As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ...As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.展开更多
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo...It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.展开更多
Drift marked China-Japan ties in most part of the 1990s, accompanied with wild swings. The last decade of the 20th century witnessed the commemoration of the 20th anniversary(1972-1992)of diplomatic normalization, the...Drift marked China-Japan ties in most part of the 1990s, accompanied with wild swings. The last decade of the 20th century witnessed the commemoration of the 20th anniversary(1972-1992)of diplomatic normalization, the 50th anniversary(1945-1995)of the victory of the War of Resistance Against Japanese Aggression, the furor over the "No War decision" in Japan, and the shock waves from the reorientation of Japan-U. S. relationship in 1996 and the revision of the展开更多
China and the United States are considered to be the most important bilateral relations in the world, and they are also the most complex one in the world. Competition, prevention and cooperation, mutual trust and mutu...China and the United States are considered to be the most important bilateral relations in the world, and they are also the most complex one in the world. Competition, prevention and cooperation, mutual trust and mutual mapping out a different side is the current state of Sino-US relations. How to protect the mechanism of the accident but not an accident drag? How to ensure that both China and the United States have a minimum of judgment of each other's major military strategic intentions and the direction of a major national strategy? Sino-US relations and mutual trust will not lead to hostile nations. When faced with inevitable differences and competition, how can China and the United States establish an effective mutual trust to avoid conflict?展开更多
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony...In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme.展开更多
It gives me great honor to participate in the Thematic Forum on People-to-People Connectivity of Belt and Road Forum for International Cooperation today.Bringing friendship,we are all here in this room to discuss coop...It gives me great honor to participate in the Thematic Forum on People-to-People Connectivity of Belt and Road Forum for International Cooperation today.Bringing friendship,we are all here in this room to discuss cooperation.Friendship and cooperation must be based on mutual trust and understanding.Without mutual trust,there cannot be true friendship and cooperation.The occasion of every international conference is an opportunity to strengthen cooperation.Let us find common ground and work together to contribute to the building of an even better world.Meanwhile,we are also actively solving problems we all faced in a friendly manner.展开更多
基金ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
文摘As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
基金supported by National Natural Science Foundation of China (No.60873231)Research Fund for the Doctoral Program of Higher Education (No.20093223120001)+2 种基金Science and Technology Support Program of Jiangsu Province (No.BE2009158)Natural Science Fund of Higher Education of Jiangsu Province(No.09KJB520010)Special Fund for Fast Sharing of Science Paper in Net Era by CSTD (No.2009117)
文摘It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
文摘Drift marked China-Japan ties in most part of the 1990s, accompanied with wild swings. The last decade of the 20th century witnessed the commemoration of the 20th anniversary(1972-1992)of diplomatic normalization, the 50th anniversary(1945-1995)of the victory of the War of Resistance Against Japanese Aggression, the furor over the "No War decision" in Japan, and the shock waves from the reorientation of Japan-U. S. relationship in 1996 and the revision of the
文摘China and the United States are considered to be the most important bilateral relations in the world, and they are also the most complex one in the world. Competition, prevention and cooperation, mutual trust and mutual mapping out a different side is the current state of Sino-US relations. How to protect the mechanism of the accident but not an accident drag? How to ensure that both China and the United States have a minimum of judgment of each other's major military strategic intentions and the direction of a major national strategy? Sino-US relations and mutual trust will not lead to hostile nations. When faced with inevitable differences and competition, how can China and the United States establish an effective mutual trust to avoid conflict?
基金supported in part by the European Commission Marie Curie IRSES project "AdvIOT"the National Natural Science Foundation of China (NSFC) under grant No.61372103
文摘In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme.
文摘It gives me great honor to participate in the Thematic Forum on People-to-People Connectivity of Belt and Road Forum for International Cooperation today.Bringing friendship,we are all here in this room to discuss cooperation.Friendship and cooperation must be based on mutual trust and understanding.Without mutual trust,there cannot be true friendship and cooperation.The occasion of every international conference is an opportunity to strengthen cooperation.Let us find common ground and work together to contribute to the building of an even better world.Meanwhile,we are also actively solving problems we all faced in a friendly manner.