Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and...
Saved in:
| Main Authors | , , , |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Netherlands
Springer Nature
2016
Springer International Publishing AG Springer |
| Edition | 1 |
| Series | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783319270517 3319270516 9783319270500 3319270508 |
Cover
| Abstract | This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing. |
|---|---|
| AbstractList | This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing. |
| Author | Huang, Zhiqiu Sun, Xingming Wang, Jian Luo, Junzhou |
| Author_xml | – sequence: 1 fullname: Huang, Zhiqiu – sequence: 2 fullname: Sun, Xingming – sequence: 3 fullname: Luo, Junzhou – sequence: 4 fullname: Wang, Jian |
| BookMark | eNpd0MtKxDAUBuCIF3TGvoGL4kZcFHJPutQyXmDAheI2pOnpTJ1OUptW8e0t1o2uDof_48B_FujIBw8HKMmVZozkVGFB1OG__QQtCJaSaK4kPUVJjG8YYyKJlEKeoYuiDWOVFmHfjUPjN6n1VfoMbuyb4escHde2jZD8ziV6vVu9FA_Z-un-sbhZZ5YywWTGBeQ1wZiBU-B4rZXVUnJWC20lrjkBCrmYclZWrCw1rXI-QQklLRl1wJboej5s4w4-4za0QzQfLZQh7KL502eyV7Pt-vA-QhzMD3Pgh962ZnVbCKGV0GKSl7N0Ntq28Y3ZBx82ve220QhOpgfk7Bv6lln0 |
| ContentType | eBook |
| DBID | I4C |
| DEWEY | 004 |
| DatabaseName | Casalini Torrossa eBooks Institutional Catalogue |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9783319270517 3319270516 |
| Edition | 1 1st ed. 2015 |
| Editor | Huang, Zhiqiu Sun, Xingming Wang, Jian Luo, Junzhou |
| Editor_xml | – sequence: 1 fullname: Huang, Zhiqiu – sequence: 2 fullname: Luo, Junzhou – sequence: 3 fullname: Sun, Xingming – sequence: 4 fullname: Wang, Jian |
| ExternalDocumentID | 9783319270517 EBC5587585 5416569 |
| GroupedDBID | 0D6 0DA 38. AABBV AAGZE AAZAK AAZUS ABBVZ ABFTD ABMNI ACKNT AEDXK AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS APFYR AZZ BBABE CZZ I4C IEZ IY- LDH NUC SAO SBO SFQCF TMQGW TPJZQ TSXQS TWXRB Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 AEJLV Z5O |
| ID | FETCH-LOGICAL-a23536-45e9f1003ec7ec4f87a86643f58a60f41e2e950033bd3bb82d947ec6eb2b32ce3 |
| ISBN | 9783319270517 3319270516 9783319270500 3319270508 |
| IngestDate | Fri Nov 08 04:08:10 EST 2024 Fri May 30 22:53:42 EDT 2025 Tue Nov 14 22:51:57 EST 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum_Ident | Q |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a23536-45e9f1003ec7ec4f87a86643f58a60f41e2e950033bd3bb82d947ec6eb2b32ce3 |
| OCLC | 1066184762 |
| PQID | EBC5587585 |
| PageCount | 567 |
| ParticipantIDs | askewsholts_vlebooks_9783319270517 proquest_ebookcentral_EBC5587585 casalini_monographs_5416569 |
| PublicationCentury | 2000 |
| PublicationDate | 2016 2016-01-04 |
| PublicationDateYYYYMMDD | 2016-01-01 2016-01-04 |
| PublicationDate_xml | – year: 2016 text: 2016 |
| PublicationDecade | 2010 |
| PublicationPlace | Netherlands |
| PublicationPlace_xml | – name: Netherlands – name: Cham |
| PublicationSeriesTitle | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI |
| PublicationYear | 2016 |
| Publisher | Springer Nature Springer International Publishing AG Springer |
| Publisher_xml | – name: Springer Nature – name: Springer International Publishing AG – name: Springer |
| SSID | ssj0001616656 |
| Score | 1.9653469 |
| Snippet | This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in... |
| SourceID | askewsholts proquest casalini |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Cloud computing Computer networks Data processing Computer science |
| Subtitle | First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers |
| TableOfContents | 3.2 Access Control Structure -- 3.3 Formation of Access Control Policy Matrix M -- 3.4 The Construction -- 4 Security Analysis -- 4.1 Security Model -- 5 Performance Evaluation -- 6 Conclusion -- Acknowledgements -- References -- Privacy-Preserving Multidimensional Range Query on Real-Time Data -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Solutions for Multidimensional Range Query -- 2.2 Key-Insulated Technology -- 3 Privacy-Preserving Multidimensional Range Query -- 3.1 Our System Model -- 3.2 System Setup -- 3.3 Data Processing in Each Epoch -- 3.4 Query Processing -- 3.4.1 Decryption Key Update -- 3.4.2 Query and Verification -- 4 Security Analysis -- 4.1 Analysis on Integrity Verification -- 4.2 Analysis on Impact of Compromised DCs -- 4.3 Attacks on the (M, N)-Key-Insulated Method -- 5 Experiment -- 6 Conclusion -- Acknowledgements -- References -- ARM-Based Privacy Preserving for Medical Data Publishing -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Arm-Based System Architecture of Privacy-Preserving for Medical Data Publishing -- 4 Processing of the Archetecture -- 4.1 Applying Framework on Medical Data -- 4.2 Sanitization Algorithm -- 5 Performance Evaluation -- 5.1 Time Requirement -- 5.2 Lost Rules -- 5.3 New Rules -- 6 Conclusion -- References -- Attribute-Based Encryption Without Key Escrow -- Abstract -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contributions -- 1.3 Our Main Ideas -- 1.4 Organization -- 2 Background -- 2.1 Access Structure -- 2.2 Bilinear Map -- 2.3 Assumption -- 3 CP-ABE Without Key Escrow -- 3.1 Definition -- 3.2 Selective Security Model for WoKE-CP-ABE -- 3.3 Key Escrow Model for WoKE-CP-ABE -- 4 Our Construction -- 5 Analysis of Our Proposed Scheme -- 5.1 Selective Security Proof -- 5.2 Security Analysis for Problem of Key Escrow -- 5.3 Comparing with Multi-authority Attribute-Based Encryption 3.3 Queue Technique and Policy 2.3 Trust Evaluation at Inter-cluster Level -- 3 Model Analysis and Performance Comparison -- 3.1 Security Analysis -- 3.2 The Analysis and Comparison of Communication Overheads -- 3.3 The Analysis and Comparison of Storage Costs -- 4 Simulation Experiments and Analysis -- 5 Conclusions -- Acknowledgement -- References -- The Optimization Model of Trust for White-Washing -- Abstract -- 1 Introduction and Related Work -- 2 Trustworthy Recommendation Mechanism -- 2.1 Brief Description -- 2.2 Nodes Grouping -- 2.3 TOPSIS-Based Nodes Guarantee -- 2.4 Trust Attenuation -- 2.5 Trust Updating -- 3 Experiments and Analysis -- 4 Conclusion -- Acknowledgement -- References -- Malware Clustering Based on SNN Density Using System Calls -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Feature Extract -- 3.2 Calculate Similarity -- 3.3 Clustering Algorithm Based on SNN Density -- 4 Experiments and Results -- 4.1 Generate Feature Vectors -- 4.2 SNN -- 4.3 Clustering Results -- 5 Evaluation and Discuss -- 6 Conclusion -- References -- Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model Checking -- Abstract -- 1 Introduction -- 2 Dynamic System and Assumptions -- 2.1 Processes in a Dynamic System -- 2.2 Communication in the Dynamic System -- 3 The Eventual Leader Protocol and PRISM Model Design -- 3.1 Algorithm Introduction -- 3.2 PRISM Model -- 4 Model Design and Experiments -- 4.1 Scalability of the System -- 4.2 Unreliable Channels -- 5 Related Work -- 6 Conclusions and Future Work -- Acknowledgements -- References -- A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing Environment -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Propose QoS Controller Architecture -- 3.1 System Modules -- 3.2 Route Optimization 6 Extensions -- 6.1 Universality -- 6.2 A More Practical ABE Scheme with Outsourcing Decryption -- 7 Conclusion -- Acknowledgments -- References -- An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud Storage -- Abstract -- 1 Introduction -- 2 Ciphertext Access Control Based on Hierarchical CP-ABE -- 2.1 Analysis of Cloud Storage Application Scenarios -- 2.2 Key Generation Model Based on Hierarchical CP-ABE -- 2.3 Key Generation Algorithm Based on Hierarchical CP-ABE -- 2.4 Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3 Access Control Optimization Technology Based on Local Proxy -- 3.1 Time Cost of Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3.2 Ciphertext Access Control Scheme Based on Local Proxy -- 4 Experimental Results and Analysis -- 4.1 Experimental Data Selection -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Complete Separable Reversible Data Hiding in Encrypted Image -- Abstract -- 1 Introduction -- 2 Proposed Method -- 2.1 Image Encryption and Decryption -- 2.2 Data Embedding -- 2.3 Data Extraction and Image Recovery -- 3 Experiments and Results -- 3.1 Performance of Image Encryption -- 3.2 Image Quality and Payload Comparison -- 4 Conclusion -- Acknowledgements -- References -- Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Algorithm -- Abstract -- 1 Introduction -- 2 The Basic Principle and the Analysis of QPSO -- 2.1 The Basic Principle -- 2.2 The Analysis of QPSO Algorithm -- 3 IQPSO -- 3.1 Avoid Prematurity---New Calculation Method of Attractive Point and Potential Well Length -- 3.2 Accelerating Convergence---Crossover Operator -- 4 The Application of IQPSO in Multi-threshold Image Segmentation -- 4.1 Implementation Steps Intro -- Preface -- Organization -- Contents -- Data Security -- VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation -- Abstract -- 1 Introduction -- 2 Specification of VH -- 2.1 Notations -- 2.2 VH Algorithm Description -- 3 Performance Evaluation -- 3.1 Software Implementations -- 3.2 Hardware Performance -- 4 Security Evaluation -- 4.1 Differential Cryptanalysis and Linear Cryptanalysis -- 4.2 Impossible Differential Cryptanalysis -- 5 Conclusion -- References -- Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme -- Abstract -- 1 Introduction -- 2 Overall Flow -- 3 Chaos FSM Construction -- 4 Delay Chains Array PUF Implementation -- 5 Simulation and Hardware Implementation Evaluation -- 6 Conclusion -- Acknowledgments -- References -- Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 1.3 Organization -- 2 Our Framework -- 2.1 System Model -- 2.2 Security Model and Formal Definition -- 2.3 Mathematical Preparation -- 3 The Protocol -- 3.1 Secret Key Generation (KeyGen) -- 3.2 Procedure LSLE Encryption (ProGen) -- 3.3 Solved in the Cloud (Compute) -- 3.4 LSLE Verification (Verify) -- 3.5 LSLE Decryption (Solve) -- 4 Security and Efficiency Analysis -- 4.1 Security Analysis -- 4.2 Efficiency Analysis -- 5 Experiment and Results Analysis -- 6 Conclusion Remarks -- References -- A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 1.3 Related Work -- 2 Preliminaries -- 2.1 Linear Integer Secret Sharing(LISS) -- 2.2 Bilinear Maps -- 2.3 Decisional Bilinear Diffie--Hellman Exponent Assumption -- 3 The CP-HABE Scheme -- 3.1 Attribute Tree 4.2 The Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Coverless Image Steganography Without Embedding -- Abstract -- 1 Introduction -- 2 The Proposed Coverless Steganography Framework -- 2.1 Hash Sequence Generation by Robust Hashing Algorithm -- 2.2 Construction of the Inverted Index Structure by Image Indexing -- 2.3 Finding Appropriate Images by Using the Index Structure -- 2.4 The Communication of Secret Data -- 3 The Analysis of Reliability -- 3.1 The Resistance to Steganalysis Tools -- 3.2 The Robustness to Image Attacks -- 4 Experiments -- 4.1 The Resistance to Steganalysis Tools -- 4.2 The Robustness to Image Attacks -- 5 Conclusion -- Acknowledgements -- References -- Coverless Information Hiding Method Based on the Chinese Mathematical Expression -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Information Hiding -- 3.2 Information Extraction -- 4 Example Verification -- 5 Conclusions -- Acknowledgments -- References -- System Security -- Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by ``PRISM'' -- Abstract -- 1 Introduction -- 2 Huge Challenges Confronted by China in Terms of Network Information Security as Highlighted by ``PRISM'' -- 2.1 Abuse of Emerging Technologies Increases Network Security Vulnerability -- 2.2 Information Asymmetry in Chinese Network Information Security Market Leads to Market Failure -- 3 Developing the Chinese Network Information Security Protection Strategies -- 3.1 The Domestic Perspectives -- 3.2 The International Perspectives -- 4 Conclusions -- References -- A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Description of the Proposed Trust Model -- 2.1 Network Model -- 2.2 Trust Evaluation at Intra-cluster Level |
| Title | Cloud Computing and Security |
| URI | http://digital.casalini.it/9783319270517 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5587585 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319270517 |
| Volume | 9483 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwEDZ9LHThLUoLihAbCmr8zliqoqpCLJSqW2QnzkLVSqRl4NdzTp2kFIQES5Q4yUn5zj77nPvuELqxGUJwT6R-SqTyKWPc10LEvpGhCliaWNKejbZ44qMXOp6xWW2vvxW1tF7pu_jjR17Jf7QKbaBXy5L9g2ZLodAA56BfOIKG4biz-C0vXU6B-XKd3G4qMhQsw2dXiW7bjw92_fhiH88GKbtcIqWbR2CcYGGzaVVWu4ylY9Qm0AnrqC4EDPFmfzh-nFbbTDzgcNuyWgohfJN3qBLaQi2VvYJNBXu7yuwErTJleZnf5qd80p0coqaxTIwjVDOLY3RQ1J_wnDk6Qd0cBq-EwQMYvAKGUzR9GE4GI99Ve_AVJoxw6CgmTAOwMiYWJqapFEpyWDClTCreS2lgsAmZLT6nE6K1xElI4UFuNNYEx4acocZiuTDnyKM9EBBSLWMRg4XiEtvQsCSWiVFEKNpG11tfHL3P8z_TWfQFljbqFEBE0HE2GcSzyOHdRl6BTZS_7YJpo-H9gDFp3bCLXwV00H7VDbqosXpbm0tY4Kz0lVPiJ8Y2-Qk |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cloud+Computing+and+Security&rft.date=2016-01-01&rft.pub=Springer+Nature&rft.isbn=9783319270517&rft.externalDocID=5416569 |
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833192%2F9783319270517.jpg |