首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks 基于区块链的车辆网络匿名身份认证方案
Pub Date : 2020-11-01 DOI: 10.6633/IJNS.202011_22(6).12
Liang Wang, Dong Zheng, Rui-Fang Guo, Chencheng Hu, Jing Chunming
With the rapid development of mobile network technology, Vehicular ad-hoc Networks (VANETs), one of the most promising applications in the smart transportation systems, have drawn widespread attention. Unfortunately, authentication and privacy protection of users have seriously restricted the development of VANETs. The past works used to allow a centralized trusted authority to distribute identity information and maintain the operation of the whole system lacking of distributed and decentralized security. In this paper, we propose an authentication scheme based on consortium blockchain with anonymous identity in VANETs. First, when authenticating and providing services, our scheme allows the vehicles using Pseudo IDs obtained from the Road Side Unit (RSU) to protect the privacy of the vehicles preventing location tracking due to disclosure of information. Second, based on consortium blockchain technology, it provides a decentralized, secure and reliable database for storing certificates and the pointer to storage location, which is maintained by the multiple Trusted Authorities (TAs) and RSUs. Furthermore, in the revocation, the RSUs are able to determine promptly that the vehicle has been revoked by adding a revocation tag to the pseudo ID instead of searching the entire certificate revocation list (CRL). According to the security and performance analysis, our scheme owns higher security and efficiency.
随着移动网络技术的飞速发展,车载自组网(Vehicular ad-hoc Networks, vanet)作为智能交通系统中最有前途的应用之一,受到了广泛的关注。不幸的是,用户身份验证和隐私保护问题严重制约了VANETs的发展。过去的工作是允许一个集中的可信机构分发身份信息,维护整个系统的运行,缺乏分布式和去中心化的安全性。本文在VANETs中提出了一种基于匿名身份的联盟区块链认证方案。首先,在验证和提供服务时,我们的方案允许车辆使用从路旁单元(RSU)获得的伪id来保护车辆的隐私,防止因信息泄露而导致位置跟踪。其次,基于联盟区块链技术,它提供了一个分散、安全、可靠的数据库,用于存储证书和指向存储位置的指针,该数据库由多个可信机构(ta)和rsu维护。此外,在吊销中,rsu能够通过向伪ID添加吊销标记而不是搜索整个证书吊销列表(CRL)来迅速确定车辆已被吊销。根据安全性和性能分析,本方案具有较高的安全性和效率。
{"title":"A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks","authors":"Liang Wang, Dong Zheng, Rui-Fang Guo, Chencheng Hu, Jing Chunming","doi":"10.6633/IJNS.202011_22(6).12","DOIUrl":"https://doi.org/10.6633/IJNS.202011_22(6).12","url":null,"abstract":"With the rapid development of mobile network technology, Vehicular ad-hoc Networks (VANETs), one of the most promising applications in the smart transportation systems, have drawn widespread attention. Unfortunately, authentication and privacy protection of users have seriously restricted the development of VANETs. The past works used to allow a centralized trusted authority to distribute identity information and maintain the operation of the whole system lacking of distributed and decentralized security. In this paper, we propose an authentication scheme based on consortium blockchain with anonymous identity in VANETs. First, when authenticating and providing services, our scheme allows the vehicles using Pseudo IDs obtained from the Road Side Unit (RSU) to protect the privacy of the vehicles preventing location tracking due to disclosure of information. Second, based on consortium blockchain technology, it provides a decentralized, secure and reliable database for storing certificates and the pointer to storage location, which is maintained by the multiple Trusted Authorities (TAs) and RSUs. Furthermore, in the revocation, the RSUs are able to determine promptly that the vehicle has been revoked by adding a revocation tag to the pseudo ID instead of searching the entire certificate revocation list (CRL). According to the security and performance analysis, our scheme owns higher security and efficiency.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"12 1","pages":"981-990"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86231978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Protection of User Data by Differential Privacy Algorithms 用差分隐私算法保护用户数据
Pub Date : 2020-09-01 DOI: 10.6633/IJNS.202009_22(5).14
Jian Liu, Feilong Qin
With the emergence of more and more social software users, increasingly larger social networks have appeared. These social networks contain a large number of sensitive information of users, so privacy protection processing is needed before releasing social network information. This paper introduced the hierarchical random graph (HRG) based differential privacy algorithm and the single-source shortest path based differential privacy algorithm. Then, the performance of the two algorithms was tested by two artificial networks without weight, which was generated by LFR tool and two real networks with weight, which were crawled by crawler software. The results show that after processing the social network through the differential privacy algorithm, the average clustering coefficient decreases, and the expected distortion increases. The smaller the privacy budget, the higher the reduction and the more significant the increase. Under the same privacy budget, the average clustering coefficient and expected distortion of the single-source shortest path differential privacy algorithm are small. In terms of execution efficiency, the larger the size of the social network, the more time it takes, and the differential privacy algorithm based on the single-source shortest path spends less time in the same network.
随着越来越多的社交软件用户的出现,出现了越来越大的社交网络。这些社交网络包含大量用户的敏感信息,因此在发布社交网络信息之前需要进行隐私保护处理。介绍了基于层次随机图的差分隐私算法和基于单源最短路径的差分隐私算法。然后,利用LFR工具生成的两个无权值的人工网络和爬虫软件抓取的两个有权值的真实网络,对两种算法的性能进行了测试。结果表明,通过差分隐私算法对社交网络进行处理后,平均聚类系数减小,期望失真增大。隐私预算越小,减少的幅度越大,增加的幅度越显著。在相同的隐私预算下,单源最短路径差分隐私算法的平均聚类系数和期望失真较小。在执行效率上,社交网络规模越大耗时越长,而基于单源最短路径的差分隐私算法在同一网络中耗时更少。
{"title":"Protection of User Data by Differential Privacy Algorithms","authors":"Jian Liu, Feilong Qin","doi":"10.6633/IJNS.202009_22(5).14","DOIUrl":"https://doi.org/10.6633/IJNS.202009_22(5).14","url":null,"abstract":"With the emergence of more and more social software users, increasingly larger social networks have appeared. These social networks contain a large number of sensitive information of users, so privacy protection processing is needed before releasing social network information. This paper introduced the hierarchical random graph (HRG) based differential privacy algorithm and the single-source shortest path based differential privacy algorithm. Then, the performance of the two algorithms was tested by two artificial networks without weight, which was generated by LFR tool and two real networks with weight, which were crawled by crawler software. The results show that after processing the social network through the differential privacy algorithm, the average clustering coefficient decreases, and the expected distortion increases. The smaller the privacy budget, the higher the reduction and the more significant the increase. Under the same privacy budget, the average clustering coefficient and expected distortion of the single-source shortest path differential privacy algorithm are small. In terms of execution efficiency, the larger the size of the social network, the more time it takes, and the differential privacy algorithm based on the single-source shortest path spends less time in the same network.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":" 481","pages":"838-844"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72378526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Malware Detection and Classification Based on Artificial Intelligence 基于人工智能的恶意软件检测与分类研究
Pub Date : 2020-09-01 DOI: 10.6633/IJNS.202009_22(5).01
Li-Chin Huang, Chun-Hsien Chang, M. Hwang
Malware remains one of the major threats to network security. As the types of network devices increase, in addition to attacking computers, the amount of malware that affects mobile phones and the Internet of Things devices has also significantly increased. Malicious software can alter the regular operation of the victim's machine, damage user files, steal private information from the user,steal user permissions, and perform unauthorized activities on the device. For users, in addition to the inconvenience caused by using the device, it also poses a threat to property and information. Therefore, in the face of malware threats, if it can accurately and quickly detect its presence and deal with it, it can help reduce the impact of malware. To improve the accuracy and efficiency of malware detection, this article will use deep learning technology in the field of artificial intelligence to study and implement high-precision classification models to improve the effectiveness of malware detection. We will use convolutional neural networks and long and short-term memory as the primary training model. When using convolutional neural networks for training, we use malware visualization techniques. By converting malware features into images for input, and adjusting the input features and input methods, models with higher classification accuracy will be found; in long-term and short-term memory models, appropriate features and preprocessing methods are used to find Model with high classification accuracy. Finally, the accuracy of small sample training is optimized by generating features for network output samples. In the above training, all of us want to use malware as a sample that affects different devices. In this article, we propose three research topics: 1). When importing images, high-precision models are used to study malware. 2). When importing non-images, a high-precision model will be used to study the malware. 3). By using this model, the generated adversarial network is optimized for small sample malware detection.
恶意软件仍然是网络安全的主要威胁之一。随着网络设备类型的增加,除了攻击计算机之外,影响手机和物联网设备的恶意软件数量也显著增加。恶意软件可以改变受害者机器的正常操作,破坏用户文件,窃取用户的私人信息,窃取用户权限,并在设备上执行未经授权的活动。对于用户来说,除了使用设备带来的不便之外,还会对财产和信息造成威胁。因此,在面对恶意软件威胁时,如果能够准确、快速地检测到其存在并进行处理,有助于减少恶意软件的影响。为了提高恶意软件检测的准确性和效率,本文将利用人工智能领域的深度学习技术来研究和实现高精度的分类模型,以提高恶意软件检测的有效性。我们将使用卷积神经网络和长短期记忆作为主要的训练模型。当使用卷积神经网络进行训练时,我们使用恶意软件可视化技术。通过将恶意软件特征转换成图像进行输入,调整输入特征和输入方法,找到分类精度更高的模型;在长时记忆和短时记忆模型中,采用合适的特征和预处理方法寻找分类精度较高的模型。最后,通过对网络输出样本生成特征来优化小样本训练的准确性。在上述培训中,我们所有人都希望使用恶意软件作为影响不同设备的样本。在本文中,我们提出了三个研究课题:1)在导入图像时,使用高精度模型研究恶意软件。2).当导入非图像时,将使用高精度模型来研究恶意软件。3)利用该模型对生成的对抗网络进行小样本恶意软件检测优化。
{"title":"Research on Malware Detection and Classification Based on Artificial Intelligence","authors":"Li-Chin Huang, Chun-Hsien Chang, M. Hwang","doi":"10.6633/IJNS.202009_22(5).01","DOIUrl":"https://doi.org/10.6633/IJNS.202009_22(5).01","url":null,"abstract":"Malware remains one of the major threats to network security. As the types of network devices increase, in addition to attacking computers, the amount of malware that affects mobile phones and the Internet of Things devices has also significantly increased. Malicious software can alter the regular operation of the victim's machine, damage user files, steal private information from the user,steal user permissions, and perform unauthorized activities on the device. For users, in addition to the inconvenience caused by using the device, it also poses a threat to property and information. Therefore, in the face of malware threats, if it can accurately and quickly detect its presence and deal with it, it can help reduce the impact of malware. To improve the accuracy and efficiency of malware detection, this article will use deep learning technology in the field of artificial intelligence to study and implement high-precision classification models to improve the effectiveness of malware detection. We will use convolutional neural networks and long and short-term memory as the primary training model. When using convolutional neural networks for training, we use malware visualization techniques. By converting malware features into images for input, and adjusting the input features and input methods, models with higher classification accuracy will be found; in long-term and short-term memory models, appropriate features and preprocessing methods are used to find Model with high classification accuracy. Finally, the accuracy of small sample training is optimized by generating features for network output samples. In the above training, all of us want to use malware as a sample that affects different devices. In this article, we propose three research topics: 1). When importing images, high-precision models are used to study malware. 2). When importing non-images, a high-precision model will be used to study the malware. 3). By using this model, the generated adversarial network is optimized for small sample malware detection.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"51 1","pages":"717-727"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90831448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System 基于可验证属性的电子病历关键字搜索加密及属性撤销
Pub Date : 2020-09-01 DOI: 10.6633/IJNS.202009_22(5).15
Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang
Considering the security requirements of electronic health record (EHR) system, we propose a ciphertext-policy attribute-based encryption scheme, which can support data retrieval, result verification and attribute revocation. In the proposed scheme, we make use of the BLS signature technique to achieve result verification for attribute-based keyword search encryption. In addition, key encrypting key (KEK) tree and re-encryption are utilized to achieve efficient attribute revocation. By giving thorough security analysis, the proposed scheme is proven to achieve: 1) Indistinguishability against selective ciphertext-policy and chosen plaintext attack under the decisional q-parallel bilinear Diffie-Hellman exponent hardness assumption; 2) Indistinguishability against chosen-keyword attack under the bilinear Diffie-Hellman assumption in the random oracle model. Moreover, the performance analysis results demonstrate that the proposed scheme is efficient and practical in electronic health record system.
针对电子健康记录(EHR)系统的安全需求,提出了一种基于密文策略属性的加密方案,该方案支持数据检索、结果验证和属性撤销。在提出的方案中,我们利用BLS签名技术来实现基于属性的关键字搜索加密的结果验证。此外,利用密钥加密密钥(KEK)树和重加密实现了有效的属性撤销。通过深入的安全性分析,证明了该方案在判定q-parallel双线性Diffie-Hellman指数硬度假设下对选择性密文策略和选择明文攻击具有不可分辨性;2)随机oracle模型中双线性Diffie-Hellman假设下对选择关键字攻击的不可分辨性。性能分析结果表明,该方案在电子病历系统中是有效和实用的。
{"title":"Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System","authors":"Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang","doi":"10.6633/IJNS.202009_22(5).15","DOIUrl":"https://doi.org/10.6633/IJNS.202009_22(5).15","url":null,"abstract":"Considering the security requirements of electronic health record (EHR) system, we propose a ciphertext-policy attribute-based encryption scheme, which can support data retrieval, result verification and attribute revocation. In the proposed scheme, we make use of the BLS signature technique to achieve result verification for attribute-based keyword search encryption. In addition, key encrypting key (KEK) tree and re-encryption are utilized to achieve efficient attribute revocation. By giving thorough security analysis, the proposed scheme is proven to achieve: 1) Indistinguishability against selective ciphertext-policy and chosen plaintext attack under the decisional q-parallel bilinear Diffie-Hellman exponent hardness assumption; 2) Indistinguishability against chosen-keyword attack under the bilinear Diffie-Hellman assumption in the random oracle model. Moreover, the performance analysis results demonstrate that the proposed scheme is efficient and practical in electronic health record system.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"15 1","pages":"845-856"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87721691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags 多云计算自动化与监控管理的有效方法:解决多云安全问题的灵丹妙药
Pub Date : 2020-07-31 DOI: 10.5121/ijnsa.2020.12403
Uchechukwu P. Emejeamara, Udochukwu J. Nwoduh, Andrew Madu
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
多云是云计算的高级版本,它允许用户远程利用来自多个云服务提供商(csp)的不同云系统。尽管它是一种非常高效的计算设施,但威胁检测、数据保护和供应商锁定是这种基础设施的主要安全缺陷。这些因素都是助长虚拟世界严重网络犯罪的催化剂。本文概述了多云环境中的隐私和安全问题。本研究的目的是分析一些逻辑自动化和监控条款,如监控网络物理系统(CPS)、家庭自动化、大数据基础设施(BDI)自动化、灾难恢复(DR)和秘密保护。本研究调查结果表明,通过系统地采用这些科学的解决方案,可以避免多云接口的安全障碍。
{"title":"Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea for Multi-cloud Security Snags","authors":"Uchechukwu P. Emejeamara, Udochukwu J. Nwoduh, Andrew Madu","doi":"10.5121/ijnsa.2020.12403","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12403","url":null,"abstract":"Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"11 1","pages":"39-44"},"PeriodicalIF":0.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85241522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems 一种提高入侵防御系统分类能力的降维模型
Pub Date : 2020-07-31 DOI: 10.5121/ijnsa.2020.12402
Hajar Elkassabi, M. Ashour, F. Zaki
Over the past few years, intrusion protection systems have drawn a mature research area in the field of computer networks. The problem of excessive features has a significant impact on intrusion detection performance. The use of machine learning algorithms in many previous researches has been used to identify network traffic, harmful or normal. Therefore, to obtain the accuracy, we must reduce the dimensionality of the data used. A new model design based on a combination of feature selection and machine learning algorithms is proposed in this paper. This model depends on selected genes from every feature to increase the accuracy of intrusion detection systems. We selected from features content only ones which impact in attack detection. The performance has been evaluated based on a comparison of several known algorithms. The NSL-KDD dataset is used for examining classification. The proposed model outperformed the other learning approaches with accuracy 98.8 %.
近年来,入侵防御系统已成为计算机网络领域一个成熟的研究领域。特征过多的问题严重影响了入侵检测的性能。在之前的许多研究中,机器学习算法被用来识别网络流量,无论是有害的还是正常的。因此,为了获得精度,我们必须降低所使用数据的维数。本文提出了一种基于特征选择和机器学习相结合的模型设计方法。该模型依赖于从每个特征中选择基因来提高入侵检测系统的准确性。我们只从特征内容中选择对攻击检测有影响的内容。基于几种已知算法的比较,对其性能进行了评估。NSL-KDD数据集用于检查分类。该模型的准确率为98.8%,优于其他学习方法。
{"title":"A Proposed Model for Dimensionality Reduction to Improve the Classification Capability of Intrusion Protection Systems","authors":"Hajar Elkassabi, M. Ashour, F. Zaki","doi":"10.5121/ijnsa.2020.12402","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12402","url":null,"abstract":"Over the past few years, intrusion protection systems have drawn a mature research area in the field of computer networks. The problem of excessive features has a significant impact on intrusion detection performance. The use of machine learning algorithms in many previous researches has been used to identify network traffic, harmful or normal. Therefore, to obtain the accuracy, we must reduce the dimensionality of the data used. A new model design based on a combination of feature selection and machine learning algorithms is proposed in this paper. This model depends on selected genes from every feature to increase the accuracy of intrusion detection systems. We selected from features content only ones which impact in attack detection. The performance has been evaluated based on a comparison of several known algorithms. The NSL-KDD dataset is used for examining classification. The proposed model outperformed the other learning approaches with accuracy 98.8 %.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84001651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security 增强安全性的可撤销无证书聚合签名方案
Pub Date : 2020-07-01 DOI: 10.6633/IJNS.202007_22(4).13
Fuxiao Zhou, Yanping Li, Changlu Lin
In certificateless public key cryptosystem, a tough problem is how to revoke a user when the user's private key is compromised or expired. So the revocable certificateless schemes come into being. Certificateless aggregate signature (CLAS) is an efficient way to verify a large amount of signatures from different users simultaneously. However, none of CLAS schemes considers the user revocation currently. In this paper, we firstly demonstrate that an efficient certificateless aggregate signature (abbreviated to ECLAS) scheme proposed by Kang et al. is vulnerable to forged signature attack from the type II adversary by a concrete example, although they claimed that their scheme is existentially unforgeable against the adaptively chosen-message attacks. Furthermore, based on the ECLAS scheme and the revocable idea, we proposed a revocable certificateless aggregate signature scheme, which was proved to be existentially unforgeable against adaptive chosen-messages attacks under the hardness assumption of computational Diffie-Hellman problem. As far as we know, this is the first revocable CLAS scheme. Finally, numerical analyses and performance comparisons show our scheme saves computational cost, communication bandwidth and storage space than some related schemes.
在无证书公钥密码系统中,如何在用户私钥泄露或过期时撤销用户是一个棘手的问题。因此,可撤销的无证书方案应运而生。无证书聚合签名(CLAS)是一种同时验证来自不同用户的大量签名的有效方法。然而,目前没有CLAS方案考虑用户撤销。在本文中,我们首先通过一个具体的例子证明了Kang等人提出的一种有效的无证书聚合签名(简称ECLAS)方案容易受到II类攻击者的伪造签名攻击,尽管他们声称他们的方案对于自适应选择消息攻击是存在不可伪造的。在ECLAS方案的基础上,结合可撤销思想,提出了一种可撤销的无证书聚合签名方案,并在计算Diffie-Hellman问题的硬度假设下证明了该方案在自适应选择消息攻击下的存在不可伪造性。据我们所知,这是第一个可撤销的CLAS方案。最后,通过数值分析和性能比较表明,该方案比其他方案节省了计算成本、通信带宽和存储空间。
{"title":"A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security","authors":"Fuxiao Zhou, Yanping Li, Changlu Lin","doi":"10.6633/IJNS.202007_22(4).13","DOIUrl":"https://doi.org/10.6633/IJNS.202007_22(4).13","url":null,"abstract":"In certificateless public key cryptosystem, a tough problem is how to revoke a user when the user's private key is compromised or expired. So the revocable certificateless schemes come into being. Certificateless aggregate signature (CLAS) is an efficient way to verify a large amount of signatures from different users simultaneously. However, none of CLAS schemes considers the user revocation currently. In this paper, we firstly demonstrate that an efficient certificateless aggregate signature (abbreviated to ECLAS) scheme proposed by Kang et al. is vulnerable to forged signature attack from the type II adversary by a concrete example, although they claimed that their scheme is existentially unforgeable against the adaptively chosen-message attacks. Furthermore, based on the ECLAS scheme and the revocable idea, we proposed a revocable certificateless aggregate signature scheme, which was proved to be existentially unforgeable against adaptive chosen-messages attacks under the hardness assumption of computational Diffie-Hellman problem. As far as we know, this is the first revocable CLAS scheme. Finally, numerical analyses and performance comparisons show our scheme saves computational cost, communication bandwidth and storage space than some related schemes.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"43 1","pages":"645-654"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80737731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sharing a Secret Image in the Cloud Using Two Shadows 使用两个阴影在云中共享一个秘密图像
Pub Date : 2020-07-01 DOI: 10.6633/IJNS.202007_22(4).01
Yu Chen, Jiang-Yi Lin, Chinchen Chang, Yu-Chen Hu
In this paper, we present a novel (2, 2) reversible secret image sharing scheme. Our scheme permits secret messages to be shared with two participants by splitting the marked encrypted image into two shadows. The secret messages can be reconstructed if two participants collaborate with each other. The proposed scheme chooses suitable binary blocks of a cover image in which to embed the secret message and divides those blocks into two shadow blocks by executing a logical operation with all of the other binary blocks, thereby producing two shadows. In the data extraction procedure, the secret messages and the cover image can be reconstructed by the logical operation of the corresponding binary blocks of the two shadows. A practical application is demonstrated by modeling our scheme as a reversible watermarking scheme in the Cloud. The experimental results indicated that the proposed method is reversible and that it can restore the image and watermark properly.
本文提出了一种新的(2,2)可逆秘密图像共享方案。我们的方案通过将标记的加密图像分割成两个阴影来允许两个参与者共享秘密消息。如果两个参与者相互协作,则可以重建秘密消息。该方案从封面图像中选择合适的二进制块来嵌入秘密信息,并对所有其他二进制块进行逻辑运算,将这些块划分为两个阴影块,从而产生两个阴影。在数据提取过程中,通过对两个阴影对应的二进制块进行逻辑运算,可以重构出秘密信息和封面图像。通过将该方案建模为云中的可逆水印方案,验证了该方案的实际应用。实验结果表明,该方法具有可逆性,能较好地恢复图像和水印。
{"title":"Sharing a Secret Image in the Cloud Using Two Shadows","authors":"Yu Chen, Jiang-Yi Lin, Chinchen Chang, Yu-Chen Hu","doi":"10.6633/IJNS.202007_22(4).01","DOIUrl":"https://doi.org/10.6633/IJNS.202007_22(4).01","url":null,"abstract":"In this paper, we present a novel (2, 2) reversible secret image sharing scheme. Our scheme permits secret messages to be shared with two participants by splitting the marked encrypted image into two shadows. The secret messages can be reconstructed if two participants collaborate with each other. The proposed scheme chooses suitable binary blocks of a cover image in which to embed the secret message and divides those blocks into two shadow blocks by executing a logical operation with all of the other binary blocks, thereby producing two shadows. In the data extraction procedure, the secret messages and the cover image can be reconstructed by the logical operation of the corresponding binary blocks of the two shadows. A practical application is demonstrated by modeling our scheme as a reversible watermarking scheme in the Cloud. The experimental results indicated that the proposed method is reversible and that it can restore the image and watermark properly.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"45 1","pages":"551-560"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75156637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms 基于不同算法的云计算安全混合框架
Pub Date : 2020-07-01 DOI: 10.6633/IJNS.202007_22(4).12
J. Ferdous, Md. Fuad Newaz Khan, K. Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, Pabel Miah
Cloud computing is the concept used to decode Daily Computing Issues. It is essentially a virtual pool of resources and also provides these tools to customers through the Internet. It is the net-based advancement and utilized in computer technology. The widespread problem connected with cloud computing is information privacy, protection, anonymity, and dependability, etc. However, the main issue involving them is safety and how the cloud supplier guarantees it. Securing the cloud means to secure the treatments (calculations) and storage (databases hosted by the Cloud provider). The paper reviews concurrent articles on security in cloud computing. By conducting research, we have managed to identify and analyze different security issues associated with the cloud as well as various cryptographic algorithms adaptable to better security for the cloud, and based on those algorithms, we have proposed a hybrid framework for security in cloud computing.
云计算是用于解码日常计算问题的概念。它本质上是一个虚拟的资源池,并通过Internet向客户提供这些工具。它是计算机技术中基于网络的进步和利用。与云计算相关的广泛问题是信息隐私、保护、匿名性和可靠性等。然而,涉及它们的主要问题是安全性以及云供应商如何保证安全性。保护云意味着保护处理(计算)和存储(由云提供商托管的数据库)。本文综述了有关云计算安全的相关文章。通过研究,我们已经成功地识别和分析了与云相关的不同安全问题,以及适应于更好的云安全性的各种加密算法,并基于这些算法,我们提出了云计算安全性的混合框架。
{"title":"A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms","authors":"J. Ferdous, Md. Fuad Newaz Khan, K. Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, Pabel Miah","doi":"10.6633/IJNS.202007_22(4).12","DOIUrl":"https://doi.org/10.6633/IJNS.202007_22(4).12","url":null,"abstract":"Cloud computing is the concept used to decode Daily Computing Issues. It is essentially a virtual pool of resources and also provides these tools to customers through the Internet. It is the net-based advancement and utilized in computer technology. The widespread problem connected with cloud computing is information privacy, protection, anonymity, and dependability, etc. However, the main issue involving them is safety and how the cloud supplier guarantees it. Securing the cloud means to secure the treatments (calculations) and storage (databases hosted by the Cloud provider). The paper reviews concurrent articles on security in cloud computing. By conducting research, we have managed to identify and analyze different security issues associated with the cloud as well as various cryptographic algorithms adaptable to better security for the cloud, and based on those algorithms, we have proposed a hybrid framework for security in cloud computing.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"22 1","pages":"638-644"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75369905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How data can be the lingua franca for security and IT 数据如何成为安全和IT的通用语言
Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30065-9
Leila Powell
{"title":"How data can be the lingua franca for security and IT","authors":"Leila Powell","doi":"10.1016/s1353-4858(20)30065-9","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30065-9","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"55 1","pages":"6-7"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79221091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1