首页 > 最新文献

Computers & Security最新文献

英文 中文
Adopting security practices in software development process: Security testing framework for sustainable smart cities 在软件开发过程中采用安全实践:可持续智慧城市的安全测试框架
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1016/j.cose.2024.103985
Yusuf Mothanna , Wael ElMedany , Mustafa Hammad , Riadh Ksantini , Mhd Saeed Sharif

The dependence on smart city applications has expanded in recent years. Consequently, the number of cyberattack attempts to exploit smart application vulnerabilities significantly increases. Therefore, improving smart application security during the software development process is mandatory to ensure sustainable smart cities. But the challenge is how to adopt security practices in the software development process. There are Several established and mature security testing frameworks exist that consider security requirements and testing during Several already established and mature security testing frameworks exist that consider security requirements and testing during Software Development Life Cycle (SDLC), but there is a unique challenges posed by smart city applications and the need for a comprehensive approach to address the evolving threat landscape in this context. This paper proposed a framework that adopts security testing practices in all phases of the software development process. The proposed framework identifies several security activities and steps that can be applied in each phase of the software development process.

近年来,人们对智能城市应用的依赖程度不断提高。因此,试图利用智能应用程序漏洞进行网络攻击的次数大大增加。因此,要确保智能城市的可持续发展,就必须在软件开发过程中提高智能应用的安全性。但挑战在于如何在软件开发过程中采用安全实践。目前已有几个成熟的安全测试框架,考虑了软件开发生命周期(SDLC)过程中的安全要求和测试,但智慧城市应用带来了独特的挑战,需要一种全面的方法来应对这种情况下不断变化的威胁。本文提出了一个框架,在软件开发流程的所有阶段采用安全测试实践。建议的框架确定了可应用于软件开发流程各阶段的若干安全活动和步骤。
{"title":"Adopting security practices in software development process: Security testing framework for sustainable smart cities","authors":"Yusuf Mothanna ,&nbsp;Wael ElMedany ,&nbsp;Mustafa Hammad ,&nbsp;Riadh Ksantini ,&nbsp;Mhd Saeed Sharif","doi":"10.1016/j.cose.2024.103985","DOIUrl":"https://doi.org/10.1016/j.cose.2024.103985","url":null,"abstract":"<div><p>The dependence on smart city applications has expanded in recent years. Consequently, the number of cyberattack attempts to exploit smart application vulnerabilities significantly increases. Therefore, improving smart application security during the software development process is mandatory to ensure sustainable smart cities. But the challenge is how to adopt security practices in the software development process. There are Several established and mature security testing frameworks exist that consider security requirements and testing during Several already established and mature security testing frameworks exist that consider security requirements and testing during Software Development Life Cycle (SDLC), but there is a unique challenges posed by smart city applications and the need for a comprehensive approach to address the evolving threat landscape in this context. This paper proposed a framework that adopts security testing practices in all phases of the software development process. The proposed framework identifies several security activities and steps that can be applied in each phase of the software development process.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824002906/pdfft?md5=125a77678cf799c7c791692f07657196&pid=1-s2.0-S0167404824002906-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure 检测在电动汽车 (EV) 充电基础设施上产生虚假验证的分布式拒绝服务 (DDoS) 攻击
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1016/j.cose.2024.103989

In recent years, smart grid-based Electric Vehicle (EV) charging systems have increasingly faced vulnerabilities to Distributed Denial of Service (DDoS) attacks, especially through malicious authentication failures. These attacks typically involve monopolizing the Grid Server (GS), thereby hindering the authentication process for legitimate EVs. Despite the severity of this issue, no research (to the best of our knowledge) has focused on detecting DDoS attacks exploiting weaknesses in EV authentication. This study introduces a DDoS attack detection model specifically designed for EV authentication. The approach involves developing a machine learning model involving unique feature selection and combination. The proposed approach has been evaluated using a new DDOS attack dataset. The model is engineered to optimize feature combination, aiming for high sampling resolution, minimal information loss, and robust performance under 16 distinct attack scenarios. The feature combination used in this study shows improved accuracy over traditional DDoS detection methods based on access time variation while minimizing information loss.

近年来,基于智能电网的电动汽车(EV)充电系统越来越容易受到分布式拒绝服务(DDoS)攻击,特别是通过恶意认证失败。这些攻击通常涉及垄断电网服务器(GS),从而阻碍合法电动汽车的认证过程。尽管这个问题很严重,但据我们所知,还没有研究专注于检测利用电动汽车身份验证弱点的 DDoS 攻击。本研究介绍了一种专为电动汽车身份验证设计的 DDoS 攻击检测模型。该方法包括开发一个涉及独特特征选择和组合的机器学习模型。使用新的 DDOS 攻击数据集对所提出的方法进行了评估。该模型旨在优化特征组合,以实现高采样分辨率、最小信息损失以及在 16 种不同攻击场景下的稳健性能。与传统的基于访问时间变化的 DDoS 检测方法相比,本研究中使用的特征组合提高了准确性,同时最大限度地减少了信息丢失。
{"title":"Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure","authors":"","doi":"10.1016/j.cose.2024.103989","DOIUrl":"10.1016/j.cose.2024.103989","url":null,"abstract":"<div><p>In recent years, smart grid-based Electric Vehicle (EV) charging systems have increasingly faced vulnerabilities to Distributed Denial of Service (DDoS) attacks, especially through malicious authentication failures. These attacks typically involve monopolizing the Grid Server (GS), thereby hindering the authentication process for legitimate EVs. Despite the severity of this issue, no research (to the best of our knowledge) has focused on detecting DDoS attacks exploiting weaknesses in EV authentication. This study introduces a DDoS attack detection model specifically designed for EV authentication. The approach involves developing a machine learning model involving unique feature selection and combination. The proposed approach has been evaluated using a new DDOS attack dataset. The model is engineered to optimize feature combination, aiming for high sampling resolution, minimal information loss, and robust performance under 16 distinct attack scenarios. The feature combination used in this study shows improved accuracy over traditional DDoS detection methods based on access time variation while minimizing information loss.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824002943/pdfft?md5=2b0ff73e6c7df4772433733b7937cd0f&pid=1-s2.0-S0167404824002943-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy in manifolds: Combining k-anonymity with differential privacy on Fréchet means 流形中的隐私:将 K 匿名与弗雷谢特手段上的差分隐私相结合
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1016/j.cose.2024.103983

While anonymization techniques have improved greatly in allowing data to be used again, it is still really hard to get useful information from anonymized data without risking people’s privacy. Conventional approaches such as k-Anonymity and Differential Privacy have limitations in preserving data utility and privacy simultaneously, particularly in high-dimensional spaces with manifold structures. We address this challenge by focusing on anonymizing data existing within high-dimensional spaces possessing manifold structures. To tackle these issues, we propose and implement a hybrid anonymization scheme termed as the (β, k, b)-anonymization method that combines elements of both differential privacy and k-anonymity. This approach aims to produce high-quality anonymized data that closely resembles real data in terms of knowledge extraction while safeguarding privacy. The Fréchet mean, an operation applicable in metric spaces and meaningful in the manifold setting, serves as a key aspect of our approach. It provides insight into the geometry of data points within high-dimensional spaces. Our goal is to anonymize this Fréchet mean using our proposed approach and minimize the distance between the original and anonymized Fréchet mean to achieve data privacy without significant loss of information. Additionally, we introduce a novel Fréchet mean clustering model designed to enhance the clustering process for high-dimensional spaces. Through theoretical analysis and practical experiments, we demonstrate that our approach outperforms traditional privacy models both in terms of preserving data utility and privacy. This research contributes to advancing privacy-preserving techniques for complex and non-linear data structures, ensuring a balance between data utility and privacy protection.

虽然匿名技术在允许数据再次使用方面有了很大改进,但要从匿名数据中获取有用信息而又不危及个人隐私,仍然非常困难。k 匿名和差分隐私等传统方法在同时保护数据效用和隐私方面存在局限性,尤其是在具有流形结构的高维空间中。我们将重点放在对具有流形结构的高维空间中存在的数据进行匿名处理,从而应对这一挑战。为了解决这些问题,我们提出并实施了一种混合匿名方案,称为 (β, k, b)匿名方法,它结合了差分隐私和 k 匿名的元素。这种方法旨在生成高质量的匿名数据,在知识提取方面与真实数据非常相似,同时保护隐私。弗雷谢特均值是一种适用于度量空间的运算,在流形设置中意义重大,是我们方法的一个关键方面。它能让我们深入了解高维空间中数据点的几何形状。我们的目标是使用我们提出的方法对弗雷谢特均值进行匿名化,并最小化原始弗雷谢特均值与匿名化弗雷谢特均值之间的距离,从而在不丢失大量信息的情况下实现数据隐私。此外,我们还引入了一种新的弗雷谢特均值聚类模型,旨在增强高维空间的聚类过程。通过理论分析和实际实验,我们证明了我们的方法在保护数据效用和隐私方面都优于传统的隐私模型。这项研究有助于推进复杂和非线性数据结构的隐私保护技术,确保数据实用性和隐私保护之间的平衡。
{"title":"Privacy in manifolds: Combining k-anonymity with differential privacy on Fréchet means","authors":"","doi":"10.1016/j.cose.2024.103983","DOIUrl":"10.1016/j.cose.2024.103983","url":null,"abstract":"<div><p>While anonymization techniques have improved greatly in allowing data to be used again, it is still really hard to get useful information from anonymized data without risking people’s privacy. Conventional approaches such as k-Anonymity and Differential Privacy have limitations in preserving data utility and privacy simultaneously, particularly in high-dimensional spaces with manifold structures. We address this challenge by focusing on anonymizing data existing within high-dimensional spaces possessing manifold structures. To tackle these issues, we propose and implement a hybrid anonymization scheme termed as the (<span><math><mi>β</mi></math></span>, <span><math><mi>k</mi></math></span>, <span><math><mi>b</mi></math></span>)-anonymization method that combines elements of both differential privacy and k-anonymity. This approach aims to produce high-quality anonymized data that closely resembles real data in terms of knowledge extraction while safeguarding privacy. The Fréchet mean, an operation applicable in metric spaces and meaningful in the manifold setting, serves as a key aspect of our approach. It provides insight into the geometry of data points within high-dimensional spaces. Our goal is to anonymize this Fréchet mean using our proposed approach and minimize the distance between the original and anonymized Fréchet mean to achieve data privacy without significant loss of information. Additionally, we introduce a novel Fréchet mean clustering model designed to enhance the clustering process for high-dimensional spaces. Through theoretical analysis and practical experiments, we demonstrate that our approach outperforms traditional privacy models both in terms of preserving data utility and privacy. This research contributes to advancing privacy-preserving techniques for complex and non-linear data structures, ensuring a balance between data utility and privacy protection.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824002888/pdfft?md5=a14f469316460402540287437b369b27&pid=1-s2.0-S0167404824002888-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy 一种同时具备对抗性攻击取证和识别准确性的对抗性样本恢复方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1016/j.cose.2024.103987
Zigang Chen , Zhen Wang , Yuening Zhou , Fan Liu , Yuhong Liu , Tao Leng , Haihua Zhu

Adversarial samples deceive machine learning models through small but elaborate modifications that lead to erroneous outputs. The severity of the adversarial sample problem has come to the forefront with the widespread use of machine learning in areas such as security systems, autonomous driving, speech recognition, finance, and medical diagnostics. Malicious attackers can use adversarial samples to circumvent security detection systems, interfere with autonomous driving perception, mislead speech recognition, defraud financial systems, and even cause medical diagnosis errors. The emergence of adversarial samples exposes the vulnerability of existing models and poses challenges for information tracing and forensics after the incident. The main goal of current adversarial sample restoration methods is to improve model robustness. Traditional approaches focus only on improving the model’s classification accuracy, ignoring the importance of adversarial information, which is crucial for understanding the attack mechanism and strengthening future defenses. To address this issue, we propose an adversarial sample restoration method based on the similarity between clean and adversarial sample blocks to balance the needs of adversarial forensics and recognition accuracy. We implement the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), and Momentum Iterative Attack (MIA) attacks on MNIST, F-MNIST, and EMNIST datasets and perform experimental validation. The results demonstrate that our restoration method significantly enhances the model’s classification accuracy across various datasets and attack scenarios. Comparative analysis shows that the restored samples maintain a high similarity with the original adversarial samples, proving the method’s effectiveness. In addition, we performed performance tests on pre- and post-recovery samples. Taking the MNIST dataset as an example, we observed that the model performance metrics, such as MAPE, MAE, RMSE, and VAPE, of the restored samples improved by 88%, 88%, 65%, and 82%, respectively, after using the FGSM attack. This indicates that our restoration method successfully preserves the information of the generation mechanism of the adversarial samples and improves the model’s performance. This approach balances forensic capability and prediction accuracy, demonstrates a new direction in adversarial sample research, and substantially impacts security defense in practical applications.

对抗样本通过小而精细的修改欺骗机器学习模型,导致错误输出。随着机器学习在安全系统、自动驾驶、语音识别、金融和医疗诊断等领域的广泛应用,对抗样本问题的严重性凸显出来。恶意攻击者可以利用对抗样本规避安全检测系统、干扰自动驾驶感知、误导语音识别、欺诈金融系统,甚至造成医疗诊断错误。对抗样本的出现暴露了现有模型的脆弱性,并对事件发生后的信息追踪和取证提出了挑战。当前对抗样本修复方法的主要目标是提高模型的鲁棒性。传统方法只注重提高模型的分类准确性,忽视了对抗信息的重要性,而对抗信息对于理解攻击机制和加强未来防御至关重要。针对这一问题,我们提出了一种基于干净样本块和对抗样本块相似性的对抗样本还原方法,以平衡对抗取证和识别准确性的需求。我们在 MNIST、F-MNIST 和 EMNIST 数据集上实现了快速梯度符号法(FGSM)、基本迭代法(BIM)和动量迭代攻击(MIA),并进行了实验验证。结果表明,我们的还原方法能显著提高模型在不同数据集和攻击场景下的分类准确性。对比分析表明,修复后的样本与原始对抗样本保持了很高的相似度,证明了该方法的有效性。此外,我们还对恢复前和恢复后的样本进行了性能测试。以 MNIST 数据集为例,我们观察到在使用 FGSM 攻击后,恢复样本的模型性能指标(如 MAPE、MAE、RMSE 和 VAPE)分别提高了 88%、88%、65% 和 82%。这表明我们的还原方法成功地保留了对抗样本的生成机制信息,提高了模型的性能。这种方法兼顾了取证能力和预测精度,展示了对抗样本研究的新方向,并对实际应用中的安全防御产生了实质性影响。
{"title":"A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy","authors":"Zigang Chen ,&nbsp;Zhen Wang ,&nbsp;Yuening Zhou ,&nbsp;Fan Liu ,&nbsp;Yuhong Liu ,&nbsp;Tao Leng ,&nbsp;Haihua Zhu","doi":"10.1016/j.cose.2024.103987","DOIUrl":"https://doi.org/10.1016/j.cose.2024.103987","url":null,"abstract":"<div><p>Adversarial samples deceive machine learning models through small but elaborate modifications that lead to erroneous outputs. The severity of the adversarial sample problem has come to the forefront with the widespread use of machine learning in areas such as security systems, autonomous driving, speech recognition, finance, and medical diagnostics. Malicious attackers can use adversarial samples to circumvent security detection systems, interfere with autonomous driving perception, mislead speech recognition, defraud financial systems, and even cause medical diagnosis errors. The emergence of adversarial samples exposes the vulnerability of existing models and poses challenges for information tracing and forensics after the incident. The main goal of current adversarial sample restoration methods is to improve model robustness. Traditional approaches focus only on improving the model’s classification accuracy, ignoring the importance of adversarial information, which is crucial for understanding the attack mechanism and strengthening future defenses. To address this issue, we propose an adversarial sample restoration method based on the similarity between clean and adversarial sample blocks to balance the needs of adversarial forensics and recognition accuracy. We implement the Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), and Momentum Iterative Attack (MIA) attacks on MNIST, F-MNIST, and EMNIST datasets and perform experimental validation. The results demonstrate that our restoration method significantly enhances the model’s classification accuracy across various datasets and attack scenarios. Comparative analysis shows that the restored samples maintain a high similarity with the original adversarial samples, proving the method’s effectiveness. In addition, we performed performance tests on pre- and post-recovery samples. Taking the MNIST dataset as an example, we observed that the model performance metrics, such as MAPE, MAE, RMSE, and VAPE, of the restored samples improved by 88%, 88%, 65%, and 82%, respectively, after using the FGSM attack. This indicates that our restoration method successfully preserves the information of the generation mechanism of the adversarial samples and improves the model’s performance. This approach balances forensic capability and prediction accuracy, demonstrates a new direction in adversarial sample research, and substantially impacts security defense in practical applications.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization 利用 FLAME 提高物联网安全性:结合模糊逻辑和人工蜥蜴搜索优化的混合方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.cose.2024.103984

The increasing usage of Internet of Things (IoT) devices has created a need for secure and efficient solutions to protect sensitive data from unauthorized access. However, the complicated and massive structure of IoT systems poses various security risks and challenges, especially in dynamic scenarios with high signaling overhead caused by subscriber mobility. So, in this paper, a Fuzzy-based Lightweight Authentication and Management of Encryption approach called ‘FLAME’ is proposed to solve the decentralized lightweight group key management problem by measuring the degree of security using fuzzy logic (FL) based on various factors like device and user behavior, network conditions, and resource availability. For effective key-based authentication, adopted an Artificial Lizard Search Optimization (ALSO) based RSA (Rivest, Shamir, Adleman) algorithm that generates private and public keys based on security evaluation outcome. The publishers and subscribers obtain encryption keys from the group key manager based on their security level, and dissemination is optimized by the ALSO algorithm. By leveraging the FL and ALSO based RSA algorithm, the system offers secure communication with limited utilization and protects confidential data in IoT environments. According to the analysis, results signify that the FLAME approach has a faster key generation, dissemination, and revocation time compared to existing approaches, along with reduced overhead during key management operations, and increased attack detection capacity of 98.7 %.

随着物联网(IoT)设备的使用日益增多,人们需要安全高效的解决方案来保护敏感数据免遭未经授权的访问。然而,物联网系统复杂而庞大的结构带来了各种安全风险和挑战,尤其是在动态场景中,由于用户的移动性,信令开销很大。因此,本文提出了一种名为 "FLAME "的基于模糊的轻量级认证和加密管理方法,根据设备和用户行为、网络条件和资源可用性等各种因素,利用模糊逻辑(FL)衡量安全程度,从而解决分散式轻量级群组密钥管理问题。为实现有效的基于密钥的身份验证,采用了基于 RSA(Rivest、Shamir、Adleman)算法的人工蜥蜴搜索优化(ALSO),根据安全评估结果生成私钥和公钥。发布者和订阅者根据其安全等级从群组密钥管理器获取加密密钥,并通过 ALSO 算法优化传播。通过利用基于 FL 和 ALSO 的 RSA 算法,该系统在有限的利用率下提供了安全通信,并保护了物联网环境中的机密数据。分析结果表明,与现有方法相比,FLAME 方法具有更快的密钥生成、传播和撤销时间,同时减少了密钥管理操作过程中的开销,并将攻击检测能力提高了 98.7%。
{"title":"Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization","authors":"","doi":"10.1016/j.cose.2024.103984","DOIUrl":"10.1016/j.cose.2024.103984","url":null,"abstract":"<div><p>The increasing usage of Internet of Things (IoT) devices has created a need for secure and efficient solutions to protect sensitive data from unauthorized access. However, the complicated and massive structure of IoT systems poses various security risks and challenges, especially in dynamic scenarios with high signaling overhead caused by subscriber mobility. So, in this paper, a Fuzzy-based Lightweight Authentication and Management of Encryption approach called ‘FLAME’ is proposed to solve the decentralized lightweight group key management problem by measuring the degree of security using fuzzy logic (FL) based on various factors like device and user behavior, network conditions, and resource availability. For effective key-based authentication, adopted an Artificial Lizard Search Optimization (ALSO) based RSA (Rivest, Shamir, Adleman) algorithm that generates private and public keys based on security evaluation outcome. The publishers and subscribers obtain encryption keys from the group key manager based on their security level, and dissemination is optimized by the ALSO algorithm. By leveraging the FL and ALSO based RSA algorithm, the system offers secure communication with limited utilization and protects confidential data in IoT environments. According to the analysis, results signify that the FLAME approach has a faster key generation, dissemination, and revocation time compared to existing approaches, along with reduced overhead during key management operations, and increased attack detection capacity of 98.7 %.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141707813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combating temporal composition inference by high-order camouflaged network topology obfuscation 通过高阶伪装网络拓扑混淆对抗时序构成推理
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.cose.2024.103981
Xiaohui Li , Xiang Yang , Yizhao Huang , Yue Chen

Topology inference driven by non-collaborative or incomplete prior knowledge is widely used in pivotal target network sieving and completion. However, perceivable topology also allows attackers to identify the fragile bottlenecks and perform efficacious attacks that are difficult to defend against by injecting indistinguishable low-volume attacks. Most existing countermeasures are proposed to obfuscate network data or set up honeypots with adversarial examples. However, there are two challenges when adding perturbations to live network links or nodes. Firstly, the perturbations imposed on the network cannot be conveniently projected to the original network with poor scalability. Secondly, applying significant changes to network information is laborious and impractical. In short, making a good trade-off between concealment and complexity is challenging. To address the above issues, we propose a fraudulent proactive defending tactic, namely HBB-TSP, to protect live network privacy by combating attacks of temporal network inference. Specifically, to penetrate the critical network structures, HBB-TSP first brings in the Statistical Validation of Hypergraph (SVH) method to identify the pivotal connection information of the network and extract the deep backbone structure. Then, the Temporal Simple Decomposition Weighting (TSDW) strategy is introduced, which can predict the backbone network with evolution rules and add highly obfuscated features at a minimized overhead. Finally, a discriminator with multiple centrality models is used to evaluate the deceptiveness and, in turn, affect the TSDW prediction. The entire process ensures the consistency and robustness of network changes while ensuring effective adversarial resistance. Experimental results on two scale real-world datasets demonstrate the effectiveness and generalization of adversarial perturbations. In particular, it is encouraging that our proposed defending scheme outperforms the advanced countermeasures. It ensures the realization of a deceptive obfuscated network at minimum overhead and is suitable for widespread deployment in scenarios of different scales.

由非协作或不完整先验知识驱动的拓扑推断被广泛应用于关键目标网络的筛选和完善。然而,可感知拓扑也允许攻击者识别脆弱的瓶颈,并通过注入难以区分的低量攻击来实施难以防御的有效攻击。现有的应对措施大多是通过混淆网络数据或设置具有对抗性实例的 "巢穴"(honeypots)来实现的。然而,在实时网络链接或节点上添加扰动有两个挑战。首先,对网络施加的扰动无法方便地投射到原始网络,可扩展性差。其次,对网络信息进行重大更改既费力又不切实际。总之,如何在隐蔽性和复杂性之间取得良好的平衡是一项挑战。针对上述问题,我们提出了一种欺诈性主动防御策略,即 HBB-TSP,通过对抗时态网络推理攻击来保护实时网络隐私。具体来说,为了穿透关键网络结构,HBB-TSP 首先引入超图统计验证(SVH)方法,识别网络的关键连接信息,提取深层骨干结构。然后,引入时间简单分解加权(Temporal Simple Decomposition Weighting,TSDW)策略,利用演化规则预测骨干网络,并以最小的开销添加高混淆特征。最后,使用具有多个中心性模型的判别器来评估欺骗性,进而影响 TSDW 预测。整个过程确保了网络变化的一致性和鲁棒性,同时保证了有效的抗对抗性。在两个大规模真实数据集上的实验结果证明了对抗性扰动的有效性和通用性。尤其令人鼓舞的是,我们提出的防御方案优于先进的对抗措施。它确保以最小的开销实现欺骗性混淆网络,适合在不同规模的场景中广泛部署。
{"title":"Combating temporal composition inference by high-order camouflaged network topology obfuscation","authors":"Xiaohui Li ,&nbsp;Xiang Yang ,&nbsp;Yizhao Huang ,&nbsp;Yue Chen","doi":"10.1016/j.cose.2024.103981","DOIUrl":"https://doi.org/10.1016/j.cose.2024.103981","url":null,"abstract":"<div><p>Topology inference driven by non-collaborative or incomplete prior knowledge is widely used in pivotal target network sieving and completion. However, perceivable topology also allows attackers to identify the fragile bottlenecks and perform efficacious attacks that are difficult to defend against by injecting indistinguishable low-volume attacks. Most existing countermeasures are proposed to obfuscate network data or set up honeypots with adversarial examples. However, there are two challenges when adding perturbations to live network links or nodes. Firstly, the perturbations imposed on the network cannot be conveniently projected to the original network with poor scalability. Secondly, applying significant changes to network information is laborious and impractical. In short, making a good trade-off between concealment and complexity is challenging. To address the above issues, we propose a fraudulent proactive defending tactic, namely <em>HBB-TSP</em>, to protect live network privacy by combating attacks of temporal network inference. Specifically, to penetrate the critical network structures, <em>HBB-TSP</em> first brings in the Statistical Validation of Hypergraph (SVH) method to identify the pivotal connection information of the network and extract the deep backbone structure. Then, the Temporal Simple Decomposition Weighting (TSDW) strategy is introduced, which can predict the backbone network with evolution rules and add highly obfuscated features at a minimized overhead. Finally, a discriminator with multiple centrality models is used to evaluate the deceptiveness and, in turn, affect the TSDW prediction. The entire process ensures the consistency and robustness of network changes while ensuring effective adversarial resistance. Experimental results on two scale real-world datasets demonstrate the effectiveness and generalization of adversarial perturbations. In particular, it is encouraging that our proposed defending scheme outperforms the advanced countermeasures. It ensures the realization of a deceptive obfuscated network at minimum overhead and is suitable for widespread deployment in scenarios of different scales.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141593804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TFAN: A Task-adaptive Feature Alignment Network for few-shot website fingerprinting attacks on Tor TFAN:针对 Tor 上少量网站指纹攻击的任务自适应特征对齐网络
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.cose.2024.103980
Qiuyun Lyu , Huihui Xie , Wei Wang , Yanyu Cheng , Yongqun Chen , Zhen Wang

Few-shot website fingerprinting (WF) attacks aim to infer which website a user browsed through anonymity networks, such as Tor, using limited labeled traces. Recent methods either adopt complex metric strategies or perform time-consuming transfer learning, neither of which yields the most efficient performance in dynamic network environments. In this paper, we introduce a novel Task-adaptive Feature Alignment Network (TFAN) following the meta-learning paradigm. TFAN regards the few-shot WF attack as a feature alignment problem in class latent space, aiming to depict each location in the query feature map as a weighted sum of support features of a given class. Ridge regression provides a closed-form solution without extra parameters or techniques, ensuring high computational efficiency. Moreover, we also propose a Task-adaptive Modulation Unit (TMU), which activates the differences between support prototypes to generate task-level channel weights, making channels with significant discriminative details for each task contribute more to alignment. Extensive experiments on public Tor datasets demonstrate the superiority of TFAN in different scenarios. Notably, it is the only method that maintains over 90% accuracy in the 1-shot setting even 42 days later. Our code is available at https://github.com/Crybaby98/TFAN.

少量网站指纹(WF)攻击旨在利用有限的标记痕迹,推断用户通过匿名网络(如 Tor)浏览了哪个网站。最近的方法要么采用复杂的度量策略,要么执行耗时的迁移学习,但这两种方法都不能在动态网络环境中产生最高效的性能。在本文中,我们按照元学习范式介绍了一种新型任务自适应特征对齐网络(TFAN)。TFAN 将少发 WF 攻击视为类潜在空间中的特征对齐问题,旨在将查询特征图中的每个位置描绘成给定类的支持特征的加权和。岭回归提供了一种闭式解决方案,无需额外的参数或技术,从而确保了较高的计算效率。此外,我们还提出了任务自适应调制单元(TMU),它可以激活支持原型之间的差异来生成任务级通道权重,从而使每个任务中具有显著区分细节的通道对排列做出更大贡献。在公共 Tor 数据集上进行的大量实验证明了 TFAN 在不同场景下的优越性。值得注意的是,它是唯一一种即使在 42 天后仍能在单次拍摄设置中保持 90% 以上准确率的方法。我们的代码见 https://github.com/Crybaby98/TFAN。
{"title":"TFAN: A Task-adaptive Feature Alignment Network for few-shot website fingerprinting attacks on Tor","authors":"Qiuyun Lyu ,&nbsp;Huihui Xie ,&nbsp;Wei Wang ,&nbsp;Yanyu Cheng ,&nbsp;Yongqun Chen ,&nbsp;Zhen Wang","doi":"10.1016/j.cose.2024.103980","DOIUrl":"https://doi.org/10.1016/j.cose.2024.103980","url":null,"abstract":"<div><p>Few-shot website fingerprinting (WF) attacks aim to infer which website a user browsed through anonymity networks, such as Tor, using limited labeled traces. Recent methods either adopt complex metric strategies or perform time-consuming transfer learning, neither of which yields the most efficient performance in dynamic network environments. In this paper, we introduce a novel Task-adaptive Feature Alignment Network (TFAN) following the meta-learning paradigm. TFAN regards the few-shot WF attack as a feature alignment problem in class latent space, aiming to depict each location in the query feature map as a weighted sum of support features of a given class. Ridge regression provides a closed-form solution without extra parameters or techniques, ensuring high computational efficiency. Moreover, we also propose a Task-adaptive Modulation Unit (TMU), which activates the differences between support prototypes to generate task-level channel weights, making channels with significant discriminative details for each task contribute more to alignment. Extensive experiments on public Tor datasets demonstrate the superiority of TFAN in different scenarios. Notably, it is the only method that maintains over 90% accuracy in the 1-shot setting even 42 days later. Our code is available at <span>https://github.com/Crybaby98/TFAN</span><svg><path></path></svg>.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DomEye: Detecting network covert channel of domain fronting with throughput fluctuation DomEye:检测吞吐量波动的域前沿网络隐蔽信道
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.cose.2024.103976
Yibo Xie, Gaopeng Gou, Gang Xiong, Zhen Li, Wei Xia

Domain fronting, a typical network covert channel, hides malicious information inside encrypted network connections, which are usually established with cloud-hosted domain names. Due to these domain names such as microsoft.com with high reputation, domain fronting realizes the imitation of normal network connections naturally. At present, the common way for domain fronting detection is using imitation flaws to distinguish it from normal network connections. Unlike existing approaches using packet-level flaws, in the paper, we propose DomEye, a novel method using flow-level flaws to detect domain fronting. The DomEye detector exploits a flow-level imitation flaw that domain fronting connections usually exhibit different throughput than normal connections, for example, meek, a domain fronting-based tool for covert darknet access, only reaches a throughput about 10.7 KB at the 50th packet, significantly less than file, image and other normal network requests. According to the imitation flaw, we extract statistical features of throughput fluctuation and feed them into machine learning algorithms to train DomEye detector. Experiments on real-world network traffic prove that DomEye can accurately identify three kinds of domain fronting-based tools with lower false positive rate and lesser computation overhead than the state-of-the-art methods. In conclusion, we propose a superior method for domain fronting detection based on the throughput imitation flaw. As this flaw is at the flow level, we hope more attention could be paid to mining flow-level flaws in the future.

域名掩护是一种典型的网络隐蔽渠道,它将恶意信息隐藏在加密的网络连接中,而这些网络连接通常是通过云托管的域名建立的。由于这些域名如 microsoft.com 等具有很高的知名度,域名前置自然而然地实现了对正常网络连接的模仿。目前,域名前置检测的常用方法是利用仿冒缺陷将其与正常网络连接区分开来。与现有的利用数据包级缺陷的方法不同,本文提出了一种利用流量级缺陷检测域前置的新方法--DomEye。DomEye 检测器利用了流量级模仿缺陷,即域前置连接通常表现出与正常连接不同的吞吐量,例如,基于域前置的隐蔽暗网访问工具 meek 在第 50 个数据包时的吞吐量仅为 10.7 KB 左右,明显低于文件、图像和其他正常网络请求。根据模仿缺陷,我们提取了吞吐量波动的统计特征,并将其输入机器学习算法来训练 DomEye 检测器。真实网络流量实验证明,DomEye 能准确识别三种基于域前置的工具,而且误报率较低,计算开销也低于最先进的方法。总之,我们提出了一种基于吞吐量模仿缺陷的卓越的域前置检测方法。由于这种缺陷是流量级的,我们希望今后能更多地关注流量级缺陷的挖掘。
{"title":"DomEye: Detecting network covert channel of domain fronting with throughput fluctuation","authors":"Yibo Xie,&nbsp;Gaopeng Gou,&nbsp;Gang Xiong,&nbsp;Zhen Li,&nbsp;Wei Xia","doi":"10.1016/j.cose.2024.103976","DOIUrl":"https://doi.org/10.1016/j.cose.2024.103976","url":null,"abstract":"<div><p>Domain fronting, a typical network covert channel, hides malicious information inside encrypted network connections, which are usually established with cloud-hosted domain names. Due to these domain names such as <em>microsoft.com</em> with high reputation, domain fronting realizes the imitation of normal network connections naturally. At present, the common way for domain fronting detection is using imitation flaws to distinguish it from normal network connections. Unlike existing approaches using packet-level flaws, in the paper, we propose DomEye, a novel method using flow-level flaws to detect domain fronting. The DomEye detector exploits a flow-level imitation flaw that domain fronting connections usually exhibit different throughput than normal connections, for example, <em>meek</em>, a domain fronting-based tool for covert darknet access, only reaches a throughput about 10.7 KB at the 50th packet, significantly less than file, image and other normal network requests. According to the imitation flaw, we extract statistical features of throughput fluctuation and feed them into machine learning algorithms to train DomEye detector. Experiments on real-world network traffic prove that DomEye can accurately identify three kinds of domain fronting-based tools with lower false positive rate and lesser computation overhead than the state-of-the-art methods. In conclusion, we propose a superior method for domain fronting detection based on the throughput imitation flaw. As this flaw is at the flow level, we hope more attention could be paid to mining flow-level flaws in the future.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system AIS-NIDS:智能自持式网络入侵检测系统
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.cose.2024.103982
Yasir Ali Farrukh , Syed Wali , Irfan Khan , Nathaniel D. Bastian

The ever-evolving landscape of network security is continually molded by the dynamic evolution of attack vectors and the relentless emergence of new, highly sophisticated attacks. Attackers consistently employ increasingly advanced techniques, rendering their actions elusive and formidable. In response to this ever-growing threat, the demand for intelligent and autonomous security systems has reached paramount importance. In this paper, we introduce AIS-NIDS (An Intelligent and Self-Sustaining Network Intrusion Detection System), an innovative network intrusion detection system (NIDS) that delves into the realm of packet-level analysis. By doing so, AIS-NIDS is capable of identifying threats with intricate payload-level details, a level of granularity that traditional NIDS relying solely on flow-level data may overlook. The defining feature of AIS-NIDS is its dual functionality, driven by autonomous and intelligent learning. It not only autonomously distinguishes between benign and unknown attacks using machine learning models but also conducts incremental learning, adapting to new attack classes. In essence, AIS-NIDS bridges the gap between traditional NIDS and the next generation of intelligent systems, endowing the system with the capacity for independent decision-making and real-time adaptability in the face of evolving threats. Our extensive experiments stand as a testament to AIS-NIDS’ ability to efficiently manage and identify new attack classes, thus establishing it as a valuable asset in the reinforcement of network infrastructures. Through our experimentation, we have demonstrated the practical efficacy of the proposed approach by simulating a real-world scenario in which certain attack classes are unknown. AIS-NIDS not only effectively identified these unknown threats but also autonomously learned to recognize them as it encountered them, enhancing the system’s capabilities for future encounters with these threats.

攻击载体的动态演变和不断涌现的新型、高度复杂的攻击不断塑造着网络安全不断变化的格局。攻击者不断采用越来越先进的技术,使他们的行动变得难以捉摸和可怕。为了应对这种日益增长的威胁,对智能和自主安全系统的需求已变得极为重要。在本文中,我们将介绍 AIS-NIDS(智能自持网络入侵检测系统),它是一种创新的网络入侵检测系统(NIDS),可深入到数据包级分析领域。通过这种方法,AIS-NIDS 能够识别具有复杂有效载荷级细节的威胁,而传统的网络入侵检测系统仅依靠流量级数据可能会忽略这种粒度。AIS-NIDS 的显著特点是由自主和智能学习驱动的双重功能。它不仅能利用机器学习模型自主区分良性攻击和未知攻击,还能进行增量学习,适应新的攻击类别。从本质上讲,AIS-NIDS 弥补了传统 NIDS 与下一代智能系统之间的差距,使系统在面对不断演变的威胁时具有独立决策和实时适应能力。我们的大量实验证明,AIS-NIDS 能够有效地管理和识别新的攻击类别,从而使其成为加强网络基础设施的宝贵资产。通过实验,我们模拟了现实世界中某些未知攻击类别的场景,证明了所建议方法的实际功效。AIS-NIDS 不仅有效地识别了这些未知威胁,还在遇到这些威胁时自主学习识别它们,增强了系统在未来遇到这些威胁时的能力。
{"title":"AIS-NIDS: An intelligent and self-sustaining network intrusion detection system","authors":"Yasir Ali Farrukh ,&nbsp;Syed Wali ,&nbsp;Irfan Khan ,&nbsp;Nathaniel D. Bastian","doi":"10.1016/j.cose.2024.103982","DOIUrl":"https://doi.org/10.1016/j.cose.2024.103982","url":null,"abstract":"<div><p>The ever-evolving landscape of network security is continually molded by the dynamic evolution of attack vectors and the relentless emergence of new, highly sophisticated attacks. Attackers consistently employ increasingly advanced techniques, rendering their actions elusive and formidable. In response to this ever-growing threat, the demand for intelligent and autonomous security systems has reached paramount importance. In this paper, we introduce AIS-NIDS (An Intelligent and Self-Sustaining Network Intrusion Detection System), an innovative network intrusion detection system (NIDS) that delves into the realm of packet-level analysis. By doing so, AIS-NIDS is capable of identifying threats with intricate payload-level details, a level of granularity that traditional NIDS relying solely on flow-level data may overlook. The defining feature of AIS-NIDS is its dual functionality, driven by autonomous and intelligent learning. It not only autonomously distinguishes between benign and unknown attacks using machine learning models but also conducts incremental learning, adapting to new attack classes. In essence, AIS-NIDS bridges the gap between traditional NIDS and the next generation of intelligent systems, endowing the system with the capacity for independent decision-making and real-time adaptability in the face of evolving threats. Our extensive experiments stand as a testament to AIS-NIDS’ ability to efficiently manage and identify new attack classes, thus establishing it as a valuable asset in the reinforcement of network infrastructures. Through our experimentation, we have demonstrated the practical efficacy of the proposed approach by simulating a real-world scenario in which certain attack classes are unknown. AIS-NIDS not only effectively identified these unknown threats but also autonomously learned to recognize them as it encountered them, enhancing the system’s capabilities for future encounters with these threats.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141593803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion 赋予数据所有者权力:高效、可验证的安全数据删除方案
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1016/j.cose.2024.103978
Zhenwu Xu , Xingshu Chen , Xiao Lan , Rui Tang , Shuyu Jiang , Changxiang Shen

Cloud services have attracted numerous enterprises, organizations, and individual users due to their exceptional computing power and almost limitless storage capacity. A vast amount of business data and private data are continuously uploaded to the cloud platform, driven by a series of attractive services offered by the cloud. Unfortunately, once data is uploaded to the cloud, its owner has no way of ensuring that it is actually deleted as intended. This obviously increases the concerns of data owners about the security of their data, because it is related to the privacy of users. Therefore, there must be a reliable solution to prove that data is deleted as requested by users, to prevent data leakage or abuse. In existing data deletion schemes, most are designed based on cryptographic knowledge rather than erasure or overwrite techniques, in order not to cause incalculable damage to the storage medium. However, most cryptographic-based data deletion schemes, particularly attribute-based encryption, involve numerous complex bilinear mapping operations, which are expensive for most devices. To address this issue, the paper proposes an Efficient and Verifiable Scheme for Secure Data Deletion (EVSD). Firstly, Elliptic Curve Cryptography (ECC) is introduced to achieve efficient encryption of data. Then, leveraging Linear Secret Sharing Scheme (LSSS), fine-grained data deletion policies supporting logical operations are implemented. Finally, the deletion of the data is efficiently verified using the root of the Merkle Hash Tree (MHT) generated by the defined illegal and legal attributes, while the deletion proof is also generated. Satisfactorily, security analysis shows that the EVSD scheme is much more advantageous compared to existing schemes, and a trait likewise is also observed in the performance evaluation.

云服务以其卓越的计算能力和几乎无限的存储容量吸引了众多企业、组织和个人用户。在云提供的一系列诱人服务的推动下,大量商业数据和私人数据不断上传到云平台。遗憾的是,数据一旦上传到云平台,其所有者就无法确保数据真正按计划删除。这显然增加了数据所有者对数据安全的担忧,因为这关系到用户的隐私。因此,必须有一种可靠的解决方案来证明数据已按用户要求删除,以防止数据泄漏或滥用。在现有的数据删除方案中,为了不对存储介质造成不可估量的破坏,大多数方案都是基于加密知识而不是擦除或覆盖技术设计的。然而,大多数基于密码的数据删除方案,特别是基于属性的加密,都涉及大量复杂的双线性映射操作,这对大多数设备来说都是昂贵的。针对这一问题,本文提出了一种高效、可验证的安全数据删除方案(EVSD)。首先,引入椭圆曲线加密法(ECC)实现数据的高效加密。然后,利用线性秘密共享方案(LSSS),实现支持逻辑操作的细粒度数据删除策略。最后,利用由定义的非法和合法属性生成的梅克尔哈希树(MHT)的根来有效验证数据的删除,同时生成删除证明。令人满意的是,安全性分析表明,与现有方案相比,EVSD 方案更具优势,在性能评估中也观察到了同样的特征。
{"title":"Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion","authors":"Zhenwu Xu ,&nbsp;Xingshu Chen ,&nbsp;Xiao Lan ,&nbsp;Rui Tang ,&nbsp;Shuyu Jiang ,&nbsp;Changxiang Shen","doi":"10.1016/j.cose.2024.103978","DOIUrl":"https://doi.org/10.1016/j.cose.2024.103978","url":null,"abstract":"<div><p>Cloud services have attracted numerous enterprises, organizations, and individual users due to their exceptional computing power and almost limitless storage capacity. A vast amount of business data and private data are continuously uploaded to the cloud platform, driven by a series of attractive services offered by the cloud. Unfortunately, once data is uploaded to the cloud, its owner has no way of ensuring that it is actually deleted as intended. This obviously increases the concerns of data owners about the security of their data, because it is related to the privacy of users. Therefore, there must be a reliable solution to prove that data is deleted as requested by users, to prevent data leakage or abuse. In existing data deletion schemes, most are designed based on cryptographic knowledge rather than erasure or overwrite techniques, in order not to cause incalculable damage to the storage medium. However, most cryptographic-based data deletion schemes, particularly attribute-based encryption, involve numerous complex bilinear mapping operations, which are expensive for most devices. To address this issue, the paper proposes an Efficient and Verifiable Scheme for Secure Data Deletion (EVSD). Firstly, Elliptic Curve Cryptography (ECC) is introduced to achieve efficient encryption of data. Then, leveraging Linear Secret Sharing Scheme (LSSS), fine-grained data deletion policies supporting logical operations are implemented. Finally, the deletion of the data is efficiently verified using the root of the Merkle Hash Tree (MHT) generated by the defined illegal and legal attributes, while the deletion proof is also generated. Satisfactorily, security analysis shows that the EVSD scheme is much more advantageous compared to existing schemes, and a trait likewise is also observed in the performance evaluation.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1