Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and...

Full description

Saved in:
Bibliographic Details
Main Authors Huang, Zhiqiu, Sun, Xingming, Luo, Junzhou, Wang, Jian
Format eBook
LanguageEnglish
Published Netherlands Springer Nature 2016
Springer International Publishing AG
Springer
Edition1
SeriesLNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI
Subjects
Online AccessGet full text
ISBN9783319270517
3319270516
9783319270500
3319270508

Cover

Table of Contents:
  • 3.2 Access Control Structure -- 3.3 Formation of Access Control Policy Matrix M -- 3.4 The Construction -- 4 Security Analysis -- 4.1 Security Model -- 5 Performance Evaluation -- 6 Conclusion -- Acknowledgements -- References -- Privacy-Preserving Multidimensional Range Query on Real-Time Data -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Solutions for Multidimensional Range Query -- 2.2 Key-Insulated Technology -- 3 Privacy-Preserving Multidimensional Range Query -- 3.1 Our System Model -- 3.2 System Setup -- 3.3 Data Processing in Each Epoch -- 3.4 Query Processing -- 3.4.1 Decryption Key Update -- 3.4.2 Query and Verification -- 4 Security Analysis -- 4.1 Analysis on Integrity Verification -- 4.2 Analysis on Impact of Compromised DCs -- 4.3 Attacks on the (M, N)-Key-Insulated Method -- 5 Experiment -- 6 Conclusion -- Acknowledgements -- References -- ARM-Based Privacy Preserving for Medical Data Publishing -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Arm-Based System Architecture of Privacy-Preserving for Medical Data Publishing -- 4 Processing of the Archetecture -- 4.1 Applying Framework on Medical Data -- 4.2 Sanitization Algorithm -- 5 Performance Evaluation -- 5.1 Time Requirement -- 5.2 Lost Rules -- 5.3 New Rules -- 6 Conclusion -- References -- Attribute-Based Encryption Without Key Escrow -- Abstract -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contributions -- 1.3 Our Main Ideas -- 1.4 Organization -- 2 Background -- 2.1 Access Structure -- 2.2 Bilinear Map -- 2.3 Assumption -- 3 CP-ABE Without Key Escrow -- 3.1 Definition -- 3.2 Selective Security Model for WoKE-CP-ABE -- 3.3 Key Escrow Model for WoKE-CP-ABE -- 4 Our Construction -- 5 Analysis of Our Proposed Scheme -- 5.1 Selective Security Proof -- 5.2 Security Analysis for Problem of Key Escrow -- 5.3 Comparing with Multi-authority Attribute-Based Encryption
  • 3.3 Queue Technique and Policy
  • 2.3 Trust Evaluation at Inter-cluster Level -- 3 Model Analysis and Performance Comparison -- 3.1 Security Analysis -- 3.2 The Analysis and Comparison of Communication Overheads -- 3.3 The Analysis and Comparison of Storage Costs -- 4 Simulation Experiments and Analysis -- 5 Conclusions -- Acknowledgement -- References -- The Optimization Model of Trust for White-Washing -- Abstract -- 1 Introduction and Related Work -- 2 Trustworthy Recommendation Mechanism -- 2.1 Brief Description -- 2.2 Nodes Grouping -- 2.3 TOPSIS-Based Nodes Guarantee -- 2.4 Trust Attenuation -- 2.5 Trust Updating -- 3 Experiments and Analysis -- 4 Conclusion -- Acknowledgement -- References -- Malware Clustering Based on SNN Density Using System Calls -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Feature Extract -- 3.2 Calculate Similarity -- 3.3 Clustering Algorithm Based on SNN Density -- 4 Experiments and Results -- 4.1 Generate Feature Vectors -- 4.2 SNN -- 4.3 Clustering Results -- 5 Evaluation and Discuss -- 6 Conclusion -- References -- Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model Checking -- Abstract -- 1 Introduction -- 2 Dynamic System and Assumptions -- 2.1 Processes in a Dynamic System -- 2.2 Communication in the Dynamic System -- 3 The Eventual Leader Protocol and PRISM Model Design -- 3.1 Algorithm Introduction -- 3.2 PRISM Model -- 4 Model Design and Experiments -- 4.1 Scalability of the System -- 4.2 Unreliable Channels -- 5 Related Work -- 6 Conclusions and Future Work -- Acknowledgements -- References -- A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing Environment -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Propose QoS Controller Architecture -- 3.1 System Modules -- 3.2 Route Optimization
  • 6 Extensions -- 6.1 Universality -- 6.2 A More Practical ABE Scheme with Outsourcing Decryption -- 7 Conclusion -- Acknowledgments -- References -- An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud Storage -- Abstract -- 1 Introduction -- 2 Ciphertext Access Control Based on Hierarchical CP-ABE -- 2.1 Analysis of Cloud Storage Application Scenarios -- 2.2 Key Generation Model Based on Hierarchical CP-ABE -- 2.3 Key Generation Algorithm Based on Hierarchical CP-ABE -- 2.4 Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3 Access Control Optimization Technology Based on Local Proxy -- 3.1 Time Cost of Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3.2 Ciphertext Access Control Scheme Based on Local Proxy -- 4 Experimental Results and Analysis -- 4.1 Experimental Data Selection -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Complete Separable Reversible Data Hiding in Encrypted Image -- Abstract -- 1 Introduction -- 2 Proposed Method -- 2.1 Image Encryption and Decryption -- 2.2 Data Embedding -- 2.3 Data Extraction and Image Recovery -- 3 Experiments and Results -- 3.1 Performance of Image Encryption -- 3.2 Image Quality and Payload Comparison -- 4 Conclusion -- Acknowledgements -- References -- Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Algorithm -- Abstract -- 1 Introduction -- 2 The Basic Principle and the Analysis of QPSO -- 2.1 The Basic Principle -- 2.2 The Analysis of QPSO Algorithm -- 3 IQPSO -- 3.1 Avoid Prematurity---New Calculation Method of Attractive Point and Potential Well Length -- 3.2 Accelerating Convergence---Crossover Operator -- 4 The Application of IQPSO in Multi-threshold Image Segmentation -- 4.1 Implementation Steps
  • Intro -- Preface -- Organization -- Contents -- Data Security -- VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation -- Abstract -- 1 Introduction -- 2 Specification of VH -- 2.1 Notations -- 2.2 VH Algorithm Description -- 3 Performance Evaluation -- 3.1 Software Implementations -- 3.2 Hardware Performance -- 4 Security Evaluation -- 4.1 Differential Cryptanalysis and Linear Cryptanalysis -- 4.2 Impossible Differential Cryptanalysis -- 5 Conclusion -- References -- Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme -- Abstract -- 1 Introduction -- 2 Overall Flow -- 3 Chaos FSM Construction -- 4 Delay Chains Array PUF Implementation -- 5 Simulation and Hardware Implementation Evaluation -- 6 Conclusion -- Acknowledgments -- References -- Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 1.3 Organization -- 2 Our Framework -- 2.1 System Model -- 2.2 Security Model and Formal Definition -- 2.3 Mathematical Preparation -- 3 The Protocol -- 3.1 Secret Key Generation (KeyGen) -- 3.2 Procedure LSLE Encryption (ProGen) -- 3.3 Solved in the Cloud (Compute) -- 3.4 LSLE Verification (Verify) -- 3.5 LSLE Decryption (Solve) -- 4 Security and Efficiency Analysis -- 4.1 Security Analysis -- 4.2 Efficiency Analysis -- 5 Experiment and Results Analysis -- 6 Conclusion Remarks -- References -- A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 1.3 Related Work -- 2 Preliminaries -- 2.1 Linear Integer Secret Sharing(LISS) -- 2.2 Bilinear Maps -- 2.3 Decisional Bilinear Diffie--Hellman Exponent Assumption -- 3 The CP-HABE Scheme -- 3.1 Attribute Tree
  • 4.2 The Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Coverless Image Steganography Without Embedding -- Abstract -- 1 Introduction -- 2 The Proposed Coverless Steganography Framework -- 2.1 Hash Sequence Generation by Robust Hashing Algorithm -- 2.2 Construction of the Inverted Index Structure by Image Indexing -- 2.3 Finding Appropriate Images by Using the Index Structure -- 2.4 The Communication of Secret Data -- 3 The Analysis of Reliability -- 3.1 The Resistance to Steganalysis Tools -- 3.2 The Robustness to Image Attacks -- 4 Experiments -- 4.1 The Resistance to Steganalysis Tools -- 4.2 The Robustness to Image Attacks -- 5 Conclusion -- Acknowledgements -- References -- Coverless Information Hiding Method Based on the Chinese Mathematical Expression -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Information Hiding -- 3.2 Information Extraction -- 4 Example Verification -- 5 Conclusions -- Acknowledgments -- References -- System Security -- Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by ``PRISM'' -- Abstract -- 1 Introduction -- 2 Huge Challenges Confronted by China in Terms of Network Information Security as Highlighted by ``PRISM'' -- 2.1 Abuse of Emerging Technologies Increases Network Security Vulnerability -- 2.2 Information Asymmetry in Chinese Network Information Security Market Leads to Market Failure -- 3 Developing the Chinese Network Information Security Protection Strategies -- 3.1 The Domestic Perspectives -- 3.2 The International Perspectives -- 4 Conclusions -- References -- A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Description of the Proposed Trust Model -- 2.1 Network Model -- 2.2 Trust Evaluation at Intra-cluster Level