Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III
Saved in:
| Main Authors | , , |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Cham
Springer International Publishing AG
2018
|
| Edition | 1 |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3030000117 9783030000110 |
Cover
Table of Contents:
- 2 Related Works -- 3 Methodology -- 3.1 System Structure -- 3.2 Model Components -- 3.3 Model Combination and Training -- 4 Evaluation -- 4.1 Data Set -- 4.2 Metrics -- 4.3 Experiments -- 5 Conclusion -- 5.1 Contributions -- 5.2 Future Work -- References -- Privacy-Preserving Credit Scoring on Cloud -- Abstract -- 1 Introduction -- 2 Problem Statement -- 2.1 System Model -- 2.2 Adversary Model -- 2.3 Design Goals -- 3 PPCS Scheme -- 3.1 Preliminaries and Notations -- 3.2 Scheme Description -- 3.3 Credit Scoring -- 4 Security and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Conclusions -- Acknowledgments -- References -- QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage -- 1 Introduction -- 2 Preliminaries -- 2.1 Erasure Codes in DSS -- 2.2 Adversary Model and Security Level -- 3 Code Construction -- 3.1 Construction of Generator Matrix -- 3.2 Security Analysis -- 4 Evaluation -- 5 Related Work -- 6 Conclusions -- References -- Research and Application of Traceability Model for Agricultural Products -- Abstract -- 1 Introduction -- 2 Hypothesis -- 3 Establishment -- 3.1 Information Flow Model -- 3.2 Information Sharing Model -- 3.3 The Traceability Function Model -- 4 Application and Evaluation -- 4.1 Application -- 4.2 Significance -- 4.3 Deficiency -- 5 Summary -- Acknowledgements -- References -- Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description -- Abstract -- 1 Introduction -- 2 Relevant Research Summary -- 3 Support Vector Data Description -- 4 Enterprise Financial Crisis Precaution Model -- 4.1 Selection of Enterprise Financial Crisis Precaution Index System -- 4.2 Sample Data Acquisition -- 4.3 Construction of Precaution Model Based on the Data Description on Support Vector -- 4.4 Experiments Results Test -- 5 Conclusion
- Acknowledgment
- Abstract -- 1 Introduction -- 2 Architecture and Design -- 2.1 Modeling and Simulation of the Balise Up-Link Model -- 2.1.1 Tuning and Impedance Matching of the Balise Antenna -- 2.1.2 S Parameter and VSWR of the Balise Antenna -- 2.1.3 Modeling and Simulation of the BTM Antenna -- 2.2 Validation of the Balise Up-Link Model -- 3 The Effect of EMP on the Balise Up-Link Model -- 3.1 The Time-Domain Characteristics of Typical Electromagnetic Pulses -- 3.2 The Effect of Different Types of Electromagnetic Pulse on Balise Up-Link -- 4 Conclusion -- References -- Network Attack Prediction Method Based on Threat Intelligence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 APM-TI -- 3.1 Threat Intelligence Matching -- 3.2 Attack-Defense Game Modeling -- 4 Experimental Verification -- 4.1 Threat Intelligence Matching Algorithm -- 4.2 AD-GM Model -- 5 Conclusion and Future Work -- Acknowledgments -- References -- Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model -- Abstract -- 1 Introduction -- 2 Network Security Situation -- 2.1 Definitions -- 2.2 Attack-Defense Stochastic Game Model -- 3 Network Security Situation Assessment Based on ADSGM -- 3.1 Assessment Framework -- 3.2 Threat Propagation Analysis -- 3.3 Game Quantitative Analysis -- 4 Experimental Analysis -- 5 Conclusion -- Acknowledgment -- References -- Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies -- 4.1 Erasure Code -- 4.2 Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies -- 5 Conclusion -- Acknowledgment -- References -- Privacy-Preserved Prediction for Mobile Application Adoption -- Abstract -- 1 Introduction
- 4 Summary -- References -- Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Overview -- 3.2 Learning Model -- 3.3 User Interface -- 4 Evaluation -- 4.1 Accuracy -- 4.2 Timeline -- 4.3 Overhead -- 5 Conclusion -- References -- Focused Crawler Framework Based on Open Search Engine -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Focused Crawler -- 2.2 Open Search Engine Technology -- 2.3 Topic Models -- 3 Focused Crawler System Framework Based on Open Search Engine -- 3.1 System Framework Design -- 3.2 Open Search Engine Interface Analysis -- 3.3 Build Topic Model and Iterative Search Process -- 4 Experiment -- 5 Conclusion -- References -- Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment -- 1 Introduction -- 2 Motivation -- 3 Preliminaries -- 3.1 Bilinear Pairing -- 3.2 Hardness Assumption -- 3.3 Locality-Sensitive Hashing -- 4 Privacy Information Sharing with Similarity Test in Cloud Environment -- 5 Index Generation and Similar Definition -- 6 Proposed Privacy Information Sharing with Similarity Test in Cloud Environment -- 7 Security Analysis -- 8 Conclusion -- References -- Image Encryption and Compression Based on a VAE Generative Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Scheme -- 3.1 Training VAE Model -- 3.2 Image Compression and Encryption -- 4 Experimental Results and Analysis -- 5 Conclusions -- Acknowledgment -- References -- Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Enhanced Chebyshev Chaotic Maps -- 2.2 Difficulty Assumptions -- 2.3 Notions -- 3 Cryptanalysis of Li et al.'s Protocol -- 4 Our Proposed Authentication Protocol -- 5 Security Analysis
- 5.1 Security Analysis -- 5.2 Withstanding the Replay Attack -- 5.3 Anonymity -- 5.4 Withstanding the Stolen Verifier Attack -- 5.5 Withstanding the Privileged Insider Attack -- 5.6 Perfect Forward Secrecy -- 5.7 Security Features Comparisons -- 6 Efficiency Analysis -- 7 Conclusion -- Acknowledgments -- References -- Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration -- 1 Introduction -- 2 Behavioral Characteristics Description -- 2.1 Behavioral Characteristic Sets from Configuration File -- 2.2 Behavioral Characteristic Sets from Dex File -- 3 Approach -- 3.1 Classification Models -- 3.2 Embedded into Vector -- 4 Evaluation -- 4.1 Dataset -- 4.2 Behavioral Characteristic Set Comparison -- 4.3 Detection Results -- 5 Related Work -- 5.1 Extract Behavioral Characteristics from Android App -- 5.2 Detection of Android Malware -- 6 Conclusions -- References -- Medical Information Access Control Method Based on Weighted Information Entropy -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Access Control of Medical Privacy Protection -- 3.1 Basic Concepts -- 3.2 Access Control Model -- 3.3 Access Control Scheme -- 4 Security Analysis -- 4.1 Access Control Analysis -- 4.2 Comparative Analysis -- Acknowledgment -- References -- Modeling and Analysis of a Hybrid Authentication Protocol for VANET -- Abstract -- 1 Introduction -- 2 Preliminary -- 2.1 Threat Model -- 2.2 Dynamic Group Signature Model of BSZ -- 3 Hybrid Authentication Protocol -- 3.1 System Model -- 3.2 Pseudonym Exchange with Trusted Authority -- 3.3 System Initialization -- 3.4 Vehicle Registration -- 3.5 Vehicle Wake up -- 3.6 Message Signing -- 3.7 Authentication -- 3.8 Verification with Pseudonym and Group Signature -- 4 Security Analysis -- 5 Performance Analysis -- 6 Conclusion -- References -- Modeling and Data Analysis of the Balise System
- Intro -- Preface -- Organization -- Contents -- Part III -- Cloud Security -- Digital Continuity Guarantee Based on Data Consistency in Cloud Storage -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Cloud Storage Expansion -- 2.2 Cold Data Archiving -- 2.3 Digital Continuity Content -- 3 Digital Continuity Based on Data Consistency -- 4 Digital Continuity Based on Functional Dependency Theory -- 4.1 Functional Dependency Theory -- 4.2 Digital Continuity Based on Functional Dependency Theory -- 5 Conclusion -- Acknowledgment -- References -- Dynamic Risk Access Control Model for Cloud Platform -- Abstract -- 1 Introduction -- 2 Risk Access Control Model for Cloud Platform (CPDAC) -- 2.1 Research Goals -- 2.2 Dynamic Risk Access Control Model -- 3 Event-Calculus-Based Rule Matching Module (ECRM) -- 3.1 Problem Analysis -- 3.2 Formal Definitions -- 3.3 Framework of ECRM and Execution Flow -- 4 PR-Based Risk Evaluation Module -- 4.1 Problem Analysis -- 4.2 Formal Definitions -- 4.3 Risk-Evaluation-Index Weight Distribution Mathematical Module -- 5 Experiment and Result -- 5.1 Experimental Environment and Data -- 5.2 ECRM Module Evaluation and Performance Analysis -- 5.3 PRRA Module Evaluation and Performance Analysis -- 5.4 CPDAC Module Evaluation and Performance Analysis -- 6 Conclusion -- References -- Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System -- 1 Introduction -- 2 Improved Multiparty QSS Scheme -- 3 Improved High-Dimensional Multiparty QSS Scheme -- 3.1 Preliminaries -- 3.2 The Scheme -- 4 Discussions and Conclusions -- References -- EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension -- 1 Introduction -- 2 Related Work -- 3 Extended kCRNN Algorithm (EkCRNN) -- 3.1 Three Target Points -- 3.2 More Target Points -- 3.3 Algorithm Implementation -- 3.4 Experimental Analysis