The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of mobile industry promotes a deep progress of mobile applications, such as vehicular social networks (VSNs), which afford large scale data sharing between vehicles. However, trustworthiness has still been a potential security issue. Traditional public key infrastructure (PKI) cannot restrain malicious users as they are authorized in VSNs. For the reason, this paper proposes a trust...
Database-as-a-Service provides a scalable cloud database for data owners. However, existing cloud database has its limitations. Intermittent unavailability of cloud service increases the response time for the database. In addition, vendor lock-in makes it difficult for data owners to change the service provider when necessary. In this paper, we propose a secure model based on multi-cloud, adopting...
In cloud data services, data owners (DO) publish data through cloud servers (CS) so that clients can access and query the data more efficiently. However, cloud service providers (CSP) are often untrustworthy, query answer authentication becomes essential for cloud service systems. Existing solutions mostly provide DO's signature for published data. But the signature always reveals DO's identity. In...
With the popular development of smart phones and social networks, a large quantity of location-embedded data is collected in mobile cloud. By utilizing these data, the service providers of mobile cloud (MCSP) can provide users with great convenience by location-based queries. Thus the mobile cloud service system (MCSS) comes into being. However, the MCSP are untrustworthy, and the location itself...
Vehicular Ad hoc Networks (VANETs) have been largely impacted by social characteristics and human behaviours with the wide use of service applications in VANETs. Thus, vehicular communications can be considered as a social network for auto-mobiles in which drivers can share data with other neighbours. In this context, a trusted data dissemination claims our high attention. Besides the traditional...
With the quality of service (QoS) of cloud services becoming increasingly concerned, how to ensure that the QoS of cloud services can meet the users' QoS requirement has become a focus of the study on cloud computing. However, the QoS of cloud services is dynamic regularly, we propose a QoS guarantee framework for cloud services and the Bayesian prediction method is used to predict QoS of cloud service...
With the rapid development and popularity of cloud computing, data outsourcing has become an essential widely used data service. Data owner uploads their private information to the cloud server and relies on the services that the cloud provides to execute some operations on data. When data is stored in the cloud, performing data retrieval while preserving confidentiality of data is a big challenge...
With the development of cloud computing and cloud storage technology, the privacy disclosure of the query and the destruction of data integrity on the outsourced data are two increasingly serious security issues in the cloud services. In order to resolve these two problems, we propose a novel user model based on searchable encryption scheme. And the model introduces a trusted third authority (TA),...
On the schemes of personalized privacy preservation, the sensitive attribute value-oriented anonymous method can not satisfy the different privacy preservation requirements for each individual. Therefore we present a personalized extended (a,k)-anonymity model based on clustering techniques. The model can not only avoid privacy disclosure caused by the occurrence imbalance of sensitive attribute values...
With the pervasiveness of smartphones and the advance of wireless body sensor networks (WBSNs), mobile healthcare (m-healthcare) has attracted considerable interest recently. In m-Healthcare, users' smartphones serve as bridges connecting their WBSNs and the healthcare center (HCC), i.e., send users' personal health information (PHI) collected by WBSNs to the HCC and receive the feedback. However,...
Given the resource consumption of transmitting data packets in Vehicular Ad Hoc Network (VANET), selfish nodes might refuse to transmit messages to others just for maximizing their own profits. Therefore, the communication performance within the whole network would be affected. Along with its wide-scale implementation in many road-side applications, selfish behaviors of such nodes are witnessed to...
In this paper, we present an efficient privacy-preserving authentication scheme based on group signature for Vehicular Ad Hoc Networks (VANETs). Although group signature is widely used in VANETs to realize anonymous authentication, the existing schemes based on group signature suffer from long computation delay in the Certificate Revocation List (CRL) checking and signature verification process, leading...
Addressing security and privacy issues is a prerequisite for market-ready Vehicular Ad Hoc Networks. In this paper, an anonymous batch authentication scheme is proposed to authenticate multiple requests sent from different vehicles at the same time. The scheme achieves privacy-preserving by pseudonyms, ensures the backward privacy of the revoked vehicles by hash chain, and realize the batch authentication...
VANET is a special kind of MANET, composed by an ultra-server and large quantity of vehicles. Operators can get profit by providing information and purchasing useful messages from the terminals in the net, terminals can also get reward by transmit messages as router. A rational planning of routes which can maximize the benefit on condition that maximizes the bandwidth for the operators seems meaningful...
Nowadays, Vehicular Ad hoc Network (VANET) emerges as a special and typical form of Internet of Things. VANETs are very useful for decreasing collision accidents and increasing passenger safety. In VANETs the communication between vehicles needs the help of other vehicles with forwarding data packets hop-by-hop. However, a vehicle may be unwilling to help other vehicles to forward packets. For it...
Scalability and privacy are crucial for the RFID-based supply chain systems. But few existing protocols consider the scalability requirement and they have security and privacy issues more or less. In this paper, aiming at the special needs of the supply chain, we propose a Lightweight Scalable Privacy-preserving protocol, LSP, which only needs to XOR and hash operations. By introducing the reverse...
The research of message certification in Vehicular Ad Hoc Networks (VANETs) has been focused on two aspects. One is the On Board Unit (OBU) certificates with Road Side Unit (RSU) one by one, and another is RSU goes to the batch certification after it collects a certain number of vehicle's messages. However, when the number of messages received by RSU is accumulated to certain extent, it is difficult...
The design of threshold based distributed Certification Authority (CA) has been proposed to provide secure and efficient key management service in mobile ad hoc networks (MANETs). However, most of previous works ignore the efficiency and effectiveness and assuming there are always honest nodes performing the service. Focusing on the development of a model which can be used to select a coalition of...
Coverage holes often exist in wireless sensor networks deployed with static nodes. In order to patch the holes and recover the network performance, an algorithm based on mobile nodes is presented, which guides the mobile nodes to the position of holes, and then get the resilient coverage. The static sensors bound a coverage hole can compute the optimum position for the mobile sensors which, after...
The introduction of mobile node brings new security problems and challenges to Heterogeneous Wireless Sensor Network(HWSN), that is how to ensure the credibility, security and low consumption of mobile node in the entire network. In this paper, we design a highly efficient re-authentication protocol for mobile node (MRAP) in HWSN, which makes two communicating parties achieve identity authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.