Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China. The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and...
Saved in:
| Main Authors | , , , |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Netherlands
Springer Nature
2016
Springer International Publishing AG Springer |
| Edition | 1 |
| Series | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783319270517 3319270516 9783319270500 3319270508 |
Cover
Table of Contents:
- 3.2 Access Control Structure -- 3.3 Formation of Access Control Policy Matrix M -- 3.4 The Construction -- 4 Security Analysis -- 4.1 Security Model -- 5 Performance Evaluation -- 6 Conclusion -- Acknowledgements -- References -- Privacy-Preserving Multidimensional Range Query on Real-Time Data -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Solutions for Multidimensional Range Query -- 2.2 Key-Insulated Technology -- 3 Privacy-Preserving Multidimensional Range Query -- 3.1 Our System Model -- 3.2 System Setup -- 3.3 Data Processing in Each Epoch -- 3.4 Query Processing -- 3.4.1 Decryption Key Update -- 3.4.2 Query and Verification -- 4 Security Analysis -- 4.1 Analysis on Integrity Verification -- 4.2 Analysis on Impact of Compromised DCs -- 4.3 Attacks on the (M, N)-Key-Insulated Method -- 5 Experiment -- 6 Conclusion -- Acknowledgements -- References -- ARM-Based Privacy Preserving for Medical Data Publishing -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Arm-Based System Architecture of Privacy-Preserving for Medical Data Publishing -- 4 Processing of the Archetecture -- 4.1 Applying Framework on Medical Data -- 4.2 Sanitization Algorithm -- 5 Performance Evaluation -- 5.1 Time Requirement -- 5.2 Lost Rules -- 5.3 New Rules -- 6 Conclusion -- References -- Attribute-Based Encryption Without Key Escrow -- Abstract -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contributions -- 1.3 Our Main Ideas -- 1.4 Organization -- 2 Background -- 2.1 Access Structure -- 2.2 Bilinear Map -- 2.3 Assumption -- 3 CP-ABE Without Key Escrow -- 3.1 Definition -- 3.2 Selective Security Model for WoKE-CP-ABE -- 3.3 Key Escrow Model for WoKE-CP-ABE -- 4 Our Construction -- 5 Analysis of Our Proposed Scheme -- 5.1 Selective Security Proof -- 5.2 Security Analysis for Problem of Key Escrow -- 5.3 Comparing with Multi-authority Attribute-Based Encryption
- 3.3 Queue Technique and Policy
- 2.3 Trust Evaluation at Inter-cluster Level -- 3 Model Analysis and Performance Comparison -- 3.1 Security Analysis -- 3.2 The Analysis and Comparison of Communication Overheads -- 3.3 The Analysis and Comparison of Storage Costs -- 4 Simulation Experiments and Analysis -- 5 Conclusions -- Acknowledgement -- References -- The Optimization Model of Trust for White-Washing -- Abstract -- 1 Introduction and Related Work -- 2 Trustworthy Recommendation Mechanism -- 2.1 Brief Description -- 2.2 Nodes Grouping -- 2.3 TOPSIS-Based Nodes Guarantee -- 2.4 Trust Attenuation -- 2.5 Trust Updating -- 3 Experiments and Analysis -- 4 Conclusion -- Acknowledgement -- References -- Malware Clustering Based on SNN Density Using System Calls -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Feature Extract -- 3.2 Calculate Similarity -- 3.3 Clustering Algorithm Based on SNN Density -- 4 Experiments and Results -- 4.1 Generate Feature Vectors -- 4.2 SNN -- 4.3 Clustering Results -- 5 Evaluation and Discuss -- 6 Conclusion -- References -- Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model Checking -- Abstract -- 1 Introduction -- 2 Dynamic System and Assumptions -- 2.1 Processes in a Dynamic System -- 2.2 Communication in the Dynamic System -- 3 The Eventual Leader Protocol and PRISM Model Design -- 3.1 Algorithm Introduction -- 3.2 PRISM Model -- 4 Model Design and Experiments -- 4.1 Scalability of the System -- 4.2 Unreliable Channels -- 5 Related Work -- 6 Conclusions and Future Work -- Acknowledgements -- References -- A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing Environment -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Propose QoS Controller Architecture -- 3.1 System Modules -- 3.2 Route Optimization
- 6 Extensions -- 6.1 Universality -- 6.2 A More Practical ABE Scheme with Outsourcing Decryption -- 7 Conclusion -- Acknowledgments -- References -- An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud Storage -- Abstract -- 1 Introduction -- 2 Ciphertext Access Control Based on Hierarchical CP-ABE -- 2.1 Analysis of Cloud Storage Application Scenarios -- 2.2 Key Generation Model Based on Hierarchical CP-ABE -- 2.3 Key Generation Algorithm Based on Hierarchical CP-ABE -- 2.4 Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3 Access Control Optimization Technology Based on Local Proxy -- 3.1 Time Cost of Ciphertext Access Control Scheme Based on Hierarchical CP-ABE -- 3.2 Ciphertext Access Control Scheme Based on Local Proxy -- 4 Experimental Results and Analysis -- 4.1 Experimental Data Selection -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Complete Separable Reversible Data Hiding in Encrypted Image -- Abstract -- 1 Introduction -- 2 Proposed Method -- 2.1 Image Encryption and Decryption -- 2.2 Data Embedding -- 2.3 Data Extraction and Image Recovery -- 3 Experiments and Results -- 3.1 Performance of Image Encryption -- 3.2 Image Quality and Payload Comparison -- 4 Conclusion -- Acknowledgements -- References -- Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Algorithm -- Abstract -- 1 Introduction -- 2 The Basic Principle and the Analysis of QPSO -- 2.1 The Basic Principle -- 2.2 The Analysis of QPSO Algorithm -- 3 IQPSO -- 3.1 Avoid Prematurity---New Calculation Method of Attractive Point and Potential Well Length -- 3.2 Accelerating Convergence---Crossover Operator -- 4 The Application of IQPSO in Multi-threshold Image Segmentation -- 4.1 Implementation Steps
- Intro -- Preface -- Organization -- Contents -- Data Security -- VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation -- Abstract -- 1 Introduction -- 2 Specification of VH -- 2.1 Notations -- 2.2 VH Algorithm Description -- 3 Performance Evaluation -- 3.1 Software Implementations -- 3.2 Hardware Performance -- 4 Security Evaluation -- 4.1 Differential Cryptanalysis and Linear Cryptanalysis -- 4.2 Impossible Differential Cryptanalysis -- 5 Conclusion -- References -- Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme -- Abstract -- 1 Introduction -- 2 Overall Flow -- 3 Chaos FSM Construction -- 4 Delay Chains Array PUF Implementation -- 5 Simulation and Hardware Implementation Evaluation -- 6 Conclusion -- Acknowledgments -- References -- Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 1.3 Organization -- 2 Our Framework -- 2.1 System Model -- 2.2 Security Model and Formal Definition -- 2.3 Mathematical Preparation -- 3 The Protocol -- 3.1 Secret Key Generation (KeyGen) -- 3.2 Procedure LSLE Encryption (ProGen) -- 3.3 Solved in the Cloud (Compute) -- 3.4 LSLE Verification (Verify) -- 3.5 LSLE Decryption (Solve) -- 4 Security and Efficiency Analysis -- 4.1 Security Analysis -- 4.2 Efficiency Analysis -- 5 Experiment and Results Analysis -- 6 Conclusion Remarks -- References -- A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Our Contribution -- 1.3 Related Work -- 2 Preliminaries -- 2.1 Linear Integer Secret Sharing(LISS) -- 2.2 Bilinear Maps -- 2.3 Decisional Bilinear Diffie--Hellman Exponent Assumption -- 3 The CP-HABE Scheme -- 3.1 Attribute Tree
- 4.2 The Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Coverless Image Steganography Without Embedding -- Abstract -- 1 Introduction -- 2 The Proposed Coverless Steganography Framework -- 2.1 Hash Sequence Generation by Robust Hashing Algorithm -- 2.2 Construction of the Inverted Index Structure by Image Indexing -- 2.3 Finding Appropriate Images by Using the Index Structure -- 2.4 The Communication of Secret Data -- 3 The Analysis of Reliability -- 3.1 The Resistance to Steganalysis Tools -- 3.2 The Robustness to Image Attacks -- 4 Experiments -- 4.1 The Resistance to Steganalysis Tools -- 4.2 The Robustness to Image Attacks -- 5 Conclusion -- Acknowledgements -- References -- Coverless Information Hiding Method Based on the Chinese Mathematical Expression -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Information Hiding -- 3.2 Information Extraction -- 4 Example Verification -- 5 Conclusions -- Acknowledgments -- References -- System Security -- Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by ``PRISM'' -- Abstract -- 1 Introduction -- 2 Huge Challenges Confronted by China in Terms of Network Information Security as Highlighted by ``PRISM'' -- 2.1 Abuse of Emerging Technologies Increases Network Security Vulnerability -- 2.2 Information Asymmetry in Chinese Network Information Security Market Leads to Market Failure -- 3 Developing the Chinese Network Information Security Protection Strategies -- 3.1 The Domestic Perspectives -- 3.2 The International Perspectives -- 4 Conclusions -- References -- A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Description of the Proposed Trust Model -- 2.1 Network Model -- 2.2 Trust Evaluation at Intra-cluster Level