Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabli...Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.展开更多
In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status ...In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status of equipment in real time, and uses wire or wireless network to send real-time situation to display on manager's PC or PDA. In addition, the system will also synchronize with database to record and reserve message. Furthermore, the status will display not only to a single manager but also a number of managers. In order to increase efficiency between graphical user interface (GUI) and database, the system adopts SqlDependency object of ADO.NET so that any changed situation of the database could be known immediately and synchronized with manager's PC or PDA. Because the problem of the equipment utilization is an NP-complete (non-deterministic polynomial) problem, we apply genetic algorithm to enhance the efficiency of finding optimum solution for equipment utilization. We assign constraints into the system, and the system will post back the optimum solution simultaneously on the screen. As a consequence, we compare our genetic algorithm based approach (GA) with the simulated annealing based approach (SA) for maximizing the equipment utilization. Experimental result shows that our GA approach achieves an average 79.66% improvement in equipment utilization in an acceptable run time.展开更多
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To addres...With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.展开更多
In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and ca...In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and cannot achieve full-automatic migration. In other words, when the server overload requires the administrator to artificially select a low-load host, and then hit migration command to implement the migration. In recent years, the Hadoop is becoming popular, and the read performance of the data is measured in terms of the time overhead for reading the required data. The key to reducing read time is to optimize that Hadoop cloud data read time and the RDBMS data query time. This paper integrates the mentioned techniques to construct the novel JavaEE enterprise development pattern that will promote the further development of the related techniques.展开更多
论述了SQL Server Spatial技术理论,探讨了空间数据导入、索引的创建以及空间数据的查询方法。并以3维激光扫描获取的点云数据为例,采用C#连接SQL Server数据库,对点云数据进行了组织及查询,并在MapOb-ject组件下进行可视化。试验证明,...论述了SQL Server Spatial技术理论,探讨了空间数据导入、索引的创建以及空间数据的查询方法。并以3维激光扫描获取的点云数据为例,采用C#连接SQL Server数据库,对点云数据进行了组织及查询,并在MapOb-ject组件下进行可视化。试验证明,建立空间索引后点云数据的检索效率较高。展开更多
当今科技飞速发展,隐私保护成为一个重要议题.为了确保数据的安全性,通常选择将数据加密后存储在云服务器上,然而这样云服务器无法对加密后的数据进行计算、统计等有效处理,从而使得很多应用场景受限.为了解决这个问题,提出一种基于环...当今科技飞速发展,隐私保护成为一个重要议题.为了确保数据的安全性,通常选择将数据加密后存储在云服务器上,然而这样云服务器无法对加密后的数据进行计算、统计等有效处理,从而使得很多应用场景受限.为了解决这个问题,提出一种基于环上容错学习(ring learning with error,R-LWE)问题的PKE-MET(public-key encryption with a multiple-ciphertext equality test)方案,并给出了正确性和安全性分析.该方案允许云服务器同时对多个密文执行相等性测试,还能够抵抗量子计算攻击.基于Palisade库对方案进行了实现,从理论与实现的角度与其他方案进行了比较分析.相较于其他方案,该方案具有高效、运行时间短的优点.展开更多
基金supported in part by the Major Science and Technology Projects in Yunnan Province(202202AD080013)King Khalid University for funding this work through Large Group Project under grant number RGP.2/373/45.
文摘Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems.
文摘In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status of equipment in real time, and uses wire or wireless network to send real-time situation to display on manager's PC or PDA. In addition, the system will also synchronize with database to record and reserve message. Furthermore, the status will display not only to a single manager but also a number of managers. In order to increase efficiency between graphical user interface (GUI) and database, the system adopts SqlDependency object of ADO.NET so that any changed situation of the database could be known immediately and synchronized with manager's PC or PDA. Because the problem of the equipment utilization is an NP-complete (non-deterministic polynomial) problem, we apply genetic algorithm to enhance the efficiency of finding optimum solution for equipment utilization. We assign constraints into the system, and the system will post back the optimum solution simultaneously on the screen. As a consequence, we compare our genetic algorithm based approach (GA) with the simulated annealing based approach (SA) for maximizing the equipment utilization. Experimental result shows that our GA approach achieves an average 79.66% improvement in equipment utilization in an acceptable run time.
基金The National Natural Science Foundation of China(No.61272413,No.61472165)
文摘With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.
文摘In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and cannot achieve full-automatic migration. In other words, when the server overload requires the administrator to artificially select a low-load host, and then hit migration command to implement the migration. In recent years, the Hadoop is becoming popular, and the read performance of the data is measured in terms of the time overhead for reading the required data. The key to reducing read time is to optimize that Hadoop cloud data read time and the RDBMS data query time. This paper integrates the mentioned techniques to construct the novel JavaEE enterprise development pattern that will promote the further development of the related techniques.
文摘论述了SQL Server Spatial技术理论,探讨了空间数据导入、索引的创建以及空间数据的查询方法。并以3维激光扫描获取的点云数据为例,采用C#连接SQL Server数据库,对点云数据进行了组织及查询,并在MapOb-ject组件下进行可视化。试验证明,建立空间索引后点云数据的检索效率较高。
文摘当今科技飞速发展,隐私保护成为一个重要议题.为了确保数据的安全性,通常选择将数据加密后存储在云服务器上,然而这样云服务器无法对加密后的数据进行计算、统计等有效处理,从而使得很多应用场景受限.为了解决这个问题,提出一种基于环上容错学习(ring learning with error,R-LWE)问题的PKE-MET(public-key encryption with a multiple-ciphertext equality test)方案,并给出了正确性和安全性分析.该方案允许云服务器同时对多个密文执行相等性测试,还能够抵抗量子计算攻击.基于Palisade库对方案进行了实现,从理论与实现的角度与其他方案进行了比较分析.相较于其他方案,该方案具有高效、运行时间短的优点.