期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS 被引量:1
1
作者 Yao Lin Kong Xiangwei +2 位作者 Wu Guowei Fan Qingna Lin Chi 《Journal of Electronics(China)》 2010年第1期68-78,共11页
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ... In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic. 展开更多
关键词 PRIVACY SECURITY Biometric encryption Pervasive computing environments(PCEs)
下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
2
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 Cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
下载PDF
A virtual machine-based invasion detection system for the virtual computing environment
3
作者 曾宇 Wang Jie +2 位作者 Sun Ninghui Li Jun Nie Hua 《High Technology Letters》 EI CAS 2006年第4期379-384,共6页
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain. 展开更多
关键词 virtual computing environment oriented virtual machine-based invasion detection system (VIDS) capacity services computing
下载PDF
Internet-based virtual computing environment(iVCE):Concepts and architecture 被引量:33
4
作者 LU Xicheng WANG Huaimin WANG Ji 《Science in China(Series F)》 2006年第6期681-701,共21页
Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper p... Resources over Internet have such intrinsic characteristics as growth, autonomy and diversity, which have brought many challenges to the efficient sharing and comprehensive utilization of these resources. This paper presents a novel approach for the construction of the Internet-based Virtual Computing Environment (iVCE), whose sig- nificant mechanisms are on-demand aggregation and autonomic collaboration. The iVCE is built on the open infrastructure of the Internet and provides harmonious, transparent and integrated services for end-users and applications. The concept of iVCE is presented and its architectural framework is described by introducing three core concepts, i.e., autonomic element, virtual commonwealth and virtual executor. Then the connotations, functions and related key technologies of each components of the architecture are deeply analyzed with a case study, iVCE for Memory. 展开更多
关键词 RESOURCE AGGREGATION COLLABORATION virtual computing environment INTERNET
原文传递
Network simulation task partition method in heterogeneous computing environment 被引量:1
5
作者 Xiaofeng Wang Wei Zhu Yueming Dai 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2014年第3期136-152,共17页
To reduce the running time of network simulation in heterogeneous computing environment,a network simulation task partition method,named LBPHCE,is put forward.In this method,the network simulation task is partitioned ... To reduce the running time of network simulation in heterogeneous computing environment,a network simulation task partition method,named LBPHCE,is put forward.In this method,the network simulation task is partitioned in comprehensive consideration of the load balance of both routing computing simulation and packet forwarding simulation.First,through benchmark experiments,the computation ability and routing simulation ability of each simulation machine are measured in the heterogeneous computing environment.Second,based on the computation ability of each simulation machine,the network simulation task is initially partitioned to meet the load balance of packet forwarding simulation in the heterogeneous computing environment,and then according to the routing computation ability,the scale of each partition is fine-tuned to satisfy the balance of the routing computing simulation,meanwhile the load balance of packet forwarding simulation is guaranteed.Experiments based on PDNS indicate that,compared to traditional uniform partition method,the LBPHCE method can reduce the total simulation running time by 26.3%in average,and compared to the liner partition method,it can reduce the running time by 18.3%in average. 展开更多
关键词 Networks simulation distributed simulation heterogeneous computing environments task partition
原文传递
Automatic Rule Discovery for Data Transformation Using Fusion of Diversified Feature Formats
6
作者 G.Sunil Santhosh Kumar M.Rudra Kumar 《Computers, Materials & Continua》 SCIE EI 2024年第7期695-713,共19页
This article presents an innovative approach to automatic rule discovery for data transformation tasks leveraging XGBoost,a machine learning algorithm renowned for its efficiency and performance.The framework proposed... This article presents an innovative approach to automatic rule discovery for data transformation tasks leveraging XGBoost,a machine learning algorithm renowned for its efficiency and performance.The framework proposed herein utilizes the fusion of diversified feature formats,specifically,metadata,textual,and pattern features.The goal is to enhance the system’s ability to discern and generalize transformation rules fromsource to destination formats in varied contexts.Firstly,the article delves into the methodology for extracting these distinct features from raw data and the pre-processing steps undertaken to prepare the data for the model.Subsequent sections expound on the mechanism of feature optimization using Recursive Feature Elimination(RFE)with linear regression,aiming to retain the most contributive features and eliminate redundant or less significant ones.The core of the research revolves around the deployment of the XGBoostmodel for training,using the prepared and optimized feature sets.The article presents a detailed overview of the mathematical model and algorithmic steps behind this procedure.Finally,the process of rule discovery(prediction phase)by the trained XGBoost model is explained,underscoring its role in real-time,automated data transformations.By employingmachine learning and particularly,the XGBoost model in the context of Business Rule Engine(BRE)data transformation,the article underscores a paradigm shift towardsmore scalable,efficient,and less human-dependent data transformation systems.This research opens doors for further exploration into automated rule discovery systems and their applications in various sectors. 展开更多
关键词 XGBoost business rule engine machine learning categorical query language humanitarian computing environment
下载PDF
Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective
7
作者 Mwaffaq Abu-Alhaija Nidal M.Turab AbdelRahman Hamza 《Computer Systems Science & Engineering》 SCIE EI 2022年第4期225-240,共16页
Infrastructure as a Service(IaaS)provides logical separation between data,network,applications and machines from the physical constrains of real machines.IaaS is one of the basis of cloud virtualization.Recently,secur... Infrastructure as a Service(IaaS)provides logical separation between data,network,applications and machines from the physical constrains of real machines.IaaS is one of the basis of cloud virtualization.Recently,security issues are also gradually emerging with virtualization of cloud computing.Different security aspects of cloud virtualization will be explored in this research paper,security recognizing potential threats or attacks that exploit these vulnerabilities,and what security measures are used to alleviate such threats.In addition,a dis-cussion of general security requirements and the existing security schemes is also provided.As shown in this paper,different components of virtualization environ-ment are targets to various attacks that in turn leads to security issues compromis-ing the whole cloud infrastructure.In this paper an overview of various cloud security aspects is also provided.Different attack scenarios of virtualization envir-onments and security solutions to cater these attacks have been discussed in the paper.We then proceed to discuss API security concerns,data security,hijacking of user account and other security concerns.The aforementioned discussions can be used in the future to propose assessment criteria,which could be useful in ana-lyzing the efficiency of security solutions of virtualization environment in the face of various virtual environment attacks. 展开更多
关键词 Cloud computing environment paravirtualization full virtualization cloud virtualization security HYPERVISOR virtual machines
下载PDF
A Heuristic Algorithm to Solve the Task Partition Problem in MDOCEM
8
作者 He Yan-xiang Chen Xin-mong +1 位作者 Donald H. Cooley Zhang Jian-ping 《Wuhan University Journal of Natural Sciences》 CAS 1999年第2期27-30,共4页
This paper examines task partition problem in a Multiagent based Distributed Open Computing Environment Model(MDOCEM). We first present a formal method to describe the task partition problem, then give a heuristic al... This paper examines task partition problem in a Multiagent based Distributed Open Computing Environment Model(MDOCEM). We first present a formal method to describe the task partition problem, then give a heuristic algorithm to solve the task partition problem that gives an approximate optimum solution. 展开更多
关键词 distributed open computing environment task partition planning management operation set
下载PDF
Selection of Trusted Service Providers by Enforcing Bayesian Analysis in iVCE
9
作者 顾宝军 李晓勇 汪为农 《Journal of Donghua University(English Edition)》 EI CAS 2008年第1期30-36,共7页
The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilit... The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilitate sharing and collaborating of network resources between applications. Trust management is an elementary component for iVCE. The uncertain and dynamic characteristics of iVCE necessitate the requirement for the trust management to be subjective, historical evidence based and context dependent. This paper presents a Bayesian analysis-based trust model, which aims to secure the active agents for selecting appropriate trusted services in iVCE. Simulations are made to analyze the properties of the trust model which show that the subjective prior information influences trust evaluation a lot and the model stimulates positive interactions. 展开更多
关键词 internet-based virtual computing environment trust management Bayesian analysis
下载PDF
Evolutionary Prisoner's Dilemma Game Based on Division of Work 被引量:2
10
作者 李志华 汪秉宏 +1 位作者 刘润然 杨涵新 《Chinese Physics Letters》 SCIE CAS CSCD 2009年第10期212-215,共4页
We propose a new two-type-player prisoner's dilemma game based on the division of work on a square lattice, in which a fraction of the population μ are assigned type A and the rest B. In a one-shot two-player game, ... We propose a new two-type-player prisoner's dilemma game based on the division of work on a square lattice, in which a fraction of the population μ are assigned type A and the rest B. In a one-shot two-player game, we let both of their original payoffs be scaled by a same multiplicative factor α 〉 1, if two neighboring players are of different types; however we leave the payoffs unchanged if they are of the same type. Then we show that combined with the two-type setup, the square lattice can assist to induce different social ranks according to players' abilities to collect payoffs. Simulation results show that the density of cooperation is significantly promoted for a wide range of the temptation to defection parameters and that there are optimal values for both α and μ leading to the maximal cooperation level. We reach these results by analyzing the distribution of the players in the social ranks and we also show some typical snapshots of the system. 展开更多
关键词 Computational physics environmental and Earth science
下载PDF
Robustness of Cooperation on Highly Clustered Scale-Free Networks
11
作者 丛睿 仇原鹰 +1 位作者 陈小杰 王龙 《Chinese Physics Letters》 SCIE CAS CSCD 2010年第3期9-12,共4页
We study the effect of mutation on the evolutionary prisoner's dilemma in highly clustered scale-free networks. It is found that cooperation is more sensitive and vulnerable to strategy mutation in more highly cluste... We study the effect of mutation on the evolutionary prisoner's dilemma in highly clustered scale-free networks. It is found that cooperation is more sensitive and vulnerable to strategy mutation in more highly clustered networks. For small mutation rates, high clustering coefficient promotes cooperation. For medium mutation rates, high clustering coefficient inhibits the emergence of cooperation. For large mutation rates, cooperation is insensitive to clustering property. We provide explanations for the effects of clustering on cooperation with varied mutation rates. 展开更多
关键词 Computational physics environmental and Earth science
下载PDF
Prisoner's Dilemma on Co-Evolving Networks without Strategy Update
12
作者 代琼琳 杨俊忠 《Chinese Physics Letters》 SCIE CAS CSCD 2010年第4期1-4,共4页
We investigate the game theory in a structured population with the assumption that the evolution of network structure is far faster than that of strategy update. We find that the degree distribution for the finM netwo... We investigate the game theory in a structured population with the assumption that the evolution of network structure is far faster than that of strategy update. We find that the degree distribution for the finM network consists of two distinct parts: the low degree part which is contributed to by defectors and a broadband in the regime with high degree which is formed by cooperators. The structure of the final network and the final strategy pattern have also been numerically proved to be independent of the game parameters. 展开更多
关键词 Computational physics environmental and Earth science Statistical physics and nonlinear systems
下载PDF
Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server 被引量:4
13
作者 王智弘 涂泰源 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期440-442,共3页
The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is diffi... The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage. The keyword search encryption is a helpful mechanism that provides a searchable ciphertext for some predefined keywords. The previous studies failed to consider the attack from the data storage server to guess the keyword. This kind of attack may cause some critical information revealed to the untrusted server. This paper proposes a new keyword search encryption model that can effectively resist the keyword-guessing attack performed by the untrusted data storage(testing) server. The testing(query)secret is divided into multiple shares so that the security can be guaranteed if the servers cannot conspire with each other to retrieve all shares of the secret. 展开更多
关键词 keyword search encryption keyword-guessing attack cloud computing environment information security
原文传递
VirtMan:design and implementation of a fast booting system for homogeneous virtual machines in iVCE
14
作者 Zi-yang LI Yi-ming ZHANG +2 位作者 Dong-sheng LI Peng-fei ZHANG Xi-cheng LU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第2期110-121,共12页
Internet-based virtual computing environment (iVCE) has been proposed to combine data centers and other kinds of computing resources on the Internet to provide efficient and economical services. Virtual machines (... Internet-based virtual computing environment (iVCE) has been proposed to combine data centers and other kinds of computing resources on the Internet to provide efficient and economical services. Virtual machines (VMs) have been widely used in iVCE to isolate different users/jobs and ensure trustworthiness, but traditionally VMs require a long period of time for booting, which cannot meet the requirement of iVCE's large-scale and highly dynamic applications. To address this problem, in this paper we design and implement VirtMan, a fast booting system for a large number of virtual machines in iVCE. VirtMan uses the Linux Small Computer System Interface (SCSI) target to remotely mount to the source image in a scalable hierarchy, and leverages the homogeneity of a set of VMs to transfer only necessary image data at runtime. We have implemented VirtMan both as a standalone system and for OpenStack. In our 100-server testbed, VirtMan boots up 1000 VMs (with a 15 CB image of Windows Server 2008) on 100 physical servers in less than 120 s, which is three orders of magnitude lower than current public clouds. 展开更多
关键词 Virtual machine Fast booting HOMOGENEITY Internet-based virtual computing environment (iVCE)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部