Query:
学者姓名:公备
Refining:
Year
Type
Indexed by
Source
Complex
Co-Author
Language
Clean All
Abstract :
Internet of things (IoT) development tends to reduce the reliance on centralized servers. The zero-trust distributed system combined with blockchain technology has become a hot topic in IoT research. However, distribution data storage services and different blockchain protocols make network interoperability and cross-platform more complex. Relay chain is a promising cross-chain technology that solves the complexity and compatibility issues associated with blockchain cross-chain transactions by utilizing relay blockchains as cross-chain connectors. Yet relay chain cross-chain transactions need to collect asset information and implement asset transactions via two-way peg. Due to the release of user transaction information, there is the issue of privacy leakage. In this article, we propose a cross-chain privacy protection protocol based on the Groth16 zero-knowledge proof algorithm and coin-mixing technology, which changes the authentication mechanism and uses a combination of generating functions to map virtual external addresses in transactions. It allows fast cross-chain anonymous transactions while hiding the genuine user's address. The experiment shows that, in a zero-trust IoT context, our scheme can effectively protect user privacy information, accomplish controlled transaction traceability operations, and guarantee cross-chain transaction security.
Keyword :
relay chain relay chain privacy protection privacy protection Zero trust Zero trust vritual address vritual address groth16 groth16
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Yang, Yinghong , Bai, Fenhua , Yu, Zhuo et al. An Anonymous and Super visory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application [J]. | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) . |
MLA | Yang, Yinghong et al. "An Anonymous and Super visory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application" . | ACM TRANSACTIONS ON SENSOR NETWORKS 20 . 2 (2024) . |
APA | Yang, Yinghong , Bai, Fenhua , Yu, Zhuo , Shen, Tao , Liu, Yingli , Gong, Bei . An Anonymous and Super visory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application . | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) . |
Export to | NoteExpress RIS BibTex |
Abstract :
The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptography method that supports fine-grained access control, offering a solution to the IoT's security issues. However, existing CP-ABE schemes are inefficient and unsuitable for IoT devices with limited computing resources. To address this problem, this paper proposes an efficient pairing-free CP-ABE scheme for the IoT. The scheme is based on lightweight elliptic curve scalar multiplication and supports multi-authority and verifiable outsourced decryption. The proposed scheme satisfies indistinguishability against chosen-plaintext attacks (CPA) under the elliptic curve decisional Diffie-Hellman (ECDDH) problem. Performance analysis shows that our proposed scheme is more efficient and better suited to the IoT environment compared to existing schemes.
Keyword :
ciphertext-policy attribute-based encryption ciphertext-policy attribute-based encryption pairing-free pairing-free access control access control Internet of Things Internet of Things
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Guo, Chong , Gong, Bei , Waqas, Muhammad et al. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things [J]. | SENSORS , 2024 , 24 (21) . |
MLA | Guo, Chong et al. "An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things" . | SENSORS 24 . 21 (2024) . |
APA | Guo, Chong , Gong, Bei , Waqas, Muhammad , Alasmary, Hisham , Tu, Shanshan , Chen, Sheng . An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things . | SENSORS , 2024 , 24 (21) . |
Export to | NoteExpress RIS BibTex |
Abstract :
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus algorithm -Verifiable Secret Sharing Byzantine Fault Tolerance Raft Consensus Algorithm (VSSB-Raft). The VSSB-Raft consensus algorithm realizes zero trust through the supervisor node and secret sharing algorithm without the invisible trust between nodes required by the algorithm. Meanwhile, the VSSB-Raft consensus algorithm uses the SM2 signature algorithm to realize the characteristics of zero trust requiring authentication before data use. In addition, by introducing the NDN network, we redesign the communication between nodes and guarantee the communication quality among nodes. The VSSB-Raft consensus algorithm proposed in this paper can make the algorithm Byzantine fault tolerant by setting a threshold for secret sharing while maintaining the algorithm ' s complexity to be O(n). Experiments show that the VSSB-Raft consensus algorithm is secure and efficient with high throughput and low consensus latency.
Keyword :
Blockchain Blockchain secret sharing secret sharing Byzantine fault tolerance Byzantine fault tolerance zero trust zero trust consensus algorithm consensus algorithm
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Tian, Siben , Bai, Fenhua , Shen, Tao et al. yVSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain [J]. | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) . |
MLA | Tian, Siben et al. "yVSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain" . | ACM TRANSACTIONS ON SENSOR NETWORKS 20 . 2 (2024) . |
APA | Tian, Siben , Bai, Fenhua , Shen, Tao , Zhang, Chi , Gong, Bei . yVSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain . | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) . |
Export to | NoteExpress RIS BibTex |
Abstract :
With the continuous development of mobile devices, mobile applications bring a lot of convenience to people's lives. The abuse of mobile device permissions is prone to the risk of privacy leakage. The existing detection technology can detect the inconsistency between the declared authority and the actual use authority. But using the third-party privacy policy as the analysis basis for SDK permissions will result in a large set of extracted declaration permissions, which will lead to identifying risky applications as normal applications during consistency comparison. The prevailing approach involves utilizing models based on TextCNN to extract information from privacy policies. However, the training of TextCNN relies on large-scale annotated datasets, leading to high costs. This paper uses BERT as the word vector extraction model to obtain private phrases from the privacy policy. And then we use cosine similarity to automatically filter permission phrase samples, reducing the workload of manual labeling. On the other hand, existing methods do not support the analysis of Chinese privacy policies. In order to solve the problem of consistency judgment between Chinese privacy policy and permission usage, we implement a BERT-based Android privacy policy and permission usage consistency analysis engine. The engine first uses static analysis to obtain the permission list of Android applications, and then combines the BERT model to achieve consistency analysis. After functional and speed testing, we found that the engine can successfully run the consistency analysis function of Chinese declaration permissions and usage permissions, and it is better than the existing detection methods.
Keyword :
Privacy policy Privacy policy Mobile applications Mobile applications Policy conflicts Policy conflicts Text extraction Text extraction Android security Android security
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Tu, Tengfei , Zhang, Hua , Gong, Bei et al. Intelligent analysis of android application privacy policy and permission consistency [J]. | ARTIFICIAL INTELLIGENCE REVIEW , 2024 , 57 (7) . |
MLA | Tu, Tengfei et al. "Intelligent analysis of android application privacy policy and permission consistency" . | ARTIFICIAL INTELLIGENCE REVIEW 57 . 7 (2024) . |
APA | Tu, Tengfei , Zhang, Hua , Gong, Bei , Du, Daizhong , Wen, Qiaoyan . Intelligent analysis of android application privacy policy and permission consistency . | ARTIFICIAL INTELLIGENCE REVIEW , 2024 , 57 (7) . |
Export to | NoteExpress RIS BibTex |
Abstract :
Green edge computing aims to reasonably allocate computing resources on the premise of ensuring the reliability of information services. The computing power gap between terminal and edge server makes the traditional encryption algorithm waste too much energy when dealing with massive redundant data. How to improve encryption efficiency and reduce the computing consumption of massive data terminal equipment on the premise of ensuring data security is one of the goals of green edge computing. We proposed a data compression and encryption scheme based on compression sensing, which greatly reduces the computing consumption of computing limited data terminals; At the same time, the hyper chaotic system is used to further encrypt the data by Arnold transform, bitwise XOR and data random scrambling. In order to solve the problem that compressed sensing can not accurately recover data, we designed a nonlinear encryption scheme based on Chinese Remainder Theorem as a supplement. The simulation results show that the proposed data compression and encryption method is effective and reliable, which has high security performance, compression ability for text data and images, and high recovery ability when the compression ratio is more than 0.5.
Keyword :
Chinese remainder theorem Chinese remainder theorem Green edge computing Green edge computing Compression encryption Compression encryption Compressed sensing Compressed sensing
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Liu, Jianli , Zhang, Yu , Gong, Bei . A data compression and encryption method for green edge computing [J]. | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS , 2023 , 26 (5) : 3341-3359 . |
MLA | Liu, Jianli et al. "A data compression and encryption method for green edge computing" . | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 26 . 5 (2023) : 3341-3359 . |
APA | Liu, Jianli , Zhang, Yu , Gong, Bei . A data compression and encryption method for green edge computing . | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS , 2023 , 26 (5) , 3341-3359 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Vulnerability detection is important for smart contracts because of their immutable and irreversible features. In this work, a new detection method based on adversarial multi-task learning is proposed to improve the accuracy of existing vulnerability detection methods, which is based on the multi-task learning framework, including a shared part and a task-specific part. We optimize the multi-task learning frameworks and propose the mixed parameter sharing method to make each task not only maintain its uniqueness, but also share features with other tasks, which helps solve the problem that the hard parameter sharing method cannot constrain the underlying shared layer and improve the quality of extracted features. In addition, we introduce adversarial transfer learning to reduce noise pollution caused by the private feature and interference between the general feature and the private feature. We experimented on datasets obtained from our previous work, and the experimental results prove that our proposed model can judge whether there are vulnerabilities in smart contracts and then identify their types. Additionally, the results also show that our model effectively improves detection accuracy and has an advantage in performance over representative methods.
Keyword :
Smart contracts Smart contracts Blockchain security supervision Blockchain security supervision Adversarial transfer learning Adversarial transfer learning Multi-task learning Multi-task learning Vulnerability detection Vulnerability detection
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Zhou, Kuo , Huang, Jing , Han, Honggui et al. Smart contracts vulnerability detection model based on adversarial multi-task learning [J]. | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS , 2023 , 77 . |
MLA | Zhou, Kuo et al. "Smart contracts vulnerability detection model based on adversarial multi-task learning" . | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 77 (2023) . |
APA | Zhou, Kuo , Huang, Jing , Han, Honggui , Gong, Bei , Xiong, Ao , Wang, Wei et al. Smart contracts vulnerability detection model based on adversarial multi-task learning . | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS , 2023 , 77 . |
Export to | NoteExpress RIS BibTex |
Abstract :
In-vehicle network security plays a vital role in ensuring the secure information transfer between vehicle and Internet. The existing research is still facing great difficulties in balancing the conflicting factors for the in-vehicle network security and hence to improve intrusion detection performance. To challenge this issue, we construct a many-objective intrusion detection model by including information entropy, accuracy, false positive rate and response time of anomaly detection as the four objectives, which represent the key factors influencing intrusion detection performance. We then design an improved intrusion detection algorithm based on many-objective optimization to optimize the detection model parameters. The designed algorithm has double evolutionary selections. Specifically, an improved differential evolutionary operator produces new offspring of the internal population, and a spherical pruning mechanism selects the excellent internal solutions to form the selected pool of the external archive. The second evolutionary selection then produces new offspring of the archive, and an archive selection mechanism of the external archive selects and stores the optimal solutions in the whole detection process. An experiment is performed using a real-world in-vehicle network data set to verify the performance of our proposed model and algorithm. Experimental results obtained demonstrate that our algorithm can respond quickly to attacks and achieve high entropy and detection accuracy as well as very low false positive rate with a good trade-off in the conflicting objective landscape.
Keyword :
information entropy information entropy Optimization Optimization Behavioral sciences Behavioral sciences intrusion detection intrusion detection Data models Data models Intrusion detection Intrusion detection Many-objective optimization Many-objective optimization in-vehicle network in-vehicle network Feature extraction Feature extraction Anomaly detection Anomaly detection Network security Network security
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Zhang, Jiangjiang , Gong, Bei , Waqas, Muhammad et al. Many-Objective Optimization Based Intrusion Detection for In-Vehicle Network Security [J]. | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS , 2023 , 24 (12) : 15051-15065 . |
MLA | Zhang, Jiangjiang et al. "Many-Objective Optimization Based Intrusion Detection for In-Vehicle Network Security" . | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 24 . 12 (2023) : 15051-15065 . |
APA | Zhang, Jiangjiang , Gong, Bei , Waqas, Muhammad , Tu, Shanshan , Chen, Sheng . Many-Objective Optimization Based Intrusion Detection for In-Vehicle Network Security . | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS , 2023 , 24 (12) , 15051-15065 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Differential privacy provides strong privacy preservation guarantee in information sharing. As social network analysis has been enjoying many applications, it opens a new arena for applications of differential privacy. This article presents a comprehensive survey connecting the basic principles of differential privacy and applications in social network analysis. We concisely review the foundations of differential privacy and the major variants. Then, we discuss how differential privacy is applied to social network analysis, including privacy attacks in social networks, models of differential privacy in social network analysis, and a series of popular tasks, such as analyzing degree distribution, counting subgraphs and assigning weights to edges. We also discuss a series of challenges for future work.
Keyword :
global sensitivity global sensitivity local differential privacy local differential privacy dependent differential privacy dependent differential privacy subgraph counting subgraph counting degree distributions degree distributions smooth sensitivity smooth sensitivity social network data analysis social network data analysis Differential privacy Differential privacy edge weight query edge weight query
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Jiang, Honglu , Pei, Jian , Yu, Dongxiao et al. Applications of Differential Privacy in Social Network Analysis: A Survey [J]. | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2023 , 35 (1) : 108-127 . |
MLA | Jiang, Honglu et al. "Applications of Differential Privacy in Social Network Analysis: A Survey" . | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 35 . 1 (2023) : 108-127 . |
APA | Jiang, Honglu , Pei, Jian , Yu, Dongxiao , Yu, Jiguo , Gong, Bei , Cheng, Xiuzhen . Applications of Differential Privacy in Social Network Analysis: A Survey . | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2023 , 35 (1) , 108-127 . |
Export to | NoteExpress RIS BibTex |
Abstract :
The development of Internet of Things (IoT) technology leads to the continuous growth of IoT devices. Due to the characteristics of resource constraints and interdependencies, IoT devices are vulnerable to many security issues. Remote attestation can verify the integrity of remote devices. However, there are some problems that exist, such as only verifying the integrity of static and runtime data, attestation evidence growing proportionally to the number of services, resulting in significant increase in runtime overhead. Therefore, this article proposes a blockchain-assisted integrity attestation scheme for distributed dependency IoT services. The scheme builds a distributed service integrity model capable of measuring the integrity of both static data and runtime data of distributed IoT services. In addition, we propose a secure and trusted blockchain query mechanism, which can effectively resist tampering or storage errors in the database data of a certain node in the blockchain. Furthermore, a two-way authentication distributed service integrity attestation protocol is designed to protect the communication security between participants without excessive performance overhead. We demonstrate the security of the attestation protocol with automated validation of Internet security protocols and applications. The feasibility and performance of the proposed scheme are verified by simulating the Wismote sensor using the Cooja simulator.
Keyword :
remote attestation remote attestation Protocols Protocols Blockchain Blockchain Performance evaluation Performance evaluation distributed dependency Internet of Things (IoT) services distributed dependency Internet of Things (IoT) services integrity attestation integrity attestation Blockchains Blockchains
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Shen, Tao , Li, Hongchao , Bai, Fenhua et al. Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services [J]. | IEEE SYSTEMS JOURNAL , 2023 , 17 (4) : 6169-6180 . |
MLA | Shen, Tao et al. "Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services" . | IEEE SYSTEMS JOURNAL 17 . 4 (2023) : 6169-6180 . |
APA | Shen, Tao , Li, Hongchao , Bai, Fenhua , Gong, Bei . Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services . | IEEE SYSTEMS JOURNAL , 2023 , 17 (4) , 6169-6180 . |
Export to | NoteExpress RIS BibTex |
Abstract :
In blockchain technology, data are stored on decentralized nodes and public to each node in the blockchain network. Hence, the focus of privacy protection in the blockchain guarantees the anonymity of transactions such that attackers cannot attain the users' personal information through data analysis. Among the existing privacy protection technologies, the scheme based on group signature has good anonymity, but the existing scheme exists a large number of operations that are difficult to apply to wireless terminals. In this paper, using the powerful offloading capability of edge computing, we propose a blockchain node traceable identity privacy technology scheme based on threshold group signature, and the scheme greatly reduces the computing burden of nodes while achieving node privacy protection. (C) 2021 Elsevier B.V. All rights reserved.
Keyword :
Traceability Traceability Signature Signature Blockchain Blockchain
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Gong, Bei , Cui, Chi , Hu, Mingsheng et al. Anonymous Traceability protocol based on Group Signature for Blockchain [J]. | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 : 160-167 . |
MLA | Gong, Bei et al. "Anonymous Traceability protocol based on Group Signature for Blockchain" . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 127 (2022) : 160-167 . |
APA | Gong, Bei , Cui, Chi , Hu, Mingsheng , Guo, Chong , Li, Xiaochong , Ren, Yuheng . Anonymous Traceability protocol based on Group Signature for Blockchain . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 , 160-167 . |
Export to | NoteExpress RIS BibTex |
Export
Results: |
Selected to |
Format: |