Cloud computing.based heterogeneous networks(C.Het Nets) have been considered as promising network architecture of future wireless communication systems. However, its performance is constrained by the capability of fr...Cloud computing.based heterogeneous networks(C.Het Nets) have been considered as promising network architecture of future wireless communication systems. However, its performance is constrained by the capability of fronthaul. To study the performance limit of C.Het Nets, the coverage performance of the open access strategy in C.Het Nets is analyzed in this paper. In particular, the non.ideal condition of fronthaul in C.Het Nets is characterized by establishing a stochastic geometry.based model, and a tight lower bound on coverage probability is derived for downlink transmissions. Based on the derived results, the constraint of the fronthaul is given to ensure that open access strategy can achieve the best coverage performance. Finally, the simulation results are provided to verify the theoretical results and show the impact of fronthaul constrains.展开更多
Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In t...Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In this paper,we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server.To solve the problem of keyword privacy,we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers.System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem.We validate our scheme through theoretical security analysis and experimental verification.Experiments are conducted on a real dataset,and results show that the scheme has higher security and retrieval efficiency than previous methods.展开更多
基金supported in part by the National Natural Science Foundation of China (Grant 61501045)in part by State Major Science and Technology Special Projects (Grant 2016ZX03001017-004)
文摘Cloud computing.based heterogeneous networks(C.Het Nets) have been considered as promising network architecture of future wireless communication systems. However, its performance is constrained by the capability of fronthaul. To study the performance limit of C.Het Nets, the coverage performance of the open access strategy in C.Het Nets is analyzed in this paper. In particular, the non.ideal condition of fronthaul in C.Het Nets is characterized by establishing a stochastic geometry.based model, and a tight lower bound on coverage probability is derived for downlink transmissions. Based on the derived results, the constraint of the fronthaul is given to ensure that open access strategy can achieve the best coverage performance. Finally, the simulation results are provided to verify the theoretical results and show the impact of fronthaul constrains.
文摘Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In this paper,we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server.To solve the problem of keyword privacy,we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers.System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem.We validate our scheme through theoretical security analysis and experimental verification.Experiments are conducted on a real dataset,and results show that the scheme has higher security and retrieval efficiency than previous methods.