• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:张建标

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 15 >
Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models SCIE
期刊论文 | 2024 , 19 , 8845-8859 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract&Keyword Cite

Abstract :

Federated Learning (FL), a secure and emerging distributed learning paradigm, has garnered significant interest in the Internet of Things (IoT) domain. However, it remains vulnerable to adversaries who may compromise privacy and integrity. Previous studies on privacy-preserving FL (PPFL) have demonstrated limitations in client model personalization and resistance to poisoning attacks, including Byzantine and backdoor attacks. In response, we propose a novel PPFL framework, FedRectify, that employs a personalized dual-layer approach through the deployment of Trusted Execution Environments and an interactive training strategy. This strategy facilitates the learning of personalized client features via private and shared layers. Furthermore, to improve model's robustness to poisoning attacks, we introduce a novel aggregation method that employs clustering to filter out outlier model parameters and robust regression to assess the confidence of cluster members, thereby rectifying poisoned parameters. We theoretically prove the convergence of FedRectify and empirically validate its performance through extensive experiments. The results demonstrate that FedRectify converges 1.47-2.63 times faster than state-of-the-art methods when countering Byzantine attacks. Moreover, it can rapidly reduce the attack success rate to a low level between 10% and 40% in subsequent rounds when confronting bursty backdoor attacks.

Keyword :

trusted execution environments trusted execution environments privacy-preserving privacy-preserving IoT IoT Federated learning Federated learning poisoning attack poisoning attack

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Cao, Yihao , Zhang, Jianbiao , Zhao, Yaru et al. Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models [J]. | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , 2024 , 19 : 8845-8859 .
MLA Cao, Yihao et al. "Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models" . | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 19 (2024) : 8845-8859 .
APA Cao, Yihao , Zhang, Jianbiao , Zhao, Yaru , Shen, Hong , Huang, Haoxiang . Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models . | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , 2024 , 19 , 8845-8859 .
Export to NoteExpress RIS BibTex
Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud SCIE
期刊论文 | 2023 , 35 (9) | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
WoS CC Cited Count: 2
Abstract&Keyword Cite

Abstract :

Symmetric searchable encryption (SSE) enables users to search the ciphertext stored on the untrusted cloud without revealing the search keywords, effectively protecting users' privacy. However, most of the existing SSE schemes reveal the search or access pattern during the keyword query, which can be used by the adversary to infer the sensitive information in ciphertext, thus posing a great threat to users' privacy. To address this, we propose an SSE scheme supporting search pattern and access pattern protection in multi-cloud, called SAPM-SSE. In our scheme, an index shuffle protocol is proposed to change the content and location of the index after each query, which helps to achieve the protection of search and access pattern. Furthermore, with the purpose of improving the efficiency of shuffling, we construct a shuffling algorithm based on index cache, the number of index entries for shuffling reduced from gamma to gamma/n (n >= 1). Besides, our scheme supports the dynamic update of documents and achieves the forward security in update. Finally, security analysis and experimental results show that our scheme can achieve the protection of search pattern and access pattern with high efficiency.

Keyword :

symmetric searchable encryption symmetric searchable encryption multi-cloud multi-cloud dynamic dynamic pattern protection pattern protection

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Xu, Wanshan , Zhang, Jianbiao , Yuan, Yilin et al. Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud [J]. | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2023 , 35 (9) .
MLA Xu, Wanshan et al. "Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud" . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 35 . 9 (2023) .
APA Xu, Wanshan , Zhang, Jianbiao , Yuan, Yilin , Wang, Xiao . Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2023 , 35 (9) .
Export to NoteExpress RIS BibTex
A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing SCIE
期刊论文 | 2022 , 2022 | SECURITY AND COMMUNICATION NETWORKS
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

Public cloud computing has become increasingly popular due to the rapid advancements in communication and networking technology. As a result, it is widely used by businesses, corporations, and other organizations to boost the productivity. However, the result generated by millions of network-enabled IoT devices and kept on the public cloud server, as well as the latency in response and safe transmission, are important issues that IoT faces when using the public cloud computing. These concerns and obstacles can only be overcome by designing a robust mutual authentication and secure cross-verification mechanism. Therefore, we have attempted to design a cryptographic protocol based on a simple hash function, xor operations, and the exchange of random numbers. The security of the proposed protocol has formally been verified using the ROR model, ProVerif2.03, and informally using realistic discussion. In contrast, the performance metrics have been analyzed by looking into the security feature, communication, and computation costs. To sum it up, we have compared our proposed security mechanism with the state-of-the-art protocols, and we recommend it to be effectively implemented in the public cloud computing environment.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Khan, Naveed , Zhang, Jianbiao , Ali, Jehad et al. A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing [J]. | SECURITY AND COMMUNICATION NETWORKS , 2022 , 2022 .
MLA Khan, Naveed et al. "A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing" . | SECURITY AND COMMUNICATION NETWORKS 2022 (2022) .
APA Khan, Naveed , Zhang, Jianbiao , Ali, Jehad , Pathan, Muhammad Salman , Chaudhry, Shehzad Ashraf . A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing . | SECURITY AND COMMUNICATION NETWORKS , 2022 , 2022 .
Export to NoteExpress RIS BibTex
A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server SCIE
期刊论文 | 2022 , 2022 | SECURITY AND COMMUNICATION NETWORKS
WoS CC Cited Count: 3
Abstract&Keyword Cite

Abstract :

Everyone desires to avail online services provided by different service providers securely, efficiently, and effectively. In this regard, security is still a significant concern for them. However, no one guarantees secure communication by browsing different applications remotely. To ensure confidentiality, authorization, availability, nonrepudiation, and removing eavesdropping, without a robust authentication scheme, nothing will go right. Therefore, we attempted to design a robust and privacy-preserving authentication scheme for end-users to securely access public cloud servers' services remotely without losing performance. Our proposed scheme security has been evaluated formally using the random oracle model (ROM) and ProVerif2.03 and informally using proposition and discussion. At the same time, the performance metric has been analyzed by considering the scheme's computation and communication costs. Upon comparing the proposed scenario with state-of-the-artwork, it has been demonstrated that the scheme is much better in terms of security and performance, as these are contradicting metrics, and the change in one conversely affects the other.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Khan, Naveed , Zhang, Jianbiao , Jan, Saeed Ullah . A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server [J]. | SECURITY AND COMMUNICATION NETWORKS , 2022 , 2022 .
MLA Khan, Naveed et al. "A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server" . | SECURITY AND COMMUNICATION NETWORKS 2022 (2022) .
APA Khan, Naveed , Zhang, Jianbiao , Jan, Saeed Ullah . A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server . | SECURITY AND COMMUNICATION NETWORKS , 2022 , 2022 .
Export to NoteExpress RIS BibTex
An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain SCIE
期刊论文 | 2022 , 9 (11) , 8681-8692 | IEEE INTERNET OF THINGS JOURNAL
WoS CC Cited Count: 25
Abstract&Keyword Cite

Abstract :

As the public cloud becomes one of the leading ways in data-sharing nowadays, data confidentiality and user privacy are increasingly critical. Partially policy-hidden ciphertext policy attribute-based encryption (CP-ABE) can effectively protect data confidentiality while reducing privacy leakage by hiding part of the access structure. However, it cannot satisfy the need of data sharing in the public cloud with complex users and large amounts of data, both in terms of less expressive access structures and limited granularity of policy hiding. Moreover, the verification of access right to shared data and correctness of decryption are ignored or conducted by an untrusted third party, and the prime-order groups are seldom considered in the expressive policy-hidden schemes. This article proposes a fully policy-hidden CP-ABE scheme constructed on linear secret sharing scheme (LSSS) access structure and prime-order groups for public cloud data sharing. To help users decrypt, hidden vector encryption (HVE) with a "convert step" is applied, which is more compatible with CP-ABE. Meanwhile, decentralized credible verification of access right to shared data and correctness of decryption based on blockchain are also provided. We prove the security of our scheme rigorously and compare the scheme with others comprehensively. The results show that our scheme performs better.

Keyword :

Data privacy Data privacy Costs Costs policy-hidden ciphertext policy attribute-based encryption (CP-ABE) policy-hidden ciphertext policy attribute-based encryption (CP-ABE) Blockchains Blockchains hidden vector encryption (HVE) hidden vector encryption (HVE) Encryption Encryption privacy preserving privacy preserving Servers Servers Blockchain Blockchain linear secret sharing scheme (LSSS) linear secret sharing scheme (LSSS) Cloud computing Cloud computing Privacy Privacy

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Zhaoqian , Zhang, Jianbiao , Yuan, Yilin et al. An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain [J]. | IEEE INTERNET OF THINGS JOURNAL , 2022 , 9 (11) : 8681-8692 .
MLA Zhang, Zhaoqian et al. "An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain" . | IEEE INTERNET OF THINGS JOURNAL 9 . 11 (2022) : 8681-8692 .
APA Zhang, Zhaoqian , Zhang, Jianbiao , Yuan, Yilin , Li, Zheng . An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain . | IEEE INTERNET OF THINGS JOURNAL , 2022 , 9 (11) , 8681-8692 .
Export to NoteExpress RIS BibTex
Identity-based public data integrity verification scheme in cloud storage system via blockchain SCIE
期刊论文 | 2022 , 78 (6) , 8509-8530 | JOURNAL OF SUPERCOMPUTING
WoS CC Cited Count: 10
Abstract&Keyword Cite

Abstract :

Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we provide a novel idea to construct the integrity verification scheme via blockchain. The construction of the proposed scheme is based on identity-based encryption (IBE) which avoids the complex certificate management caused by the public key infrastructure (PKI). Our scheme decides to upload tags set to the blockchain to achieve the separate storage of the tags set and files. The characteristics of the blockchain determine that the tags set will not be forged. But separate storage may cause the information returned by the three parties participating in the public auditing to be out of sync; thus, a small data structure-audit log is introduced to solve this problem. The advantages of audit log can not only guarantee the correct and smooth implementation of the proposed scheme, but also prove the TPA's innocence when necessary. Moreover, the security of our scheme is strictly proved. Finally, a series of performance evaluations demonstrate that our scheme is efficient and feasible.

Keyword :

Cloud security storage Cloud security storage Identity-based encryption Identity-based encryption Public auditing Public auditing Blockchain Blockchain Integrity verification Integrity verification

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yuan, Yilin , Zhang, Jianbiao , Xu, Wanshan et al. Identity-based public data integrity verification scheme in cloud storage system via blockchain [J]. | JOURNAL OF SUPERCOMPUTING , 2022 , 78 (6) : 8509-8530 .
MLA Yuan, Yilin et al. "Identity-based public data integrity verification scheme in cloud storage system via blockchain" . | JOURNAL OF SUPERCOMPUTING 78 . 6 (2022) : 8509-8530 .
APA Yuan, Yilin , Zhang, Jianbiao , Xu, Wanshan , Li, Zheng . Identity-based public data integrity verification scheme in cloud storage system via blockchain . | JOURNAL OF SUPERCOMPUTING , 2022 , 78 (6) , 8509-8530 .
Export to NoteExpress RIS BibTex
Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem SCIE
期刊论文 | 2022 , 17 , 3306-3320 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract&Keyword Cite

Abstract :

The flow of data across nodes has become the dominant feature of data sharing in distributed environments with increasingly blurred boundaries, where it is crucial to maintain data access dynamic, trusted, and efficient. However, traditional centralized access control models are not only difficult to apply in distributed environments but also ignore trusted verification of authorized entities. What's worse, existing access control models rarely consider themselves security, lack independence, at a high risk of being bypassed or tampered with. Thus, we propose in this paper a distributed, dynamic, and trusted access control model, DDTAC-BSS, where the standard Attribute-Based Access Control (ABAC) architecture is modified and extended. To reduce the attack surface, we separate policy enforcement point (PEP) from other core components, they are located in the node system and access control system, respectively. Then, the access control entry point (ACEP) is added as the only interface for the node system to interact with the access control system. Subsequently, the model introduces the entity trusted assessment mechanism to improve the trustworthiness of access control services. Driven by the dynamic attributes, our model can achieve dynamic trusted authorization and fine-grained access control. Moreover, we implement a lightweight, independent, and distributed security subsystem to achieve unified management of policies and decision-making autonomy by message-driven. By considering the independence of the security subsystem, a trusted operating environment is built based on Trusted Execution Environment (TEE) to ensure the security of the access control mechanism itself. The security of our model is proved rigorously based on the non-interference theory. Comprehensive experiments and comparisons have demonstrated the superior functionality, comparable performance, and strong security of our model.

Keyword :

Data models Data models non-interference non-interference decision-making autonomy decision-making autonomy Distributed databases Distributed databases Cross node access control Cross node access control Standards Standards trusted assessment trusted assessment Trusted computing Trusted computing Dynamic scheduling Dynamic scheduling Security Security independent independent Authorization Authorization

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Huang, Haoxiang , Zhang, Jianbiao , Hu, Jun et al. Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem [J]. | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , 2022 , 17 : 3306-3320 .
MLA Huang, Haoxiang et al. "Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem" . | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 17 (2022) : 3306-3320 .
APA Huang, Haoxiang , Zhang, Jianbiao , Hu, Jun , Fu, Yingfang , Qin, Chenggang . Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem . | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , 2022 , 17 , 3306-3320 .
Export to NoteExpress RIS BibTex
一种基于区块链的域间访问控制模型 CSCD
期刊论文 | 2021 , 32 (05) , 1547-1564 | 软件学报
Abstract&Keyword Cite

Abstract :

云计算、物联网和移动互联网等新型计算模式的出现,使得域间相互访问以及数据共享的需求不断扩大,而目前"中心化"的传统访问控制技术所显现出的访问控制策略执行不透明、动态数据管理不灵活、资源拥有者自主性差,使其难以满足海量、动态和分布的新型计算模式.提出了一种以ABAC模型为基础、以区块链为交互方式的域间访问控制模型.介绍了ABAC模型和区块链的技术原理、特点、研究现状,详细阐述了模型框架,对ABAC模型进行了形式化定义;同时,对模型中的智能合约进行了具体描述,给出了本模型在具体场景中的应用和具体的访问控制流程;最后对比了现有的研究方案.该模型可以为域间访问提供标准化的安全、便捷、自主且细粒度的访问...

Keyword :

区块链 区块链 数据共享 数据共享 访问控制 访问控制 跨域 跨域 ABAC ABAC

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 张建标 , 张兆乾 , 徐万山 et al. 一种基于区块链的域间访问控制模型 [J]. | 软件学报 , 2021 , 32 (05) : 1547-1564 .
MLA 张建标 et al. "一种基于区块链的域间访问控制模型" . | 软件学报 32 . 05 (2021) : 1547-1564 .
APA 张建标 , 张兆乾 , 徐万山 , 吴娜 . 一种基于区块链的域间访问控制模型 . | 软件学报 , 2021 , 32 (05) , 1547-1564 .
Export to NoteExpress RIS BibTex
基于TPCM的容器云可信环境研究
期刊论文 | 2021 , 7 (04) , 164-174 | 网络与信息安全学报
Abstract&Keyword Cite

Abstract :

容器技术是一种轻量级的操作系统虚拟化技术,被广泛应用于云计算环境,是云计算领域的研究热点,其安全性备受关注。提出了一种采用主动免疫可信计算进行容器云可信环境构建方法,其安全性符合网络安全等级保护标准要求。首先,通过TPCM对容器云服务器进行度量,由TPCM到容器的运行环境建立一条可信链。然后,通过在TSB增加容器可信的度量代理,实现对容器运行过程的可信度量与可信远程证明。最后,基于Docker与Kubernetes建立实验原型并进行实验。实验结果表明,所提方法能保障云服务器的启动过程与容器运行过程的可信,符合网络安全等级保护标准测评要求。

Keyword :

可信度量 可信度量 可信启动 可信启动 可信计算 可信计算 远程证明 远程证明

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 刘国杰 , 张建标 , 杨萍 et al. 基于TPCM的容器云可信环境研究 [J]. | 网络与信息安全学报 , 2021 , 7 (04) : 164-174 .
MLA 刘国杰 et al. "基于TPCM的容器云可信环境研究" . | 网络与信息安全学报 7 . 04 (2021) : 164-174 .
APA 刘国杰 , 张建标 , 杨萍 , 李铮 . 基于TPCM的容器云可信环境研究 . | 网络与信息安全学报 , 2021 , 7 (04) , 164-174 .
Export to NoteExpress RIS BibTex
基于BMC的服务器可信启动方法研究 CSCD
期刊论文 | 2021 , 21 (05) , 67-73 | 信息网络安全
Abstract&Keyword Cite

Abstract :

可信计算技术以硬件安全为基础,通过信任链、远程证明等技术能够有效实现本地和远程计算系统的安全,在系统安全启动、度量证明等方面得到了广泛应用。当前,终端设备的安全启动技术已经比较成熟,但是对服务器可信启动技术的研究仍然较少。针对服务器BIOS固件、操作系统内核镜像可能被篡改,服务器启动过程中由于信任链过长而导致信任丢失、效率较低等问题,文章提出基于BMC(Baseboard Manager Controller,基板管理控制器)的服务器可信启动方法。该方法以BMC为可信根,利用星型信任链结构构建信任链,实现服务器可信启动;同时文章结合信息流无干扰理论模型,对服务器可信启动进行了形式化描述。BMC...

Keyword :

星型链 星型链 BMC BMC 可信启动 可信启动 主动度量 主动度量

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 徐万山 , 张建标 , 袁艺林 et al. 基于BMC的服务器可信启动方法研究 [J]. | 信息网络安全 , 2021 , 21 (05) : 67-73 .
MLA 徐万山 et al. "基于BMC的服务器可信启动方法研究" . | 信息网络安全 21 . 05 (2021) : 67-73 .
APA 徐万山 , 张建标 , 袁艺林 , 李铮 . 基于BMC的服务器可信启动方法研究 . | 信息网络安全 , 2021 , 21 (05) , 67-73 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 15 >

Export

Results:

Selected

to

Format:
Online/Total:264/6252850
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.