Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third...In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.展开更多
Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require m...Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers.展开更多
Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networ...Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user.展开更多
This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and ca...This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and case study, so as to promote the quality of demonstration area constructed for modem public sports services, truly show the social application value of the construction of demonstration area for modem public sports services, and achieve national fitness and the development of public sports.展开更多
. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and custome.... In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented.展开更多
Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to ...Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings.展开更多
The quality management of overseas power projects, because it involves contract requirements, local regulations, standards, language communication and other aspects, has an important impact on the success or failure o...The quality management of overseas power projects, because it involves contract requirements, local regulations, standards, language communication and other aspects, has an important impact on the success or failure of the project. In the quality management of overseas power projects, the introduction of international third-party quality engineers will get twice the result with half the effort. This is mainly because we can quickly find quality engineers who are familiar with the power project process, have outstanding professional technology, and have strong English communication skills, and can deal with and solve quality problems in a timely manner.展开更多
The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resourc...The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resources integration, understand the characteristics of complexi .ty, the virtual and dynamic and so on, the paper analyzed the three kinds of Agent attribute for fourth party logistics resources integration system using the Agent technology and the principle, and then puts forward the fourth party logistics resources integration model of based on multi Agent.展开更多
The Dragon Program is a cooperation in Earth Observation(EO)between the European Space Agency(ESA)and the Ministry of Science and Technology(MOST)of China.The collaboration aims to promote the application of ESA,ESA T...The Dragon Program is a cooperation in Earth Observation(EO)between the European Space Agency(ESA)and the Ministry of Science and Technology(MOST)of China.The collaboration aims to promote the application of ESA,ESA Third Party Mission,Copernicus Sentinel and China EO data in scientific and application development,facilitates scientific exchanges between China and Europe scientists,and provides training for land,ocean,and atmospheric applications of remote sensing technology.Started in 2004,four phases,each lasting four years,have been successfully completed.The Dragon Program has provided a unique platform for the joint exploitation of EO data for science and application development.Furthermore,it has made remarkable achievements by bringing together top scientists,training young talents,and facilitated satellite data sharing between the Sino-European teams.展开更多
According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are ...According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are designed. First, a fuzzy model is proposed by taking multiple customers, multiple commodities, capacitated facility location and integrated logistics facility layout into account. In the model, the fuzzy customer demands and transportation rates are illustrated by triangular fuzzy numbers. Secondly, the fuzzy model is converted into a crisp model by applying fuzzy chance constrained theory and possibility theory, and one hybrid genetic algorithm is designed for the crisp model. Finally, two different examples are designed to illustrate that the model and solution discussed are valid.展开更多
Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell tran...Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity.展开更多
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident...Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.展开更多
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica...Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.展开更多
Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle i...Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks.展开更多
Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to rema...Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.展开更多
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61402058,61572086 and 61370203the Fund for Middle and Young Academic Leaders of Chengdu University of Information Technology under Grant No J201511+2 种基金the Science and Technology Support Project of Sichuan Province under Grant No 2013GZX0137the Fund for Young Persons Project of Sichuan Province under Grant No 12ZB017the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No szjj2014-074
文摘In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.
文摘Facing the opportunities and challenges of China’s en try into WTO, logistics enterprises take BPR as an important way to improve the core competence.But modern logistics is a systematic engineering and its require ments are the standardization and normalization for enhancing the Chinese enterp rises’ level of logistic activities.This paper reveal the importance of manageme nt technique,information technique and business model in enterprise’s BPR throug h the positive analysis for business process of the third party logistics as a new system after reengineering businees process. Reorganization of marketing target. The characters of business procedure after N ew Sunshine recomposed include: "the last mile " service systems of logistics; s etting up HUB to control many end-points in big and middle cities, setting up s ingle-points in small cities, the small parts acting delivering system which st yle of "assembly and allot" are made of in. Reorganization of business model. The New Sunshine reorganized has three aspects of business model which set up: HUB, end-point and single-point. Reorganization of business process.The mainly business process of restructure Ne w Sunshine include : standard quote declaring prices to all attendants; on line, timely and exactly declaring prices; The net contract of B2C work on line; Tran smit to attendant; Logistice operating; feedback the working information; User t rack goods condition; Settling information; paying and so on, the different busi ness can separate into kinds of right corresponding to the business process, suc h as the picture of distributing parcel, ordering, moving, picking, transporting , delivering, information, inquiring and settling. Set up standard systems. Aims to execute standard management is to make distribu te and logistics for norm and standard, according to the resources share tog ether with the progresses especially and base on reducing the necessary expenses to reduce the living expenses, while low cost and effectively to ensure the goo d service for satisfy the present and potential needs of the customers.
文摘Preserving privacy of the user is a very critical requirement to be metwith all the international laws like GDPR, California privacy protection act andmany other bills in place. On the other hand, Online Social Networks (OSN)has a wide spread recognition among the users, as a means of virtual communication. OSN may also acts as an identity provider for both internal and externalapplications. While it provides a simplified identification and authentication function to users across multiple applications, it also opens the users to a new spectrum of privacy threats. The privacy breaches costs to the users as well as tothe OSN. Despite paying millions of dollars as fine every year, the OSN hasnot done any significant changes, as data is the fuel and what it loses as fine isfar less compared to the money OSN makes out of the shared data. In this work,we have discussed a wide range of possible privacy threats and solutions prevailing in OSN-Third Party Application (TPA) data sharing scenario. Our solutionmodels the behavior of the user, as well as TPA and pinpoints the avenues of oversharing to the users, thereby limiting the privacy loss of the user.
文摘This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and case study, so as to promote the quality of demonstration area constructed for modem public sports services, truly show the social application value of the construction of demonstration area for modem public sports services, and achieve national fitness and the development of public sports.
文摘. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented.
文摘Face is a concept much cared about and delicately disposed among Chinese people,especially with the presence of a third party.Unfortunately so far substantial studies on patterns and politeness strategies utilized to diminish the threat to the inter-locutor's face in expressing disagreement have been carried out in English-as-the-first-language settings with lttle effort in ex-ploring disageement in Chinese culture.Therefore,this paper seeks to explore what disagreement strategies Chinese college stu-dents will use to mitigate the face-threatening act with absence or presence of a third party for an attempt to shed some light on the speech act theory in Chinese settings.
文摘The quality management of overseas power projects, because it involves contract requirements, local regulations, standards, language communication and other aspects, has an important impact on the success or failure of the project. In the quality management of overseas power projects, the introduction of international third-party quality engineers will get twice the result with half the effort. This is mainly because we can quickly find quality engineers who are familiar with the power project process, have outstanding professional technology, and have strong English communication skills, and can deal with and solve quality problems in a timely manner.
文摘The key of the effective operation for the fourth party logistics is to integrate logistics resources with supply chain management concept and technology. According to the essence of the fourth party logistics resources integration, understand the characteristics of complexi .ty, the virtual and dynamic and so on, the paper analyzed the three kinds of Agent attribute for fourth party logistics resources integration system using the Agent technology and the principle, and then puts forward the fourth party logistics resources integration model of based on multi Agent.
文摘The Dragon Program is a cooperation in Earth Observation(EO)between the European Space Agency(ESA)and the Ministry of Science and Technology(MOST)of China.The collaboration aims to promote the application of ESA,ESA Third Party Mission,Copernicus Sentinel and China EO data in scientific and application development,facilitates scientific exchanges between China and Europe scientists,and provides training for land,ocean,and atmospheric applications of remote sensing technology.Started in 2004,four phases,each lasting four years,have been successfully completed.The Dragon Program has provided a unique platform for the joint exploitation of EO data for science and application development.Furthermore,it has made remarkable achievements by bringing together top scientists,training young talents,and facilitated satellite data sharing between the Sino-European teams.
文摘According to the operational characteristics of the logistics networks for the third party logistics supplier (3PLS), the forward and reverse logistics networks together for 3PLS under the uncertain environment are designed. First, a fuzzy model is proposed by taking multiple customers, multiple commodities, capacitated facility location and integrated logistics facility layout into account. In the model, the fuzzy customer demands and transportation rates are illustrated by triangular fuzzy numbers. Secondly, the fuzzy model is converted into a crisp model by applying fuzzy chance constrained theory and possibility theory, and one hybrid genetic algorithm is designed for the crisp model. Finally, two different examples are designed to illustrate that the model and solution discussed are valid.
基金DB is supported by grants from the German Research Foundation(361210922/RTG 2408 and SFB 854/A23).
文摘Adoptive transfer of cytomegalovirus(CMV)-specific cytotoxic T lymphocytes(CMV-CTLs)from original transplant donors or third-party donors was effective for the treatment of CMV infection after allogenic stem cell transplantation(allo-SCT),but the antiviral activity of CMV-CTL types has not been compared.To determine whether third-party CMV-CTLs provide comparable long-term antiviral efficacy to transplant donor CMV-CTLs,we first compared the antiviral abilities of transplant donors and third-party CMV-CTLs for treatment of CMV infection in two mouse models,compared the in vivo recovery of CMV-specific immunity,and analyzed the underlying mechanisms driving sustained antiviral immunity.The results showed that both donor and third-party CMV-CTLs effectively combated systemic CMV infection by reducing CMV pathology and tumor burden 28 days postinfusion.The in vivo recovery of CMV-specific immunity after CMV-CTL infusion was comparable in both groups.A detailed analysis of the source of recovered CMV-CTLs showed the proliferation and expansion of graft-derived endogenous CMV-CTLs in both groups.Our clinical study,which enrolled 31 patients who received third-party CMV-CTLs and 62 matched pairs of individuals who received transplant donor CMV-CTLs for refractory CMV infection,further showed that adoptive therapy with donor or third-party CMV-CTLs had comparable clinical responses without significant therapy-related toxicity.We observed strong expansion of CD8+tetramer+T cells and proliferation of recipient endogenous CMV-CTLs after CMV-CTL infusion,which were associated with a reduced or cleared viral load.Our data confirmed that adoptive therapy with third-party or transplant donor CMV-CTLs triggered comparable antiviral responses to CMV infection that might be mediated by restoration of endogenous CMV-specific immunity.
文摘Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc.
基金supported by National Natural Science Foundation of China (No. 61572267, No. 61272425, No. 61402245)the Open Project of Co-Innovation Center for Information Supply & Assurance Technology, Anhui University+1 种基金the Open Project of the State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences(No.2017-MS-21, No.2016-MS-23)National Cryptography Development Fund of China (MMJJ20170118)
文摘Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient.
基金Supported by the National Natural Science Foundation of China(61472097)Specialized Research Fund for the Doctoral Program of Higher Education of China(20132304110017)Natural Science Foundation of Heilongjiang Province of China(F2015022)
文摘Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks.
基金supported by the National Natural Science Foundation of China(Grant No.61572086)Major Project of Education Department in Sichuan(Grant No.18ZA0109)Web Culture Project Sponsored by the Humanities and Social Science Research Base of the Sichuan Provincial Education Department(Grant No.WLWH18-22).
文摘Quantum private comparison is an important topic in quantum cryptography.Recently,the idea of semi-quantumness has been often used in designing private comparison protocol,which allows some of the participants to remain classical.In this paper,we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger(GHZ)class states,which allows two classical participants to compare the equality of their private secret with the help of a quantum third party(server).In the proposed protocol,server is semi-honest who will follow the protocol honestly,but he may try to learn additional information from the protocol execution.The classical participants’activities are restricted to either measuring a quantum state or reflecting it in the classical basis{0,1}.In addition,security and efficiency of the proposed schemes have been discussed.