A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil...A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.展开更多
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple...Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when requested.We refer to a model that satisfies all of the conditions a 3-multi ranked search model.However,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation center.That is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real life.In this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security assumptions.The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same keyword.Moreover,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different key.Our evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life.展开更多
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W...In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.展开更多
With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physi...With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks.展开更多
On February 1st, the US House of Representatives openly passed the so-calledTaiwan Security Enhancement Act" (TSEA), in disregard of the Chinesegovernment’s firm opposition and solemn representation, the overall...On February 1st, the US House of Representatives openly passed the so-calledTaiwan Security Enhancement Act" (TSEA), in disregard of the Chinesegovernment’s firm opposition and solemn representation, the overall situation ofUS-China relations and the accepted criterion of international relations. It not onlycrudely infringes China’s sovereignty but also tremendously undermines the recov-ering relations between the US and China. The Chinese government has shown itsstrong indignation and objection to it.展开更多
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by...In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result.展开更多
In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of compute...In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful.展开更多
Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilizati...Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilization of heterogeneous resources and anti-eavesdropping.However,edge-end collaboration-based multi-mode PIoT faces challenges of mutual contradiction in communication and security quality of service(QoS)guarantee,inadaptability of resource management,and multi-mode access conflict.We propose an Adaptive learning based delAysensitive and seCure Edge-End Collaboration algorithm(ACE_(2))to optimize multi-mode channel selection and split device power into artificial noise(AN)transmission and data transmission for secure data delivery.ACE_(2) can achieve multi-attribute QoS guarantee,adaptive resource management and security enhancement,and access conflict elimination with the combined power of deep actor-critic(DAC),“win or learn fast(WoLF)”mechanism,and edge-end collaboration.Simulations demonstrate its superior performance in queuing delay,energy consumption,secrecy capacity,and adaptability to differentiated low-carbon services.展开更多
Focused on the challenges raised by the largescale integration of renewable energy resources and the urgent goal of energy saving,a novel control scheme for the unified power flow controller(UPFC)series converter is p...Focused on the challenges raised by the largescale integration of renewable energy resources and the urgent goal of energy saving,a novel control scheme for the unified power flow controller(UPFC)series converter is proposed to achieve line loss reduction and security enhancement in distribution systems with a high penetration of renewable energy.Firstly,the line loss minimum conditions of a general distribution system with loop configurations are deduced.Secondly,security constraints including the permissible voltage range,the line loading limits and the UPFC ratings are considered.System security enhancement with the least increase in line loss is tackled by solving a much reduced optimal power flow(OPF)problem.The computational task of the OPF problem is reduced by deducing the security-constrained line loss minimum conditions and removing the equality constraints.Thirdly,a hybrid control scheme is proposed.Line loss minimization is achieved through a dynamic controller,while an OPF calculator is integrated to generate corrective action for the dynamic controller when the security constraints are violated.The validity of the proposed control strategies is verified in a modified IEEE 33 bus test system.展开更多
This paper proposes a security enhancement scheme for disaster tolerant systems based on trusted computing technology which combines with the idea of distributed threshold storage. This scheme takes advantage of a tru...This paper proposes a security enhancement scheme for disaster tolerant systems based on trusted computing technology which combines with the idea of distributed threshold storage. This scheme takes advantage of a trusted computing platform with a trusted computing module, which has excellent features such as security storage, remote attestation, and so on. These features effectively ensure trustworthiness of the disaster tolerant point. Furthermore, distributed storage based on Erasure code not only disposes the storage problem about a great deal of data, but also preferably avoids one node invalidation, alleviates network load and deals with joint cheat and many other security problems. Consequently, those security enhancement technologies provide mass data with global security protection during the course of disaster tolerance.展开更多
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi...We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.展开更多
文摘A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
基金supported by the MSIT(Ministry of Science,ICT),Korea,under the High-Potential Individuals Global Training Program)(2021-0-01547-001)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation)the National Research Foundation of Korea(NRF)grant funded by the Ministry of Science and ICT(NRF-2022R1A2C2007255).
文摘Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when requested.We refer to a model that satisfies all of the conditions a 3-multi ranked search model.However,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation center.That is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real life.In this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security assumptions.The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same keyword.Moreover,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different key.Our evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life.
文摘In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
基金supported in part by the National Natural Science Foundation of China under grant No.62072412,No.61902359,No.61702148No.61672468 part by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under grant AGK2018001.
文摘With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks.
文摘On February 1st, the US House of Representatives openly passed the so-calledTaiwan Security Enhancement Act" (TSEA), in disregard of the Chinesegovernment’s firm opposition and solemn representation, the overall situation ofUS-China relations and the accepted criterion of international relations. It not onlycrudely infringes China’s sovereignty but also tremendously undermines the recov-ering relations between the US and China. The Chinese government has shown itsstrong indignation and objection to it.
文摘In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result.
文摘In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful.
基金supported by the Science and Technology Project of State Grid Corporation of China under Grant Number 52094021N010 (5400202199534A-0-5-ZN)
文摘Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilization of heterogeneous resources and anti-eavesdropping.However,edge-end collaboration-based multi-mode PIoT faces challenges of mutual contradiction in communication and security quality of service(QoS)guarantee,inadaptability of resource management,and multi-mode access conflict.We propose an Adaptive learning based delAysensitive and seCure Edge-End Collaboration algorithm(ACE_(2))to optimize multi-mode channel selection and split device power into artificial noise(AN)transmission and data transmission for secure data delivery.ACE_(2) can achieve multi-attribute QoS guarantee,adaptive resource management and security enhancement,and access conflict elimination with the combined power of deep actor-critic(DAC),“win or learn fast(WoLF)”mechanism,and edge-end collaboration.Simulations demonstrate its superior performance in queuing delay,energy consumption,secrecy capacity,and adaptability to differentiated low-carbon services.
文摘Focused on the challenges raised by the largescale integration of renewable energy resources and the urgent goal of energy saving,a novel control scheme for the unified power flow controller(UPFC)series converter is proposed to achieve line loss reduction and security enhancement in distribution systems with a high penetration of renewable energy.Firstly,the line loss minimum conditions of a general distribution system with loop configurations are deduced.Secondly,security constraints including the permissible voltage range,the line loading limits and the UPFC ratings are considered.System security enhancement with the least increase in line loss is tackled by solving a much reduced optimal power flow(OPF)problem.The computational task of the OPF problem is reduced by deducing the security-constrained line loss minimum conditions and removing the equality constraints.Thirdly,a hybrid control scheme is proposed.Line loss minimization is achieved through a dynamic controller,while an OPF calculator is integrated to generate corrective action for the dynamic controller when the security constraints are violated.The validity of the proposed control strategies is verified in a modified IEEE 33 bus test system.
基金Supported by the National High Technology Research and Development Program of China (863 Program) (2008AA01Z404)the Science and Technical Key Project of Ministry of Education (108087)the Scientific and Technological Project of Wuhan City (200810321130)
文摘This paper proposes a security enhancement scheme for disaster tolerant systems based on trusted computing technology which combines with the idea of distributed threshold storage. This scheme takes advantage of a trusted computing platform with a trusted computing module, which has excellent features such as security storage, remote attestation, and so on. These features effectively ensure trustworthiness of the disaster tolerant point. Furthermore, distributed storage based on Erasure code not only disposes the storage problem about a great deal of data, but also preferably avoids one node invalidation, alleviates network load and deals with joint cheat and many other security problems. Consequently, those security enhancement technologies provide mass data with global security protection during the course of disaster tolerance.
基金supported in part by the Basic Science Research Program through the National Research Foundation of Korea Funded by the Ministry of Science,ICT & Future Planning(No.2011-0030079)the Ministry of Education(No.NRF-2013R1A1A2057549)
文摘We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.