Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III

Saved in:
Bibliographic Details
Main Authors Sun, Xingming, Pan, Zhaoqing, Bertino, Elisa
Format eBook
LanguageEnglish
Published Cham Springer International Publishing AG 2018
Edition1
Subjects
Online AccessGet full text
ISBN3030000117
9783030000110

Cover

Table of Contents:
  • 2 Related Works -- 3 Methodology -- 3.1 System Structure -- 3.2 Model Components -- 3.3 Model Combination and Training -- 4 Evaluation -- 4.1 Data Set -- 4.2 Metrics -- 4.3 Experiments -- 5 Conclusion -- 5.1 Contributions -- 5.2 Future Work -- References -- Privacy-Preserving Credit Scoring on Cloud -- Abstract -- 1 Introduction -- 2 Problem Statement -- 2.1 System Model -- 2.2 Adversary Model -- 2.3 Design Goals -- 3 PPCS Scheme -- 3.1 Preliminaries and Notations -- 3.2 Scheme Description -- 3.3 Credit Scoring -- 4 Security and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Conclusions -- Acknowledgments -- References -- QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage -- 1 Introduction -- 2 Preliminaries -- 2.1 Erasure Codes in DSS -- 2.2 Adversary Model and Security Level -- 3 Code Construction -- 3.1 Construction of Generator Matrix -- 3.2 Security Analysis -- 4 Evaluation -- 5 Related Work -- 6 Conclusions -- References -- Research and Application of Traceability Model for Agricultural Products -- Abstract -- 1 Introduction -- 2 Hypothesis -- 3 Establishment -- 3.1 Information Flow Model -- 3.2 Information Sharing Model -- 3.3 The Traceability Function Model -- 4 Application and Evaluation -- 4.1 Application -- 4.2 Significance -- 4.3 Deficiency -- 5 Summary -- Acknowledgements -- References -- Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description -- Abstract -- 1 Introduction -- 2 Relevant Research Summary -- 3 Support Vector Data Description -- 4 Enterprise Financial Crisis Precaution Model -- 4.1 Selection of Enterprise Financial Crisis Precaution Index System -- 4.2 Sample Data Acquisition -- 4.3 Construction of Precaution Model Based on the Data Description on Support Vector -- 4.4 Experiments Results Test -- 5 Conclusion
  • Acknowledgment
  • Abstract -- 1 Introduction -- 2 Architecture and Design -- 2.1 Modeling and Simulation of the Balise Up-Link Model -- 2.1.1 Tuning and Impedance Matching of the Balise Antenna -- 2.1.2 S Parameter and VSWR of the Balise Antenna -- 2.1.3 Modeling and Simulation of the BTM Antenna -- 2.2 Validation of the Balise Up-Link Model -- 3 The Effect of EMP on the Balise Up-Link Model -- 3.1 The Time-Domain Characteristics of Typical Electromagnetic Pulses -- 3.2 The Effect of Different Types of Electromagnetic Pulse on Balise Up-Link -- 4 Conclusion -- References -- Network Attack Prediction Method Based on Threat Intelligence -- Abstract -- 1 Introduction -- 2 Related Work -- 3 APM-TI -- 3.1 Threat Intelligence Matching -- 3.2 Attack-Defense Game Modeling -- 4 Experimental Verification -- 4.1 Threat Intelligence Matching Algorithm -- 4.2 AD-GM Model -- 5 Conclusion and Future Work -- Acknowledgments -- References -- Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model -- Abstract -- 1 Introduction -- 2 Network Security Situation -- 2.1 Definitions -- 2.2 Attack-Defense Stochastic Game Model -- 3 Network Security Situation Assessment Based on ADSGM -- 3.1 Assessment Framework -- 3.2 Threat Propagation Analysis -- 3.3 Game Quantitative Analysis -- 4 Experimental Analysis -- 5 Conclusion -- Acknowledgment -- References -- Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies -- 4.1 Erasure Code -- 4.2 Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies -- 5 Conclusion -- Acknowledgment -- References -- Privacy-Preserved Prediction for Mobile Application Adoption -- Abstract -- 1 Introduction
  • 4 Summary -- References -- Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Overview -- 3.2 Learning Model -- 3.3 User Interface -- 4 Evaluation -- 4.1 Accuracy -- 4.2 Timeline -- 4.3 Overhead -- 5 Conclusion -- References -- Focused Crawler Framework Based on Open Search Engine -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Focused Crawler -- 2.2 Open Search Engine Technology -- 2.3 Topic Models -- 3 Focused Crawler System Framework Based on Open Search Engine -- 3.1 System Framework Design -- 3.2 Open Search Engine Interface Analysis -- 3.3 Build Topic Model and Iterative Search Process -- 4 Experiment -- 5 Conclusion -- References -- Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment -- 1 Introduction -- 2 Motivation -- 3 Preliminaries -- 3.1 Bilinear Pairing -- 3.2 Hardness Assumption -- 3.3 Locality-Sensitive Hashing -- 4 Privacy Information Sharing with Similarity Test in Cloud Environment -- 5 Index Generation and Similar Definition -- 6 Proposed Privacy Information Sharing with Similarity Test in Cloud Environment -- 7 Security Analysis -- 8 Conclusion -- References -- Image Encryption and Compression Based on a VAE Generative Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Scheme -- 3.1 Training VAE Model -- 3.2 Image Compression and Encryption -- 4 Experimental Results and Analysis -- 5 Conclusions -- Acknowledgment -- References -- Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Enhanced Chebyshev Chaotic Maps -- 2.2 Difficulty Assumptions -- 2.3 Notions -- 3 Cryptanalysis of Li et al.'s Protocol -- 4 Our Proposed Authentication Protocol -- 5 Security Analysis
  • 5.1 Security Analysis -- 5.2 Withstanding the Replay Attack -- 5.3 Anonymity -- 5.4 Withstanding the Stolen Verifier Attack -- 5.5 Withstanding the Privileged Insider Attack -- 5.6 Perfect Forward Secrecy -- 5.7 Security Features Comparisons -- 6 Efficiency Analysis -- 7 Conclusion -- Acknowledgments -- References -- Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration -- 1 Introduction -- 2 Behavioral Characteristics Description -- 2.1 Behavioral Characteristic Sets from Configuration File -- 2.2 Behavioral Characteristic Sets from Dex File -- 3 Approach -- 3.1 Classification Models -- 3.2 Embedded into Vector -- 4 Evaluation -- 4.1 Dataset -- 4.2 Behavioral Characteristic Set Comparison -- 4.3 Detection Results -- 5 Related Work -- 5.1 Extract Behavioral Characteristics from Android App -- 5.2 Detection of Android Malware -- 6 Conclusions -- References -- Medical Information Access Control Method Based on Weighted Information Entropy -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Access Control of Medical Privacy Protection -- 3.1 Basic Concepts -- 3.2 Access Control Model -- 3.3 Access Control Scheme -- 4 Security Analysis -- 4.1 Access Control Analysis -- 4.2 Comparative Analysis -- Acknowledgment -- References -- Modeling and Analysis of a Hybrid Authentication Protocol for VANET -- Abstract -- 1 Introduction -- 2 Preliminary -- 2.1 Threat Model -- 2.2 Dynamic Group Signature Model of BSZ -- 3 Hybrid Authentication Protocol -- 3.1 System Model -- 3.2 Pseudonym Exchange with Trusted Authority -- 3.3 System Initialization -- 3.4 Vehicle Registration -- 3.5 Vehicle Wake up -- 3.6 Message Signing -- 3.7 Authentication -- 3.8 Verification with Pseudonym and Group Signature -- 4 Security Analysis -- 5 Performance Analysis -- 6 Conclusion -- References -- Modeling and Data Analysis of the Balise System
  • Intro -- Preface -- Organization -- Contents -- Part III -- Cloud Security -- Digital Continuity Guarantee Based on Data Consistency in Cloud Storage -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Cloud Storage Expansion -- 2.2 Cold Data Archiving -- 2.3 Digital Continuity Content -- 3 Digital Continuity Based on Data Consistency -- 4 Digital Continuity Based on Functional Dependency Theory -- 4.1 Functional Dependency Theory -- 4.2 Digital Continuity Based on Functional Dependency Theory -- 5 Conclusion -- Acknowledgment -- References -- Dynamic Risk Access Control Model for Cloud Platform -- Abstract -- 1 Introduction -- 2 Risk Access Control Model for Cloud Platform (CPDAC) -- 2.1 Research Goals -- 2.2 Dynamic Risk Access Control Model -- 3 Event-Calculus-Based Rule Matching Module (ECRM) -- 3.1 Problem Analysis -- 3.2 Formal Definitions -- 3.3 Framework of ECRM and Execution Flow -- 4 PR-Based Risk Evaluation Module -- 4.1 Problem Analysis -- 4.2 Formal Definitions -- 4.3 Risk-Evaluation-Index Weight Distribution Mathematical Module -- 5 Experiment and Result -- 5.1 Experimental Environment and Data -- 5.2 ECRM Module Evaluation and Performance Analysis -- 5.3 PRRA Module Evaluation and Performance Analysis -- 5.4 CPDAC Module Evaluation and Performance Analysis -- 6 Conclusion -- References -- Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System -- 1 Introduction -- 2 Improved Multiparty QSS Scheme -- 3 Improved High-Dimensional Multiparty QSS Scheme -- 3.1 Preliminaries -- 3.2 The Scheme -- 4 Discussions and Conclusions -- References -- EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension -- 1 Introduction -- 2 Related Work -- 3 Extended kCRNN Algorithm (EkCRNN) -- 3.1 Three Target Points -- 3.2 More Target Points -- 3.3 Algorithm Implementation -- 3.4 Experimental Analysis