Cloud computing becomes an important application development platform for processing user data with high security.Service providers are accustomed to providing storage centers outside the trusted location preferred by...Cloud computing becomes an important application development platform for processing user data with high security.Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner.Thus,ensuring the security and confidentiality of the data while processing in the centralized network is very difficult.The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network.Intruders are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud network.In this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in M-Healthcare.Conditions of patients are monitored using wireless sensor devices and are then transferred to the server.Kerberos protocol helps in avoiding unnecessary communication of authenticated data over the cloud network.Biometric security process is a procedure with the best security in most of the authentication field.Trust node is responsible in carrying data packets from the sender to the receiver in the cloud network.The Kerberos protocol is used in trust node to ensure security.Secured communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and receiver.The computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.展开更多
DNS over HTTPS(DoH)协议是一种针对域名系统(DNS)的最新改进方案,然而用户可使用第三方DoH服务规避内网原有的监管,所以异常流量检测方法不再适用于检测DoH流量。针对该问题提出了一种DTESI算法。首先,基于信息熵将DoH流量作为异常流...DNS over HTTPS(DoH)协议是一种针对域名系统(DNS)的最新改进方案,然而用户可使用第三方DoH服务规避内网原有的监管,所以异常流量检测方法不再适用于检测DoH流量。针对该问题提出了一种DTESI算法。首先,基于信息熵将DoH流量作为异常流量从全部网络流量中筛选出来;然后,利用DoH服务器与同一客户端建立TLS连接时响应方式总是相同的特性,用指纹识别检测客户端与DoH服务器之间的TLS协商,确定DoH服务器身份;最后,使用Top-K抽样算法选出一定时段内网络中前K台活跃主机着重进行流量检测,使算法能应用于中大型组织的网络。实验结果表明,针对发现的异常流量,DTESI算法检测出的DoH服务提供商准确率超过94%。在此基础上比较了在不同K值下的算法检测时间和对网络中全部DoH流量的检测覆盖率,结果表明合理选择K值可以提升算法的整体效能。展开更多
在分析现有基于(EPC Class 1Gen,2EPCGen2)标准的轻量级RFID相互认证协议的基础上,提出了一种符合EPCGen2标准的基于射频指纹的RFID认证协议。协议融合了RFID设备的物理层信息,实现了RFID标签的跨层融合认证,具有增强RFID系统安全强度...在分析现有基于(EPC Class 1Gen,2EPCGen2)标准的轻量级RFID相互认证协议的基础上,提出了一种符合EPCGen2标准的基于射频指纹的RFID认证协议。协议融合了RFID设备的物理层信息,实现了RFID标签的跨层融合认证,具有增强RFID系统安全强度的特点。分析显示,提出协议具有相互认证、私密性、防止重放攻击、防止去同步攻击等安全性能,尤其能有效对抗RFID标签的克隆攻击。展开更多
With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-a...With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-acter to be copied easily, the software products such as JPEG or GIF images, applications and documents are beingcopied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is tostudy a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied inall kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embedan unique "fingerprint" into each copy of the product sent to the buyer. When finding the illegal copy, the merchantcan trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can pro-tect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the im-portant protocol schemes.展开更多
文摘Cloud computing becomes an important application development platform for processing user data with high security.Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner.Thus,ensuring the security and confidentiality of the data while processing in the centralized network is very difficult.The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network.Intruders are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud network.In this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in M-Healthcare.Conditions of patients are monitored using wireless sensor devices and are then transferred to the server.Kerberos protocol helps in avoiding unnecessary communication of authenticated data over the cloud network.Biometric security process is a procedure with the best security in most of the authentication field.Trust node is responsible in carrying data packets from the sender to the receiver in the cloud network.The Kerberos protocol is used in trust node to ensure security.Secured communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and receiver.The computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.
文摘DNS over HTTPS(DoH)协议是一种针对域名系统(DNS)的最新改进方案,然而用户可使用第三方DoH服务规避内网原有的监管,所以异常流量检测方法不再适用于检测DoH流量。针对该问题提出了一种DTESI算法。首先,基于信息熵将DoH流量作为异常流量从全部网络流量中筛选出来;然后,利用DoH服务器与同一客户端建立TLS连接时响应方式总是相同的特性,用指纹识别检测客户端与DoH服务器之间的TLS协商,确定DoH服务器身份;最后,使用Top-K抽样算法选出一定时段内网络中前K台活跃主机着重进行流量检测,使算法能应用于中大型组织的网络。实验结果表明,针对发现的异常流量,DTESI算法检测出的DoH服务提供商准确率超过94%。在此基础上比较了在不同K值下的算法检测时间和对网络中全部DoH流量的检测覆盖率,结果表明合理选择K值可以提升算法的整体效能。
文摘在分析现有基于(EPC Class 1Gen,2EPCGen2)标准的轻量级RFID相互认证协议的基础上,提出了一种符合EPCGen2标准的基于射频指纹的RFID认证协议。协议融合了RFID设备的物理层信息,实现了RFID标签的跨层融合认证,具有增强RFID系统安全强度的特点。分析显示,提出协议具有相互认证、私密性、防止重放攻击、防止去同步攻击等安全性能,尤其能有效对抗RFID标签的克隆攻击。
文摘With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-acter to be copied easily, the software products such as JPEG or GIF images, applications and documents are beingcopied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is tostudy a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied inall kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embedan unique "fingerprint" into each copy of the product sent to the buyer. When finding the illegal copy, the merchantcan trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can pro-tect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the im-portant protocol schemes.