫星间切换,现有切换认证机制的计算开销过高,无法应用于 STIN 中频繁的卫星间切换场景。针对上述问题,本文提出了一种适用于 STIN 的带批量验证的新型接入和切换验证协议,即 AHA-BV 协议。AHA-BV 协议不仅可以在没有网络控制中心参与的情况下实现用户与卫星接入点之间的相互认证和密钥协商,还能确保用户在接入认证阶段的有条件匿名性。此外,当资源有限的卫星收到大量接入验证请求时,轻量级批量验证机制可降低计算瓶颈风险。不仅如此,AHA-BV 协议还能在卫星间切换验证阶段以较低的计算开销实现对 STIN 订阅服务的持续信任。形式和启发式安全分析表明,AHA-BV 协议能够满足 STIN 的安全要求。性能分析表明,AHA-BV 协议在确保安全的同时具有较低的认证开销,更适合卫星动态拓扑结构下的用户访问和获取 STIN 的订阅服务。
{"title":"AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks","authors":"Junyan Guo ,&nbsp;Liyuan Chang ,&nbsp;Yue Song ,&nbsp;Shuang Yao ,&nbsp;Zhi Zheng ,&nbsp;Yihang Hao ,&nbsp;Shixuan Zhu ,&nbsp;Wei Guo ,&nbsp;Ming Zhao","doi":"10.1016/j.csi.2024.103870","DOIUrl":"10.1016/j.csi.2024.103870","url":null,"abstract":"<div><p>At present, the rapid development of satellite capabilities has prompted the proposal of satellite–terrestrial integrated networks (STIN), which solves the problem of limited signal coverage of terrestrial cellular networks, further promotes the globalization process, and realizes global data sharing and on-demand use. However, due to the high openness of satellite-to-ground links in STIN, users are vulnerable to attacks such as eavesdropping, replay, tampering, and impersonation when requesting access to satellite nodes and obtaining subscription services. To ensure the security and reliability, many authentication protocols have been proposed, but there are still some shortcomings, such as high authentication overhead, vulnerability to certain attacks. In addition, for inter-satellite handovers caused by the highly dynamic topology of satellites, the computational overhead of existing handover authentication mechanisms is too high to be applied to frequent inter-satellite handover scenarios in STIN. To address the above issues, in this paper, we propose a new access and handover authentication protocol with batch verification for STIN, namely the AHA-BV protocol. The AHA-BV protocol not only realizes mutual authentication and key negotiation between users and satellite access points without the participation of the network control center, but also ensures the conditional anonymity of users during the access authentication phase. Furthermore, the lightweight batch verification mechanism reduces the risk of computing bottlenecks when resource-constrained satellites receive a large number of access authentication requests. Not only that, the AHA-BV protocol can also achieve sustained trust in subscription services from STIN with low computational overhead during the inter-satellite handover authentication phase. Formal and heuristic security analysis show that the AHA-BV protocol can meet the security requirements of STIN. Performance analysis indicates that the AHA-BV protocol has low authentication overhead while ensuring security, and is more suitable for users under satellite dynamic topology to access and obtain subscription services from STIN.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103870"},"PeriodicalIF":5.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141035339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics 利用梯度增强树和泛光灯控制器特性检测和缓解软件定义网络(SDN)中的安全异常现象
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-16 DOI: 10.1016/j.csi.2024.103871
Tohid Jafarian , Ali Ghaffari , Ali Seyfollahi , Bahman Arasteh

Cutting-edge and innovative software solutions are provided to address network security, network virtualization, and other network-related challenges in highly congested SDN-powered networks. However, these networks are susceptible to the same security issues as traditional networks. For instance, SDNs are significantly vulnerable to distributed denial of service (DDoS) attacks. Previous studies have suggested various anomaly detection techniques based on machine learning, statistical analysis, or entropy measurement to combat DDoS attacks and other security threats in SDN networks. However, these techniques face challenges such as collecting sufficient and relevant flow data, extracting and selecting the most informative features, and choosing the best model for identifying and preventing anomalies. This paper introduces a new and advanced multi-stage modular approach for anomaly detection and mitigation in SDN networks. The approach consists of four modules: data collection, feature selection, anomaly classification, and anomaly response. The approach utilizes the NetFlow standard to gather data and generate a dataset, employs the Information Gain Ratio (IGR) to select the most valuable features, uses gradient-boosted trees (GBT), and leverages Representational State Transfer Application Programming Interfaces (REST API) and Static Entry Pusher within the floodlight controller to construct an exceptionally efficient structure for detecting and mitigating anomalies in SDN design. We conducted experiments on a synthetic dataset containing 15 types of anomalies, such as DDoS attacks, port scans, worms, etc. We compared our model with four existing techniques: SVM, KNN, DT, and RF. Experimental results demonstrate that our model outperforms the existing techniques in terms of enhancing Accuracy (AC) and Detection Rate (DR) while simultaneously reducing Classification Error (CE) and False Alarm Rate (FAR) to 98.80 %, 97.44 %, 1.2 %, and 0.38 %, respectively.

在高度拥挤的 SDN 驱动网络中,提供了尖端的创新软件解决方案,以解决网络安全、网络虚拟化和其他网络相关挑战。然而,这些网络也容易受到与传统网络相同的安全问题的影响。例如,SDN 非常容易受到分布式拒绝服务(DDoS)攻击。以往的研究提出了各种基于机器学习、统计分析或熵测量的异常检测技术,以应对 SDN 网络中的 DDoS 攻击和其他安全威胁。然而,这些技术都面临着挑战,如收集足够的相关流数据、提取和选择信息量最大的特征,以及选择最佳模型来识别和预防异常。本文介绍了一种用于 SDN 网络异常检测和缓解的新型、先进的多阶段模块化方法。该方法由四个模块组成:数据收集、特征选择、异常分类和异常响应。该方法利用 NetFlow 标准收集数据并生成数据集,采用信息增益比 (IGR) 来选择最有价值的特征,使用梯度增强树 (GBT),并利用泛光灯控制器内的表示状态传输应用编程接口 (REST API) 和静态条目推送器来构建一个异常高效的结构,用于检测和缓解 SDN 设计中的异常。我们在一个合成数据集上进行了实验,该数据集包含 15 种异常情况,如 DDoS 攻击、端口扫描、蠕虫等。我们将我们的模型与四种现有技术进行了比较:SVM、KNN、DT 和 RF。实验结果表明,我们的模型在提高准确率(AC)和检测率(DR)方面优于现有技术,同时将分类错误率(CE)和误报率(FAR)分别降低到 98.80 %、97.44 %、1.2 % 和 0.38 %。
{"title":"Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics","authors":"Tohid Jafarian ,&nbsp;Ali Ghaffari ,&nbsp;Ali Seyfollahi ,&nbsp;Bahman Arasteh","doi":"10.1016/j.csi.2024.103871","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103871","url":null,"abstract":"<div><p>Cutting-edge and innovative software solutions are provided to address network security, network virtualization, and other network-related challenges in highly congested SDN-powered networks. However, these networks are susceptible to the same security issues as traditional networks. For instance, SDNs are significantly vulnerable to distributed denial of service (DDoS) attacks. Previous studies have suggested various anomaly detection techniques based on machine learning, statistical analysis, or entropy measurement to combat DDoS attacks and other security threats in SDN networks. However, these techniques face challenges such as collecting sufficient and relevant flow data, extracting and selecting the most informative features, and choosing the best model for identifying and preventing anomalies. This paper introduces a new and advanced multi-stage modular approach for anomaly detection and mitigation in SDN networks. The approach consists of four modules: data collection, feature selection, anomaly classification, and anomaly response. The approach utilizes the NetFlow standard to gather data and generate a dataset, employs the Information Gain Ratio (IGR) to select the most valuable features, uses gradient-boosted trees (GBT), and leverages Representational State Transfer Application Programming Interfaces (REST API) and Static Entry Pusher within the floodlight controller to construct an exceptionally efficient structure for detecting and mitigating anomalies in SDN design. We conducted experiments on a synthetic dataset containing 15 types of anomalies, such as DDoS attacks, port scans, worms, etc. We compared our model with four existing techniques: SVM, KNN, DT, and RF. Experimental results demonstrate that our model outperforms the existing techniques in terms of enhancing Accuracy (AC) and Detection Rate (DR) while simultaneously reducing Classification Error (CE) and False Alarm Rate (FAR) to 98.80 %, 97.44 %, 1.2 %, and 0.38 %, respectively.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103871"},"PeriodicalIF":5.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141067236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage 基于密文策略的高效属性加密与云存储的协同访问
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-16 DOI: 10.1016/j.csi.2024.103872
Ximing Li, Hao Wang, Sha Ma

The encryption of user data is crucial when employing cloud storage services to guarantee the security of these data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a powerful encryption technique that offers flexible and fine-grained access control capabilities. Further, the multi-user collaborative access ABE scheme additionally supports users to acquire access authorization through collaborative works. However, the existing multi-user collaborative access ABE schemes do not consider the different weights of collaboration users. Therefore, using these schemes for weighted multi-user collaborative access results in either redundant attributes or unsuccessful construction of the access control structure. For this, we proposes the special attribute policy (SAP) problem about weighted multi-user collaborative access, and presents an efficient ciphertext-policy weighted attribute-based encryption with collaborative access scheme (CP-WABE-CA), which can provide efficient collaborative access control for multiple users with different weights. In detail, this scheme utilizes a novel weighted access tree to prevent attribute repetition, thereby eliminating redundant attributes and addressing the issue of constructing access control structures. We prove our scheme is resistant against chosen plaintext attack. The experimental results demonstrate that our scheme has significant computational efficiency advantages compared to related works, without increasing storage or communication overhead. Therefore, the CP-WABE-CA scheme can provide an efficient flexible weighted collaborative access control mechanisms for cloud storage.

在使用云存储服务时,用户数据的加密对于保证存储在云服务器上的这些数据的安全性至关重要。基于属性的加密(ABE)方案被认为是一种强大的加密技术,可提供灵活、细粒度的访问控制功能。此外,多用户协同访问 ABE 方案还支持用户通过协同工作获得访问授权。然而,现有的多用户协作访问 ABE 方案没有考虑协作用户的不同权重。因此,使用这些方案进行加权多用户协同访问,要么会导致冗余属性,要么无法成功构建访问控制结构。为此,我们提出了关于加权多用户协同访问的特殊属性策略(SAP)问题,并提出了一种高效的基于密文策略的加权属性协同访问加密方案(CP-WABE-CA),它能为不同权重的多用户提供高效的协同访问控制。具体来说,该方案利用新颖的加权访问树来防止属性重复,从而消除了冗余属性,解决了访问控制结构的构建问题。我们证明了我们的方案可以抵御选择明文攻击。实验结果表明,与相关研究相比,我们的方案具有显著的计算效率优势,而且不会增加存储或通信开销。因此,CP-WABE-CA 方案可以为云存储提供高效灵活的加权协作访问控制机制。
{"title":"An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage","authors":"Ximing Li,&nbsp;Hao Wang,&nbsp;Sha Ma","doi":"10.1016/j.csi.2024.103872","DOIUrl":"10.1016/j.csi.2024.103872","url":null,"abstract":"<div><p>The encryption of user data is crucial when employing cloud storage services to guarantee the security of these data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a powerful encryption technique that offers flexible and fine-grained access control capabilities. Further, the multi-user collaborative access ABE scheme additionally supports users to acquire access authorization through collaborative works. However, the existing multi-user collaborative access ABE schemes do not consider the different weights of collaboration users. Therefore, using these schemes for weighted multi-user collaborative access results in either redundant attributes or unsuccessful construction of the access control structure. For this, we proposes the special attribute policy (SAP) problem about weighted multi-user collaborative access, and presents an efficient ciphertext-policy weighted attribute-based encryption with collaborative access scheme (CP-WABE-CA), which can provide efficient collaborative access control for multiple users with different weights. In detail, this scheme utilizes a novel weighted access tree to prevent attribute repetition, thereby eliminating redundant attributes and addressing the issue of constructing access control structures. We prove our scheme is resistant against chosen plaintext attack. The experimental results demonstrate that our scheme has significant computational efficiency advantages compared to related works, without increasing storage or communication overhead. Therefore, the CP-WABE-CA scheme can provide an efficient flexible weighted collaborative access control mechanisms for cloud storage.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103872"},"PeriodicalIF":5.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141033740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TASIS: A typology of architectural strategies for interoperability in software-intensive systems TASIS:软件密集型系统互操作性架构战略类型学
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-15 DOI: 10.1016/j.csi.2024.103874
Pedro Henrique Dias Valle , Vitor Rodrigues Tonon , Lina Garcés , Solange Oliveira Rezende , Elisa Yumi Nakagawa

Complex and large software-intensive systems are increasingly present in several application domains, including Industry 4.0, connected health, smart cities, and smart agriculture, to mention a few. These systems are commonly composed of diverse other systems often developed by different organizations using various technologies and, as a consequence, interoperability among these systems becomes difficult. Many architectural strategies for interoperability have already been proposed; however, selecting adequate strategies is challenging. Additionally, it lacks an overview of such strategies. This work presents TASIS, a typology of architectural strategies for the interoperability of software-intensive systems. We also validated it with 33 practitioners from different countries with an extensive experience in integration projects. This work also offers 12 industry-based association rules that suggest how to combine those strategies to mitigate issues at different interoperability levels. As a result, our typology can serve as a starting point to further aggregate new strategies and, ultimately, supports software architects in designing interoperability-driven architectural solutions.

复杂的大型软件密集型系统越来越多地出现在多个应用领域,包括工业 4.0、互联健康、智慧城市和智慧农业等。这些系统通常由不同的其他系统组成,这些系统通常由不同的组织使用不同的技术开发而成,因此,这些系统之间的互操作性变得十分困难。目前已经提出了许多互操作性的架构策略,但是,选择适当的策略具有挑战性。此外,还缺乏对这些策略的概述。这项工作提出了 TASIS,一种软件密集型系统互操作性架构策略类型学。我们还与来自不同国家、在集成项目中拥有丰富经验的 33 位从业人员进行了验证。这项工作还提供了 12 条基于行业的关联规则,建议如何将这些策略结合起来,以减轻不同互操作性层面的问题。因此,我们的类型学可以作为进一步汇总新策略的起点,并最终支持软件架构师设计互操作性驱动的架构解决方案。
{"title":"TASIS: A typology of architectural strategies for interoperability in software-intensive systems","authors":"Pedro Henrique Dias Valle ,&nbsp;Vitor Rodrigues Tonon ,&nbsp;Lina Garcés ,&nbsp;Solange Oliveira Rezende ,&nbsp;Elisa Yumi Nakagawa","doi":"10.1016/j.csi.2024.103874","DOIUrl":"10.1016/j.csi.2024.103874","url":null,"abstract":"<div><p>Complex and large software-intensive systems are increasingly present in several application domains, including Industry 4.0, connected health, smart cities, and smart agriculture, to mention a few. These systems are commonly composed of diverse other systems often developed by different organizations using various technologies and, as a consequence, interoperability among these systems becomes difficult. Many architectural strategies for interoperability have already been proposed; however, selecting adequate strategies is challenging. Additionally, it lacks an overview of such strategies. This work presents TASIS, a typology of architectural strategies for the interoperability of software-intensive systems. We also validated it with 33 practitioners from different countries with an extensive experience in integration projects. This work also offers 12 industry-based association rules that suggest how to combine those strategies to mitigate issues at different interoperability levels. As a result, our typology can serve as a starting point to further aggregate new strategies and, ultimately, supports software architects in designing interoperability-driven architectural solutions.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103874"},"PeriodicalIF":5.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141058337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving multi-party logistic regression in cloud computing 云计算中的隐私保护多方逻辑回归
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-04-10 DOI: 10.1016/j.csi.2024.103857
Huiyong Wang , Tianming Chen , Yong Ding , Yujue Wang , Changsong Yang

In recent years, machine learning techniques have been widely deployed in various fields. However, machine learning faces problems like high computation overhead, low training accuracy, and poor security due to data silos, privacy issues and communication limitations, especially in the environment of cloud computing. Logistic regression (LR) is a popular machine learning method used for prediction, while current LR algorithms suffer from high computation cost and communication burden due to interactions between users and cloud servers. In this paper, we propose a Privacy-Preserving Multi-party Logistic Regression (PPMLR) algorithm, which achieves privacy-preserving and non-interactive gradient descent regression training in machine learning. PPMLR uses the Distributed two Trapdoors Public-Key Cryptosystem (DT-PKC) as a main building block, which satisfies additive homomorphic encryption. Specifically, users go off-line after encrypting local private data, then the service provider (SP) trains the global logistic regression model by interacting with the cloud server (CS), so that the confidentiality and privacy of user’s private data can be guaranteed during the training process. We prove by detailed security proof that PPMLR guarantees data and model privacy. Finally, we conduct experiments on two popular medical datasets from the UCI machine learning repository. The experimental results show that PPMLR can conduct privacy-preserving training efficiently. Comparison with the stat-of-the-art Privacy-Preserving Logistic Regression Algorithm (PPLRA) shows that the model training time is reduced by about 4 times.

近年来,机器学习技术被广泛应用于各个领域。然而,机器学习面临着计算开销大、训练精度低、数据孤岛导致安全性差、隐私问题和通信限制等问题,尤其是在云计算环境下。逻辑回归(Logistic Regression,LR)是一种用于预测的流行机器学习方法,而目前的 LR 算法由于用户和云服务器之间的交互而存在计算成本高和通信负担重的问题。本文提出了一种隐私保护多方逻辑回归(PPMLR)算法,实现了机器学习中的隐私保护和非交互梯度下降回归训练。PPMLR 以分布式双陷阱公钥密码系统(DT-PKC)为主要构件,满足加法同态加密的要求。具体来说,用户在加密本地私人数据后下线,然后服务提供商(SP)通过与云服务器(CS)交互来训练全局逻辑回归模型,从而在训练过程中保证用户私人数据的机密性和隐私性。我们通过详细的安全证明证明了 PPMLR 可以保证数据和模型的隐私。最后,我们在 UCI 机器学习资料库中的两个流行医学数据集上进行了实验。实验结果表明,PPMLR 可以高效地进行隐私保护训练。与最先进的隐私保护逻辑回归算法(PPLRA)相比,模型训练时间缩短了约4倍。
{"title":"Privacy-preserving multi-party logistic regression in cloud computing","authors":"Huiyong Wang ,&nbsp;Tianming Chen ,&nbsp;Yong Ding ,&nbsp;Yujue Wang ,&nbsp;Changsong Yang","doi":"10.1016/j.csi.2024.103857","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103857","url":null,"abstract":"<div><p>In recent years, machine learning techniques have been widely deployed in various fields. However, machine learning faces problems like high computation overhead, low training accuracy, and poor security due to data silos, privacy issues and communication limitations, especially in the environment of cloud computing. Logistic regression (LR) is a popular machine learning method used for prediction, while current LR algorithms suffer from high computation cost and communication burden due to interactions between users and cloud servers. In this paper, we propose a Privacy-Preserving Multi-party Logistic Regression (PPMLR) algorithm, which achieves privacy-preserving and non-interactive gradient descent regression training in machine learning. PPMLR uses the Distributed two Trapdoors Public-Key Cryptosystem (DT-PKC) as a main building block, which satisfies additive homomorphic encryption. Specifically, users go off-line after encrypting local private data, then the service provider (<span><math><mi>SP</mi></math></span>) trains the global logistic regression model by interacting with the cloud server (<span><math><mi>CS</mi></math></span>), so that the confidentiality and privacy of user’s private data can be guaranteed during the training process. We prove by detailed security proof that PPMLR guarantees data and model privacy. Finally, we conduct experiments on two popular medical datasets from the UCI machine learning repository. The experimental results show that PPMLR can conduct privacy-preserving training efficiently. Comparison with the stat-of-the-art Privacy-Preserving Logistic Regression Algorithm (PPLRA) shows that the model training time is reduced by about 4 times.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103857"},"PeriodicalIF":5.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140606943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spanish MEACorpus 2023: A multimodal speech–text corpus for emotion analysis in Spanish from natural environments 西班牙语 MEACorpus 2023:用于从自然环境中分析西班牙语情绪的多模态语音-文本语料库
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-04-02 DOI: 10.1016/j.csi.2024.103856
Ronghao Pan , José Antonio García-Díaz , Miguel Ángel Rodríguez-García , Rafel Valencia-García

In human–computer interaction, emotion recognition provides a deeper understanding of the user’s emotions, enabling empathetic and effective responses based on the user’s emotional state. While deep learning models have improved emotion recognition solutions, it is still an active area of research. One important limitation is that most emotion recognition systems use only text as input, ignoring features such as voice intonation. Another limitation is the limited number of datasets available for multimodal emotion recognition. In addition, most published datasets contain emotions that are simulated by professionals and produce limited results in real-world scenarios. In other languages, such as Spanish, hardly any datasets are available. Therefore, our contributions to emotion recognition are as follows. First, we compile and annotate a new corpus for multimodal emotion recognition in Spanish (Spanish MEACorpus 2023), which contains 13.16 h of speech divided into 5129 segments labeled by considering Ekman’s six basic emotions. The dataset is extracted from YouTube videos in natural environments. Second, we explore several deep learning models for emotion recognition using text- and audio-based features. Third, we evaluate different multimodal techniques to build a multimodal recognition system that improves the results of unimodal models, achieving a Macro F1-score of 87.745%, using late fusion with concatenation strategy approach.

在人机交互中,情绪识别可以更深入地了解用户的情绪,从而根据用户的情绪状态做出感同身受的有效反应。虽然深度学习模型已经改进了情感识别解决方案,但它仍然是一个活跃的研究领域。一个重要的局限是,大多数情感识别系统仅使用文本作为输入,忽略了语音语调等特征。另一个局限是,可用于多模态情感识别的数据集数量有限。此外,大多数已发布的数据集包含由专业人士模拟的情感,在真实世界场景中产生的结果有限。在西班牙语等其他语言中,几乎没有任何数据集可用。因此,我们对情感识别的贡献如下。首先,我们为西班牙语多模态情感识别编制了一个新的语料库(西班牙语 MEACorpus 2023),其中包含 13.16 小时的语音,按照埃克曼的六种基本情感分为 5129 个标注片段。该数据集是从自然环境中的 YouTube 视频中提取的。其次,我们利用基于文本和音频的特征,探索了几种用于情感识别的深度学习模型。第三,我们评估了不同的多模态技术,利用后期融合与串联策略方法,建立了一个多模态识别系统,该系统改善了单模态模型的结果,实现了 87.745% 的 Macro F1 分数。
{"title":"Spanish MEACorpus 2023: A multimodal speech–text corpus for emotion analysis in Spanish from natural environments","authors":"Ronghao Pan ,&nbsp;José Antonio García-Díaz ,&nbsp;Miguel Ángel Rodríguez-García ,&nbsp;Rafel Valencia-García","doi":"10.1016/j.csi.2024.103856","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103856","url":null,"abstract":"<div><p>In human–computer interaction, emotion recognition provides a deeper understanding of the user’s emotions, enabling empathetic and effective responses based on the user’s emotional state. While deep learning models have improved emotion recognition solutions, it is still an active area of research. One important limitation is that most emotion recognition systems use only text as input, ignoring features such as voice intonation. Another limitation is the limited number of datasets available for multimodal emotion recognition. In addition, most published datasets contain emotions that are simulated by professionals and produce limited results in real-world scenarios. In other languages, such as Spanish, hardly any datasets are available. Therefore, our contributions to emotion recognition are as follows. First, we compile and annotate a new corpus for multimodal emotion recognition in Spanish (Spanish MEACorpus 2023), which contains 13.16 h of speech divided into 5129 segments labeled by considering Ekman’s six basic emotions. The dataset is extracted from YouTube videos in natural environments. Second, we explore several deep learning models for emotion recognition using text- and audio-based features. Third, we evaluate different multimodal techniques to build a multimodal recognition system that improves the results of unimodal models, achieving a Macro F1-score of 87.745%, using late fusion with concatenation strategy approach.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103856"},"PeriodicalIF":5.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000254/pdfft?md5=7643b0276c958f1d28a134277313e4d1&pid=1-s2.0-S0920548924000254-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140535466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus 光有声誉还不够:确保拜占庭共识中的强秩序公平性
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-21 DOI: 10.1016/j.csi.2024.103855
Jianhong Li , Qi Chen , Jin Li , Zihan Jiang , Guoyu Yang , Teng Huang , Hongyang Yan , Duncan S. Wong

With the development of blockchain technology, Byzantine Fault Tolerance (BFT) is becoming an important research topic. The rPBFT consensus algorithm was introduced to address a range of shortcomings in the PBFT consensus algorithm, including high communication complexity, limited scalability, and a significant decline in performance when the system reaches approximately 100 nodes. Although rPBFT has been widely applied in the FISCO consortium chain, existing methods fail to ensure fairness in the power distribution among consensus member nodes and fine-grained node classification in rPBFT consensus. This work proposes a rPBFT consensus mechanism based on reputation value evaluation and supervision of consensus members. By implementing hierarchical management of nodes based on their reputation values, malicious nodes are eliminated, and supervision of consensus members is realized. The simulation experiment simulates the decision process of a variety of different nodes and consensus member jury with different proportions of 60%, 80% and 100% judges. The results show that the proposed scheme can dynamically update the node reputation value and classify various nodes. On the premise that the jury judges cast no less than 50% of the verdict votes, the malicious nodes in the consensus members can also be eliminated from the group of consensus member nodes. The scheme proposed in this paper effectively improves the fault tolerance of the rPBFT consensus mechanism, maintains the stability of the consortium chain network and ensures the security of the system.

随着区块链技术的发展,拜占庭容错(BFT)正成为一个重要的研究课题。rPBFT共识算法的提出是为了解决PBFT共识算法的一系列缺陷,包括通信复杂度高、可扩展性有限以及当系统达到约100个节点时性能显著下降等。虽然 rPBFT 已广泛应用于 FISCO 联盟链,但现有方法无法确保 rPBFT 共识中共识成员节点间功率分配的公平性和细粒度节点分类。本研究提出了一种基于信誉值评估和共识成员监督的 rPBFT 共识机制。通过对节点实施基于声誉值的分级管理,消除了恶意节点,实现了对共识成员的监督。仿真实验模拟了各种不同节点和共识成员评审团的决策过程,评审团的比例分别为 60%、80% 和 100%。结果表明,所提出的方案可以动态更新节点声誉值,并对各种节点进行分类。在评审团评委投票不低于 50%的前提下,共识成员中的恶意节点也可以从共识成员节点群中剔除。本文提出的方案有效提高了 rPBFT 共识机制的容错性,维护了联盟链网络的稳定性,保证了系统的安全性。
{"title":"Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus","authors":"Jianhong Li ,&nbsp;Qi Chen ,&nbsp;Jin Li ,&nbsp;Zihan Jiang ,&nbsp;Guoyu Yang ,&nbsp;Teng Huang ,&nbsp;Hongyang Yan ,&nbsp;Duncan S. Wong","doi":"10.1016/j.csi.2024.103855","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103855","url":null,"abstract":"<div><p>With the development of blockchain technology, Byzantine Fault Tolerance (BFT) is becoming an important research topic. The rPBFT consensus algorithm was introduced to address a range of shortcomings in the PBFT consensus algorithm, including high communication complexity, limited scalability, and a significant decline in performance when the system reaches approximately 100 nodes. Although rPBFT has been widely applied in the FISCO consortium chain, existing methods fail to ensure fairness in the power distribution among consensus member nodes and fine-grained node classification in rPBFT consensus. This work proposes a rPBFT consensus mechanism based on reputation value evaluation and supervision of consensus members. By implementing hierarchical management of nodes based on their reputation values, malicious nodes are eliminated, and supervision of consensus members is realized. The simulation experiment simulates the decision process of a variety of different nodes and consensus member jury with different proportions of 60%, 80% and 100% judges. The results show that the proposed scheme can dynamically update the node reputation value and classify various nodes. On the premise that the jury judges cast no less than 50% of the verdict votes, the malicious nodes in the consensus members can also be eliminated from the group of consensus member nodes. The scheme proposed in this paper effectively improves the fault tolerance of the rPBFT consensus mechanism, maintains the stability of the consortium chain network and ensures the security of the system.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103855"},"PeriodicalIF":5.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140190904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud 基于区块链的高效可验证外包云端属性加密
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-20 DOI: 10.1016/j.csi.2024.103854
Zesen Hou , Jianting Ning , Xinyi Huang , Shengmin Xu , Leo Yu Zhang

Attribute-based encryption (ABE) has been widely applied in cloud services for access control. However, a large number of pairing operations required for decryption affect the wide use of ABE on lightweight devices. A general solution is to outsource the heavy computation to the cloud service provider (CSP), leaving the lighter computation to the data user. Nevertheless, it is impractical to assume that the CSP will provide free services. A recent ABE scheme with payable outsourced decryption ABEPOD (TIFS’20) provides a solution for the above payment issue. The CSP is generally untrusted, however, ABEPOD does not offer a verification mechanism for the data user to verify the correctness of the message. Moreover, the use of dual key pairs in ABEPOD incurs a significant computational overhead for data users during the key generation phase. We address the above issues by presenting a new blockchain-based verifiable outsourced attribute-based encryption system that enables data users to verify the correctness of plaintexts. We implement batch verification using homomorphic technical to optimize the verification process. We use the technique of dichotomous search to accurately locate problematic plaintexts. Additionally, we optimize three key-generation algorithms to transfer the computational cost from the data user to the key generation center. We offer the formal security models and the instantiation system with security analysis. As compared to ABEPOD, we further optimize the key-generation algorithms such that the computational overhead of transformation-key and verification-key generation for data users is reduced from O(Ω) to O(1) and reduced by half respectively, where Ω is the number of attributes.

基于属性的加密(ABE)已广泛应用于云服务的访问控制。然而,解密所需的大量配对操作影响了 ABE 在轻型设备上的广泛应用。一般的解决方案是将繁重的计算外包给云服务提供商(CSP),将较轻的计算留给数据用户。然而,假设云服务提供商将提供免费服务是不切实际的。最近推出的一种可支付外包解密 ABEPOD 的 ABE 方案(TIFS'20)为上述支付问题提供了一种解决方案。CSP 通常是不可信任的,但 ABEPOD 没有为数据用户提供验证机制来验证信息的正确性。此外,ABEPOD 中双密钥对的使用在密钥生成阶段给数据用户带来了巨大的计算开销。针对上述问题,我们提出了一种新的基于区块链的可验证外包属性加密系统,使数据用户能够验证明文的正确性。我们使用同态技术实现批量验证,以优化验证过程。我们使用二分搜索技术来准确定位有问题的明文。此外,我们还优化了三种密钥生成算法,将计算成本从数据用户转移到密钥生成中心。我们提供了正式的安全模型和实例化系统,并进行了安全分析。与 ABEPOD 相比,我们进一步优化了密钥生成算法,使数据用户生成转换密钥和验证密钥的计算开销分别从 O(Ω) 降至 O(1) 和减少一半,其中 Ω 是属性数。
{"title":"Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud","authors":"Zesen Hou ,&nbsp;Jianting Ning ,&nbsp;Xinyi Huang ,&nbsp;Shengmin Xu ,&nbsp;Leo Yu Zhang","doi":"10.1016/j.csi.2024.103854","DOIUrl":"10.1016/j.csi.2024.103854","url":null,"abstract":"<div><p>Attribute-based encryption (ABE) has been widely applied in cloud services for access control. However, a large number of pairing operations required for decryption affect the wide use of ABE on lightweight devices. A general solution is to outsource the heavy computation to the cloud service provider (CSP), leaving the lighter computation to the data user. Nevertheless, it is impractical to assume that the CSP will provide free services. A recent ABE scheme with payable outsourced decryption <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span> (TIFS’20) provides a solution for the above payment issue. The CSP is generally untrusted, however, <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span> does not offer a verification mechanism for the data user to verify the correctness of the message. Moreover, the use of dual key pairs in <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span> incurs a significant computational overhead for data users during the key generation phase. We address the above issues by presenting a new <em>blockchain-based verifiable outsourced attribute-based encryption</em> system that enables data users to verify the correctness of plaintexts. We implement batch verification using homomorphic technical to optimize the verification process. We use the technique of dichotomous search to accurately locate problematic plaintexts. Additionally, we optimize three key-generation algorithms to transfer the computational cost from the data user to the key generation center. We offer the formal security models and the instantiation system with security analysis. As compared to <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span>, we further optimize the key-generation algorithms such that the computational overhead of transformation-key and verification-key generation for data users is reduced from O(<span><math><mi>Ω</mi></math></span>) to O(1) and reduced by half respectively, where <span><math><mi>Ω</mi></math></span> is the number of attributes.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103854"},"PeriodicalIF":5.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse KASE-AKA:针对关键字猜测攻击和授权滥用的关键字聚合可搜索加密技术
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-15 DOI: 10.1016/j.csi.2024.103852
Caihui Lan , Haifeng Li , Caifen Wang , Xiaodong Yang , Hailong Yao

Key-Aggregate Searchable (KASE) can enable a data owner to delegate search rights over a set of data files to multiple users through a single aggregated authorization key in multi-user data sharing environments. Despite the elegance of the KASE concept, designing a KASE scheme that simultaneously prevents authorization from being abused and resists offline keyword guessing attacks is a formidable challenge. To respond the challenge, we propose a secure Key Aggregation Keyword Searchable Encryption against Keyword Guessing Attack and Authorization Abuse (KASE-AKA) scheme. Compared with existing KASE schemes, our KASE-AKA scheme has the following merits: (1) supporting dynamic update of user data search right through a user data search right list maintained by the semi-trust cloud server. (2) preventing the authorization from being abused since the authorization key (aggregate key) associates the user’s public key, a subset of access rights, and a common secret value that only the cloud and data owner can collaboratively generate. (3) providing resistance against offline keyword guessing attacks. Correctness proof, security analysis and performance evaluation demonstrate that the proposed KASE-AKA scheme is provably secure, highly efficient and more feasible in practical application scenarios.

在多用户数据共享环境中,密钥聚合可搜索(KASE)可使数据所有者通过一个聚合授权密钥将一组数据文件的搜索权委托给多个用户。尽管 KASE 的概念非常优雅,但设计一种既能防止授权被滥用又能抵御离线关键字猜测攻击的 KASE 方案却是一项艰巨的挑战。为了应对这一挑战,我们提出了一种针对关键词猜测攻击和授权滥用的安全密钥聚合关键词可搜索加密(KASE-AKA)方案。与现有的 KASE 方案相比,我们的 KASE-AKA 方案具有以下优点:(1)通过半信任云服务器维护的用户数据搜索权列表,支持用户数据搜索权的动态更新。(2)防止授权被滥用,因为授权密钥(聚合密钥)将用户的公钥、访问权限子集和一个只有云和数据所有者才能共同生成的公共秘值联系在一起。(3) 抵御离线关键字猜测攻击。正确性证明、安全性分析和性能评估表明,所提出的 KASE-AKA 方案具有可证明的安全性、高效性和实际应用场景的可行性。
{"title":"KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse","authors":"Caihui Lan ,&nbsp;Haifeng Li ,&nbsp;Caifen Wang ,&nbsp;Xiaodong Yang ,&nbsp;Hailong Yao","doi":"10.1016/j.csi.2024.103852","DOIUrl":"10.1016/j.csi.2024.103852","url":null,"abstract":"<div><p>Key-Aggregate Searchable (KASE) can enable a data owner to delegate search rights over a set of data files to multiple users through a single aggregated authorization key in multi-user data sharing environments. Despite the elegance of the KASE concept, designing a KASE scheme that simultaneously prevents authorization from being abused and resists offline keyword guessing attacks is a formidable challenge. To respond the challenge, we propose a secure Key Aggregation Keyword Searchable Encryption against Keyword Guessing Attack and Authorization Abuse (KASE-AKA) scheme. Compared with existing KASE schemes, our KASE-AKA scheme has the following merits: (1) supporting dynamic update of user data search right through a user data search right list maintained by the semi-trust cloud server. (2) preventing the authorization from being abused since the authorization key (aggregate key) associates the user’s public key, a subset of access rights, and a common secret value that only the cloud and data owner can collaboratively generate. (3) providing resistance against offline keyword guessing attacks. Correctness proof, security analysis and performance evaluation demonstrate that the proposed KASE-AKA scheme is provably secure, highly efficient and more feasible in practical application scenarios.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103852"},"PeriodicalIF":5.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert communication via blockchain: Hiding patterns and communication patterns 通过区块链进行隐蔽通信:隐藏模式和通信模式
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-13 DOI: 10.1016/j.csi.2024.103851
Tao Zhang , Qianhong Wu , Qin Wang , Tianxu Han , Bingyu Li , Yan Zhu

Blockchain technology has demonstrated promising potential for covert communication. Although a series of studies have investigated blockchain-based covert communication, systematic research on the information-hiding patterns and covert communication patterns built on the blockchain is absent. This paper aims to conduct a comprehensive analysis of the related patterns. Based on intensive investigation, we abstract and propose a reference model for blockchain-based covert communication. We accordingly identify five types of covert communication patterns, each with different roles for covert senders and covert receivers, which enable one-to-one and one-to-many communication. Using Bitcoin as an example, we analyze the data distribution of covert channels within the block and transaction structure. Furthermore, we compare the hiding patterns and covert communication patterns and discuss the challenges and promising directions to achieve secure, robust, and cost-effective covert communication using blockchain. This work can provide valuable insights into the potential of blockchain technology for covert communication and lay the foundation for future research in this area.

区块链技术在隐蔽通信方面展现出了巨大的潜力。虽然已有一系列研究对基于区块链的隐蔽通信进行了调查,但对建立在区块链基础上的信息隐藏模式和隐蔽通信模式还缺乏系统的研究。本文旨在对相关模式进行全面分析。在深入研究的基础上,我们抽象并提出了基于区块链的隐蔽通信参考模型。据此,我们确定了五种隐蔽通信模式,每种模式的隐蔽发送方和隐蔽接收方都扮演着不同的角色,可以实现一对一和一对多的通信。以比特币为例,我们分析了隐蔽信道在区块和交易结构中的数据分布。此外,我们还比较了隐藏模式和隐蔽通信模式,并讨论了使用区块链实现安全、稳健和经济高效的隐蔽通信所面临的挑战和有前景的方向。这项工作可以为区块链技术在隐蔽通信方面的潜力提供有价值的见解,并为该领域未来的研究奠定基础。
{"title":"Covert communication via blockchain: Hiding patterns and communication patterns","authors":"Tao Zhang ,&nbsp;Qianhong Wu ,&nbsp;Qin Wang ,&nbsp;Tianxu Han ,&nbsp;Bingyu Li ,&nbsp;Yan Zhu","doi":"10.1016/j.csi.2024.103851","DOIUrl":"10.1016/j.csi.2024.103851","url":null,"abstract":"<div><p>Blockchain technology has demonstrated promising potential for covert communication. Although a series of studies have investigated blockchain-based covert communication, systematic research on the information-hiding patterns and covert communication patterns built on the blockchain is absent. This paper aims to conduct a comprehensive analysis of the related patterns. Based on intensive investigation, we abstract and propose a reference model for blockchain-based covert communication. We accordingly identify five types of covert communication patterns, each with different roles for covert senders and covert receivers, which enable one-to-one and one-to-many communication. Using Bitcoin as an example, we analyze the data distribution of covert channels within the block and transaction structure. Furthermore, we compare the hiding patterns and covert communication patterns and discuss the challenges and promising directions to achieve secure, robust, and cost-effective covert communication using blockchain. This work can provide valuable insights into the potential of blockchain technology for covert communication and lay the foundation for future research in this area.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103851"},"PeriodicalIF":5.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1