期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing 被引量:2
1
作者 Zhen Yang Yongfeng Huang +1 位作者 Xing Li Wenyu Wang 《Computers, Materials & Continua》 SCIE EI 2018年第7期1-17,共17页
To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on... To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance. 展开更多
关键词 data provenance asymmetric fingerprint protocol digital watermarking multimedia outsourcing
在线阅读 下载PDF
Special Topic on Security of Large Models
2
作者 SU Zhou DU Linkang 《ZTE Communications》 2025年第3期1-2,共2页
Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved percepti... Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved perception,generation,and decision-making in various fields.However,their vast scale and complexity bring about new security challenges.Issues such as backdoor vulnerabilities during training,jailbreaking in multimodal rea⁃soning,and data provenance and copyright auditing have made security a critical focus for both academia and industry. 展开更多
关键词 large modelssuch SECURITY multimodal agentshave multimodal rea soningand large language models llms vision language data provenance copyright auditing backdoor vulnerabilities vision language models
在线阅读 下载PDF
TDLens:Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
3
作者 Rui Mei Hanbing Yan +2 位作者 Qinqin Wang Zhihui Han Zhuohang Lyu 《China Communications》 SCIE CSCD 2022年第10期102-115,共14页
To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in ne... To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in network traffic.Several studies have begun to focus on threat detection methods based on provenance data of host-level event tracing.On the other side,with the significant development of big data and artificial intelligence technologies,large-scale graph computing has been widely used.To this end,kinds of research try to bridge the gap between threat detection based on host log provenance data and graph algorithm,and propose the threat detection algorithm based on system provenance graph.These approaches usually generate the system provenance graph via tagging and tracking of system events,and then leverage the characteristics of the graph to conduct threat detection and attack investigation.For the purpose of deeply understanding the correctness,effectiveness,and efficiency of different graph-based threat detection algorithms,we pay attention to mainstream threat detection methods based on provenance graphs.We select and implement 5 state-of-the-art threat detection approaches among a large number of studies as evaluation objects for further analysis.To this end,we collect about 40GB of host-level raw log data in a real-world IT environment,and simulate 6 types of cyber attack scenarios in an isolated environment for malicious provenance data to build our evaluation datasets.The crosswise comparison and longitudinal assessment interpret in detail these detection approaches can detect which attack scenarios well and why.Our empirical evaluation provides a solid foundation for the improvement direction of the threat detection approach. 展开更多
关键词 cyber threat detection causality dependency graph data provenance
在线阅读 下载PDF
Preventing Data Leakage in a Cloud Environment
4
作者 Fuzhi Cang Mingxing Zhang +1 位作者 Yongwei Wu Weimin Zheng 《ZTE Communications》 2013年第4期27-31,共5页
Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data acc... Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models. 展开更多
关键词 cloud computing data leakage data tracking data provenance homomorphic encryption
在线阅读 下载PDF
FAIR Data Reuse-the Path through Data Citation 被引量:9
5
作者 Paul Groth Helena Cousijn +1 位作者 Tim Clark Carole Goble 《Data Intelligence》 2020年第1期78-86,305,共10页
One of the key goals of the FAIR guiding principles is defined by its final principle-to optimize data sets for reuse by both humans and machines.To do so,data providers need to implement and support consistent machin... One of the key goals of the FAIR guiding principles is defined by its final principle-to optimize data sets for reuse by both humans and machines.To do so,data providers need to implement and support consistent machine readable metadata to describe their data sets.This can seem like a daunting task for data providers,whether it is determining what level of detail should be provided in the provenance metadata or figuring out what common shared vocabularies should be used.Additionally,for existing data sets it is often unclear what steps should be taken to enable maximal,appropriate reuse.Data citation already plays an important role in making data findable and accessible,providing persistent and unique identifiers plus metadata on over 16 million data sets.In this paper,we discuss how data citation and its underlying infrastructures,in particular associated metadata,provide an important pathway for enabling FAIR data reuse. 展开更多
关键词 FAIR data data citation Research objects data provenance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部