The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ciphertext Policy - Attribute Based Encryption (CPABE) has emerged as a feasible solution to address challenges of access control to a diverse set of users. In CP-ABE, owner encrypts its data under a policy of attributes, while any data consumer satisfying it can decrypt the data. Problem of existing CP-ABE schemes is that the access matrix is sent in plaintext along with the ciphertext. Hence, to...
As a promising cryptographic primitive, attributebased encryption (ABE) is adopted to protect outsourced data. However, there are some issues in existing attribute-based encryption schemes. First, the attribute authority manages attributes of users, so it may cause the leakage of users' privacy information. Second, because the access structures are directed along with the ciphertexts and may violate...
The popularity of Location-Based Services (LBSs) has resulted in varieties of applications with more conveniences in our daily life. However, since mobile users need to submit some sensitive information to the untrusted LBS servers, they may lose their privacy while they are enjoying the provided social activities. In this paper, we first point out and define the Time-Sensitive Side Information (TSSI)...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
In order to realize data sharing in mobile cloud computing, decentralized attribute-based encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of flaws. First, the main drawback of ABE is that the computation cost of encryption and decryption are expensive. Second, the existing ABE schemes are inapplicable due to the inefficiency of user revocation. Besides, in a...
Decentralized multi-authority attribute-based encryption (ABE) has been adopted to protect outsourced data. However, there are some security issues. Firstly, the user's attributes information is leaked to the authorities and secondly, the access structure being sent along with ciphertext violates its privacy. To address these issues, an efficient decentralized attribute-based encryption scheme with...
With the pervasiveness of mobile devices and the development of biometric technology, biometric identification, which can achieve individual authentication relies on personal biological or behavioral characteristics, has attracted widely considerable interest. However, privacy issues of biometric data bring out increasing concerns due to the highly sensitivity of biometric data. Aiming at this challenge,...
The default cache strategy of Content Centric Networking(CCN) is storing at each Content Router (CR) along the deliver path. It is high cache redundancy which causes the performance of CCN degradation. Hence, finding an efficient caching mechanisms is necessary in CCN. We agree that the single attribute can not to adapt to the complex network environment. the MAC considers hop count or distance, node...
The volume of scientific data has been increasing dramatically over the past decades. Due to its large data size, it becomes rather hard to efficiently organize the archived scientific data so as to provide fast data access capability. The indexing techniques, especially the multidimensional indexing techniques which can handle complex data, are heavily demanded and thus have been playing a critical...
Energy consumption in data center has already become a widely concerned issue in cloud computing research. There are many studies on data center energy efficiency optimization. But most of them focus on the energy consumption of the servers and cooling equipment. Few of them considered data center network (DCN), which is also a significant energy consuming component. By applying newly emerged Software...
As data grows exponentially within data centers, cluster deduplication storage systems face challenges in providing high throughput, high deduplication ratio and load balance. As the key technique, data routing algorithm has a strong impact on the deduplication ratio, throughput and load balance in cluster deduplication storage systems. In this paper, we propose SS-Dedup, a novel stateful data routing...
This paper is about the research on the industrial Ethernet communication between industrial PC (IPC) for a spinning machine and OMRON programmable logic controller (PLC) based on FINS protocol and Winsock in VC++. This proposed networked communication has been successfully designed, installed, commissioned and realized. This paper focused on reliable real-time communication transmission and integrated...
Nowadays, the domestic mobile digital library services are facing the problems of high similarity, lacking innovation and inconvenience. In this paper we put forward and develop a mobile library application for smart phones. Based on the traditional library services, we take the users' personal preferences into consideration to provide better book recommendations and novel reading services, thus making...
Privacy issues in Location-Based Services (LBSs) have gained tremendous attentions in literature over recent years. Existing approaches always fail to provide dual privacy protection on both user's location and point of interest (POI), incur endurable system overhead, and produce high quality of services, simultaneously. To address these problems, we propose a time obfuscation-based scheme, termed...
Privacy issues in Location-Based Services (LBSs) have gained tremendous attentions in literature over recent years. Existing approaches always fail to provide dual privacy protection on both user's location and point of interest (POI), incur endurable system overhead, and produce high quality of services, simultaneously. To address these problems, we propose a time obfuscation-based scheme, termed...
Time synchronization in the intelligent lighting control system is essential to ensure the correct data collection time and the accurate transmission of the control commands. NTP clients on the remote management device and the center control device are proposed for the intelligent lighting control system in this paper. Different from most current NTP clients, time synchronization in the proposed NTP...
With the rapid development of the cloud computing, personal health record (PHR) has attracted great attention of many researchers all over the world recently. However, PHR, which is often outsourced to be stored at a third party, has many security and efficiency issues. Therefore, the study of secure and efficient Personal Health Record Scheme to protect users' privacy in PHR files is of great significance...
With Proximity-based Mobile Social Networks (PMSNs), mobile users can discover and make new social interactions easily with physical-proximate others through WiFi/Bluetooth interfaces embedded in the smartphones. Unfortunately, users enjoy these conveniences at the cost of revealing their personal data. Furthermore, an important factor called social strength, which impacts the discovering result a...
Searchable encryption is a promising technique enabling meaningful search operations to be performed on encrypted databases while protecting user privacy from untrusted third-party service providers. However, while most of the existing works focus on common SQL queries, geometric queries on encrypted spatial data have not been well studied. Especially, circular range search is an important type of...
The ubiquity of modern mobile devices with GPS modules and Internet connectivity such as 3G/4G techniques have resulted in rapid development of Location-Based Services (LBSs). However, users enjoy the convenience provided by the untrusted LBS server at the cost of their privacy. To protect user's sensitive information against adversaries with side information, we design a personalized spatial cloaking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.