Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and...

Full description

Saved in:
Bibliographic Details
Main Authors Huang, Zhiqiu, Sun, Xingming, Luo, Junzhou, Wang, Jian
Format eBook
LanguageEnglish
Published Netherlands Springer Nature 2016
Springer International Publishing AG
Springer
Edition1
SeriesLNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI
Subjects
Online AccessGet full text
ISBN9783319270517
3319270516
9783319270500
3319270508

Cover

Abstract This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.
AbstractList This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.
Author Huang, Zhiqiu
Sun, Xingming
Wang, Jian
Luo, Junzhou
Author_xml – sequence: 1
  fullname: Huang, Zhiqiu
– sequence: 2
  fullname: Sun, Xingming
– sequence: 3
  fullname: Luo, Junzhou
– sequence: 4
  fullname: Wang, Jian
BookMark eNpd0MtKxDAUBuCIF3TGvoGL4kZcFHJPutQyXmDAheI2pOnpTJ1OUptW8e0t1o2uDof_48B_FujIBw8HKMmVZozkVGFB1OG__QQtCJaSaK4kPUVJjG8YYyKJlEKeoYuiDWOVFmHfjUPjN6n1VfoMbuyb4escHde2jZD8ziV6vVu9FA_Z-un-sbhZZ5YywWTGBeQ1wZiBU-B4rZXVUnJWC20lrjkBCrmYclZWrCw1rXI-QQklLRl1wJboej5s4w4-4za0QzQfLZQh7KL502eyV7Pt-vA-QhzMD3Pgh962ZnVbCKGV0GKSl7N0Ntq28Y3ZBx82ve220QhOpgfk7Bv6lln0
ContentType eBook
DBID I4C
DEWEY 004
DatabaseName Casalini Torrossa eBooks Institutional Catalogue
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783319270517
3319270516
Edition 1
1st ed. 2015
Editor Huang, Zhiqiu
Sun, Xingming
Wang, Jian
Luo, Junzhou
Editor_xml – sequence: 1
  fullname: Huang, Zhiqiu
– sequence: 2
  fullname: Luo, Junzhou
– sequence: 3
  fullname: Sun, Xingming
– sequence: 4
  fullname: Wang, Jian
ExternalDocumentID 9783319270517
EBC5587585
5416569
GroupedDBID 0D6
0DA
38.
AABBV
AAGZE
AAZAK
AAZUS
ABBVZ
ABFTD
ABMNI
ACKNT
AEDXK
AEKFX
AETDV
AEZAY
ALMA_UNASSIGNED_HOLDINGS
APFYR
AZZ
BBABE
CZZ
I4C
IEZ
IY-
LDH
NUC
SAO
SBO
SFQCF
TMQGW
TPJZQ
TSXQS
TWXRB
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
AEJLV
Z5O
ID FETCH-LOGICAL-a23536-45e9f1003ec7ec4f87a86643f58a60f41e2e950033bd3bb82d947ec6eb2b32ce3
ISBN 9783319270517
3319270516
9783319270500
3319270508
IngestDate Fri Nov 08 04:08:10 EST 2024
Fri May 30 22:53:42 EDT 2025
Tue Nov 14 22:51:57 EST 2023
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident Q
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a23536-45e9f1003ec7ec4f87a86643f58a60f41e2e950033bd3bb82d947ec6eb2b32ce3
OCLC 1066184762
PQID EBC5587585
PageCount 567
ParticipantIDs askewsholts_vlebooks_9783319270517
proquest_ebookcentral_EBC5587585
casalini_monographs_5416569
PublicationCentury 2000
PublicationDate 2016
2016-01-04
PublicationDateYYYYMMDD 2016-01-01
2016-01-04
PublicationDate_xml – year: 2016
  text: 2016
PublicationDecade 2010
PublicationPlace Netherlands
PublicationPlace_xml – name: Netherlands
– name: Cham
PublicationSeriesTitle LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI
PublicationYear 2016
Publisher Springer Nature
Springer International Publishing AG
Springer
Publisher_xml – name: Springer Nature
– name: Springer International Publishing AG
– name: Springer
SSID ssj0001616656
Score 1.9653469
Snippet This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in...
SourceID askewsholts
proquest
casalini
SourceType Aggregation Database
Publisher
SubjectTerms Cloud computing
Computer networks
Data processing Computer science
Subtitle First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
TableOfContents 3.2 Access Control Structure -- 3.3 Formation of Access Control Policy Matrix M -- 3.4 The Construction -- 4 Security Analysis -- 4.1 Security Model -- 5 Performance Evaluation -- 6 Conclusion -- Acknowledgements -- References -- Privacy-Preserving Multidimensional Range Query on Real-Time Data -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Solutions for Multidimensional Range Query -- 2.2 Key-Insulated Technology -- 3 Privacy-Preserving Multidimensional Range Query -- 3.1 Our System Model -- 3.2 System Setup -- 3.3 Data Processing in Each Epoch -- 3.4 Query Processing -- 3.4.1 Decryption Key Update -- 3.4.2 Query and Verification -- 4 Security Analysis -- 4.1 Analysis on Integrity Verification -- 4.2 Analysis on Impact of Compromised DCs -- 4.3 Attacks on the (M, N)-Key-Insulated Method -- 5 Experiment -- 6 Conclusion -- Acknowledgements -- References -- ARM-Based Privacy Preserving for Medical Data Publishing -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Arm-Based System Architecture of Privacy-Preserving for Medical Data Publishing -- 4 Processing of the Archetecture -- 4.1 Applying Framework on Medical Data -- 4.2 Sanitization Algorithm -- 5 Performance Evaluation -- 5.1 Time Requirement -- 5.2 Lost Rules -- 5.3 New Rules -- 6 Conclusion -- References -- Attribute-Based Encryption Without Key Escrow -- Abstract -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contributions -- 1.3 Our Main Ideas -- 1.4 Organization -- 2 Background -- 2.1 Access Structure -- 2.2 Bilinear Map -- 2.3 Assumption -- 3 CP-ABE Without Key Escrow -- 3.1 Definition -- 3.2 Selective Security Model for WoKE-CP-ABE -- 3.3 Key Escrow Model for WoKE-CP-ABE -- 4 Our Construction -- 5 Analysis of Our Proposed Scheme -- 5.1 Selective Security Proof -- 5.2 Security Analysis for Problem of Key Escrow -- 5.3 Comparing with Multi-authority Attribute-Based Encryption
3.3 Queue Technique and Policy
2.3 Trust Evaluation at Inter-cluster Level -- 3 Model Analysis and Performance Comparison -- 3.1 Security Analysis -- 3.2 The Analysis and Comparison of Communication Overheads -- 3.3 The Analysis and Comparison of Storage Costs -- 4 Simulation Experiments and Analysis -- 5 Conclusions -- Acknowledgement -- References -- The Optimization Model of Trust for White-Washing -- Abstract -- 1 Introduction and Related Work -- 2 Trustworthy Recommendation Mechanism -- 2.1 Brief Description -- 2.2 Nodes Grouping -- 2.3 TOPSIS-Based Nodes Guarantee -- 2.4 Trust Attenuation -- 2.5 Trust Updating -- 3 Experiments and Analysis -- 4 Conclusion -- Acknowledgement -- References -- Malware Clustering Based on SNN Density Using System Calls -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Feature Extract -- 3.2 Calculate Similarity -- 3.3 Clustering Algorithm Based on SNN Density -- 4 Experiments and Results -- 4.1 Generate Feature Vectors -- 4.2 SNN -- 4.3 Clustering Results -- 5 Evaluation and Discuss -- 6 Conclusion -- References -- Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model Checking -- Abstract -- 1 Introduction -- 2 Dynamic System and Assumptions -- 2.1 Processes in a Dynamic System -- 2.2 Communication in the Dynamic System -- 3 The Eventual Leader Protocol and PRISM Model Design -- 3.1 Algorithm Introduction -- 3.2 PRISM Model -- 4 Model Design and Experiments -- 4.1 Scalability of the System -- 4.2 Unreliable Channels -- 5 Related Work -- 6 Conclusions and Future Work -- Acknowledgements -- References -- A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing Environment -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Propose QoS Controller Architecture -- 3.1 System Modules -- 3.2 Route Optimization
6 Extensions -- 6.1 Universality -- 6.2 A More Practical ABE Scheme with Outsourcing Decryption -- 7 Conclusion -- Acknowledgments -- References -- An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud Storage -- Abstract -- 1 Introduction -- 2 Ciphertext Access Control Based on Hierarchical CP-ABE -- 2.1 Analysis of Cloud Storage Application Scenarios -- 2.2 Key Generation Model Based on Hierarchical CP-ABE -- 2.3 Key Generation Algorithm Based on Hierarchical CP-ABE -- 2.4 Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3 Access Control Optimization Technology Based on Local Proxy -- 3.1 Time Cost of Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3.2 Ciphertext Access Control Scheme Based on Local Proxy -- 4 Experimental Results and Analysis -- 4.1 Experimental Data Selection -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Complete Separable Reversible Data Hiding in Encrypted Image -- Abstract -- 1 Introduction -- 2 Proposed Method -- 2.1 Image Encryption and Decryption -- 2.2 Data Embedding -- 2.3 Data Extraction and Image Recovery -- 3 Experiments and Results -- 3.1 Performance of Image Encryption -- 3.2 Image Quality and Payload Comparison -- 4 Conclusion -- Acknowledgements -- References -- Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Algorithm -- Abstract -- 1 Introduction -- 2 The Basic Principle and the Analysis of QPSO -- 2.1 The Basic Principle -- 2.2 The Analysis of QPSO Algorithm -- 3 IQPSO -- 3.1 Avoid Prematurity---New Calculation Method of Attractive Point and Potential Well Length -- 3.2 Accelerating Convergence---Crossover Operator -- 4 The Application of IQPSO in Multi-threshold Image Segmentation -- 4.1 Implementation Steps
Intro -- Preface -- Organization -- Contents -- Data Security -- VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation -- Abstract -- 1 Introduction -- 2 Specification of VH -- 2.1 Notations -- 2.2 VH Algorithm Description -- 3 Performance Evaluation -- 3.1 Software Implementations -- 3.2 Hardware Performance -- 4 Security Evaluation -- 4.1 Differential Cryptanalysis and Linear Cryptanalysis -- 4.2 Impossible Differential Cryptanalysis -- 5 Conclusion -- References -- Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme -- Abstract -- 1 Introduction -- 2 Overall Flow -- 3 Chaos FSM Construction -- 4 Delay Chains Array PUF Implementation -- 5 Simulation and Hardware Implementation Evaluation -- 6 Conclusion -- Acknowledgments -- References -- Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 1.3 Organization -- 2 Our Framework -- 2.1 System Model -- 2.2 Security Model and Formal Definition -- 2.3 Mathematical Preparation -- 3 The Protocol -- 3.1 Secret Key Generation (KeyGen) -- 3.2 Procedure LSLE Encryption (ProGen) -- 3.3 Solved in the Cloud (Compute) -- 3.4 LSLE Verification (Verify) -- 3.5 LSLE Decryption (Solve) -- 4 Security and Efficiency Analysis -- 4.1 Security Analysis -- 4.2 Efficiency Analysis -- 5 Experiment and Results Analysis -- 6 Conclusion Remarks -- References -- A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 1.3 Related Work -- 2 Preliminaries -- 2.1 Linear Integer Secret Sharing(LISS) -- 2.2 Bilinear Maps -- 2.3 Decisional Bilinear Diffie--Hellman Exponent Assumption -- 3 The CP-HABE Scheme -- 3.1 Attribute Tree
4.2 The Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Coverless Image Steganography Without Embedding -- Abstract -- 1 Introduction -- 2 The Proposed Coverless Steganography Framework -- 2.1 Hash Sequence Generation by Robust Hashing Algorithm -- 2.2 Construction of the Inverted Index Structure by Image Indexing -- 2.3 Finding Appropriate Images by Using the Index Structure -- 2.4 The Communication of Secret Data -- 3 The Analysis of Reliability -- 3.1 The Resistance to Steganalysis Tools -- 3.2 The Robustness to Image Attacks -- 4 Experiments -- 4.1 The Resistance to Steganalysis Tools -- 4.2 The Robustness to Image Attacks -- 5 Conclusion -- Acknowledgements -- References -- Coverless Information Hiding Method Based on the Chinese Mathematical Expression -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Information Hiding -- 3.2 Information Extraction -- 4 Example Verification -- 5 Conclusions -- Acknowledgments -- References -- System Security -- Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by ``PRISM'' -- Abstract -- 1 Introduction -- 2 Huge Challenges Confronted by China in Terms of Network Information Security as Highlighted by ``PRISM'' -- 2.1 Abuse of Emerging Technologies Increases Network Security Vulnerability -- 2.2 Information Asymmetry in Chinese Network Information Security Market Leads to Market Failure -- 3 Developing the Chinese Network Information Security Protection Strategies -- 3.1 The Domestic Perspectives -- 3.2 The International Perspectives -- 4 Conclusions -- References -- A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Description of the Proposed Trust Model -- 2.1 Network Model -- 2.2 Trust Evaluation at Intra-cluster Level
Title Cloud Computing and Security
URI http://digital.casalini.it/9783319270517
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5587585
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319270517
Volume 9483
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwEDZ9LHThLUoLihAbCmr8zliqoqpCLJSqW2QnzkLVSqRl4NdzTp2kFIQES5Q4yUn5zj77nPvuELqxGUJwT6R-SqTyKWPc10LEvpGhCliaWNKejbZ44qMXOp6xWW2vvxW1tF7pu_jjR17Jf7QKbaBXy5L9g2ZLodAA56BfOIKG4biz-C0vXU6B-XKd3G4qMhQsw2dXiW7bjw92_fhiH88GKbtcIqWbR2CcYGGzaVVWu4ylY9Qm0AnrqC4EDPFmfzh-nFbbTDzgcNuyWgohfJN3qBLaQi2VvYJNBXu7yuwErTJleZnf5qd80p0coqaxTIwjVDOLY3RQ1J_wnDk6Qd0cBq-EwQMYvAKGUzR9GE4GI99Ve_AVJoxw6CgmTAOwMiYWJqapFEpyWDClTCreS2lgsAmZLT6nE6K1xElI4UFuNNYEx4acocZiuTDnyKM9EBBSLWMRg4XiEtvQsCSWiVFEKNpG11tfHL3P8z_TWfQFljbqFEBE0HE2GcSzyOHdRl6BTZS_7YJpo-H9gDFp3bCLXwV00H7VDbqosXpbm0tY4Kz0lVPiJ8Y2-Qk
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cloud+Computing+and+Security&rft.date=2016-01-01&rft.pub=Springer+Nature&rft.isbn=9783319270517&rft.externalDocID=5416569
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833192%2F9783319270517.jpg