With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves stor...With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems.展开更多
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w...Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.展开更多
With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research...With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research domains that makes data storage,and processing effective at the network edges.There are several advanced features like parallel processing and data perception are available in edge computing.Still,there are some challenges in providing privacy and data security over networks.To solve the security issues in Edge Computing,Hash-based Message Authentication Code(HMAC)algorithm is used to provide solutions for preserving data from various attacks that happens with the distributed network nature.This paper proposed a Trust Model for Secure Data Sharing(TM-SDS)with HMAC algorithm.Here,data security is ensured with local and global trust levels with the centralized processing of cloud and by conserving resources effectively.Further,the proposed model achieved 84.25%of packet delivery ratio which is better compared to existing models in the resulting phase.The data packets are securely transmitted between entities in the proposed model and results showed that proposed TM-SDS model outperforms the existing models in an efficient manner.展开更多
In the current era of changes unseen in a century,humanity is caught up in a deteriorating security environment on a global scale.By proposing the Global Security Initiative(GSI),China has offered its wisdom and a sol...In the current era of changes unseen in a century,humanity is caught up in a deteriorating security environment on a global scale.By proposing the Global Security Initiative(GSI),China has offered its wisdom and a solution toward building a community of shared security for humanity.After a brief review of the historical evolution of the global security mechanism,the present study analyzes the main ideas and contemporary values making up the GSI.Meanwhile,based on the approaches proposed in and the spirit of the GSI Concept Paper,the authors uncover the dialectical relationship between the GSI,the Global Development Initiative,and the Global Civilization Initiative,which are all included in the Law on Foreign Relations of the People’s Republic of China adopted on June 28,2023.Furthermore,the authors recommend three practical paths toward implementing the GSI:a path toward shortterm goals,a path toward medium-term goals,and a path toward longterm goals.The success of the GSI needs the concerted efforts of all countries.China is not only an active advocate of the GSI but has also been striving to enhance its capability in safeguarding global security,implement the GSI vigorously,and spearhead a new type of global governance.展开更多
Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing capabilities.To address these issues,this paper proposes LRChain,a method bas...Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing capabilities.To address these issues,this paper proposes LRChain,a method based on consortium blockchain,for lifelong learning archives data protection and sharing.LRChain employs a combination of on-chain and off-chain cooperative storage using a consortium chain and inter planetary file system(IPFS)to enhance data security and availability.It also enables fine-grained verification of learning archives through selective disclosure principles,ensuring privacy protection of sensitive data.Furthermore,an attributebased encryption(ABE)algorithm is utilized to establish authorized access control for learning archives,facilitating safe and trusted sharing.Experimental evaluations and security analyses demonstrate that this method exhibits decentralization,strong security,tamper resistance,and performs well,effectively meeting the requirements for secure sharing of learning archive data.展开更多
In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and t...In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and the security of event information is a major concern.The problem of secure sharing of event information without compromising the trusted third party(TTP)and data storage is the main issue in ITS.Blockchain technologies can resolve this problem.A work has been published on blockchain-based protocol for secure sharing of events and authentication of vehicles.This protocol addresses the issue of the safe storing of event information.However,authentication of vehicles solely depends on the cloud server.As a result,their scheme utilizes the notion of partially decentralized architecture.This paper proposes a novel decentralized architecture for the vehicular ad-hoc network(VANET)without the cloud server.This work also presents a protocol for securing event information and vehicle authentication using the blockchain mechanism.In this protocol,the registered user accesses the event information securely from the interplanetary file system(IPFS).We incorporate the IPFS,along with blockchain,to store the information in a fully distributed manner.The proposed protocol is compared with the state-of-the-art.The comparison provides desirable security at a reasonable cost.The evaluation of the proposed smart contract in terms of cost(GAS)is also discussed.展开更多
With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low e...With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low efficiency.In this paper,we construct a secure and efficient data sharing scheme based on threshold Paillier algorithm and blockchain technology,which achieves secure data storage and sharing without a third-party institution.Firstly,we propose a(t,l)threshold Paillier blockchain data sharing scheme,which effectively prevents decryption failures caused by the loss of a single node’s private key.Secondly,we propose a combined on-chain and off-chain data storage scheme,we store the ciphertext on the cloud server and the ciphertext hash value on the blockchain,which not only ensures the integrity of the data but also solves the storage limitation problem on the blockchain.Finally,we use the simulation paradigm to prove the security of the scheme in the semi-honest model.The discussion results of the comparison and the analysis of performance show that the blockchain data security sharing scheme proposed in this paper has lower computational overhead and higher security than other similar schemes.展开更多
Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.Howev...Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security.展开更多
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry...In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography.展开更多
In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme who...In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes.展开更多
A community of shared destiny(whose content is the same as community of shared future, an update translation) is the guiding principle and strategic objective of China's diplomacy, and is just, peaceful, inclusive...A community of shared destiny(whose content is the same as community of shared future, an update translation) is the guiding principle and strategic objective of China's diplomacy, and is just, peaceful, inclusive, comprehensive and scientific. It reflects a rational concept of how a rising China handles relations with the outside world. It rejects analysis and understanding of simple traditional thinking that a strong power is bound to seek hegemony. However, the Chinese diplomacy also needs Chinese thinking and perspectives. With analysis eclecticism and incorporated process constructivism to carry out study on the international relations, it can be found that the community of shared destiny is an economic, political and security order, is also a concept order; while a community of shared interests is its foundation, a community of shared security is its guarantee, the common knowledge composes its highest standard. Common security is the important guarantee and strategic goal for the community of shared destiny, i.e. it shows that the peaceful development strategy highlights the reasonable security demands of others China respects; win-win cooperation principle reflects the importance of cooperative security in the international pattern of deepening interdependence; partnership strategy shows diplomatic efforts of Chinese exploration and practice of the new security concept beyond "security alliance".展开更多
Chinese investors seek opportunities in Europe At present,Chinese investment in Europe is entering a period of rapid growth.China and the European Union(EU)are discussing how to dock their strategic economic develop...Chinese investors seek opportunities in Europe At present,Chinese investment in Europe is entering a period of rapid growth.China and the European Union(EU)are discussing how to dock their strategic economic development and investment plans together,Shen Danyang,spokesperson of China’s Ministry of Commerce,said at a press briefing in Beijing on July 7.展开更多
文摘With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems.
文摘Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.
文摘With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research domains that makes data storage,and processing effective at the network edges.There are several advanced features like parallel processing and data perception are available in edge computing.Still,there are some challenges in providing privacy and data security over networks.To solve the security issues in Edge Computing,Hash-based Message Authentication Code(HMAC)algorithm is used to provide solutions for preserving data from various attacks that happens with the distributed network nature.This paper proposed a Trust Model for Secure Data Sharing(TM-SDS)with HMAC algorithm.Here,data security is ensured with local and global trust levels with the centralized processing of cloud and by conserving resources effectively.Further,the proposed model achieved 84.25%of packet delivery ratio which is better compared to existing models in the resulting phase.The data packets are securely transmitted between entities in the proposed model and results showed that proposed TM-SDS model outperforms the existing models in an efficient manner.
文摘In the current era of changes unseen in a century,humanity is caught up in a deteriorating security environment on a global scale.By proposing the Global Security Initiative(GSI),China has offered its wisdom and a solution toward building a community of shared security for humanity.After a brief review of the historical evolution of the global security mechanism,the present study analyzes the main ideas and contemporary values making up the GSI.Meanwhile,based on the approaches proposed in and the spirit of the GSI Concept Paper,the authors uncover the dialectical relationship between the GSI,the Global Development Initiative,and the Global Civilization Initiative,which are all included in the Law on Foreign Relations of the People’s Republic of China adopted on June 28,2023.Furthermore,the authors recommend three practical paths toward implementing the GSI:a path toward shortterm goals,a path toward medium-term goals,and a path toward longterm goals.The success of the GSI needs the concerted efforts of all countries.China is not only an active advocate of the GSI but has also been striving to enhance its capability in safeguarding global security,implement the GSI vigorously,and spearhead a new type of global governance.
基金Beijing Natural Science Foundation(M21037)2022 Industrial Internet Public Service Platform-Industrial Internet Oriented Virtual Currency Mining Governance Public Service Platform Project by the Ministry of Industry and Information Technology of PRC(TC220H054)Major Research and Application Project for the Supervision Platform of Virtual Currency Mining Behavior by the Ministry of Education of PRC,the 111 Project(B21049).
文摘Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing capabilities.To address these issues,this paper proposes LRChain,a method based on consortium blockchain,for lifelong learning archives data protection and sharing.LRChain employs a combination of on-chain and off-chain cooperative storage using a consortium chain and inter planetary file system(IPFS)to enhance data security and availability.It also enables fine-grained verification of learning archives through selective disclosure principles,ensuring privacy protection of sensitive data.Furthermore,an attributebased encryption(ABE)algorithm is utilized to establish authorized access control for learning archives,facilitating safe and trusted sharing.Experimental evaluations and security analyses demonstrate that this method exhibits decentralization,strong security,tamper resistance,and performs well,effectively meeting the requirements for secure sharing of learning archive data.
文摘In recent decades,intelligent transportation systems(ITS)have improved drivers’safety and have shared information(such as traffic congestion and accidents)in a very efficient way.However,the privacy of vehicles and the security of event information is a major concern.The problem of secure sharing of event information without compromising the trusted third party(TTP)and data storage is the main issue in ITS.Blockchain technologies can resolve this problem.A work has been published on blockchain-based protocol for secure sharing of events and authentication of vehicles.This protocol addresses the issue of the safe storing of event information.However,authentication of vehicles solely depends on the cloud server.As a result,their scheme utilizes the notion of partially decentralized architecture.This paper proposes a novel decentralized architecture for the vehicular ad-hoc network(VANET)without the cloud server.This work also presents a protocol for securing event information and vehicle authentication using the blockchain mechanism.In this protocol,the registered user accesses the event information securely from the interplanetary file system(IPFS).We incorporate the IPFS,along with blockchain,to store the information in a fully distributed manner.The proposed protocol is compared with the state-of-the-art.The comparison provides desirable security at a reasonable cost.The evaluation of the proposed smart contract in terms of cost(GAS)is also discussed.
基金supported by the Defense Industrial Technology Development Program(JCKY2021208B036).
文摘With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low efficiency.In this paper,we construct a secure and efficient data sharing scheme based on threshold Paillier algorithm and blockchain technology,which achieves secure data storage and sharing without a third-party institution.Firstly,we propose a(t,l)threshold Paillier blockchain data sharing scheme,which effectively prevents decryption failures caused by the loss of a single node’s private key.Secondly,we propose a combined on-chain and off-chain data storage scheme,we store the ciphertext on the cloud server and the ciphertext hash value on the blockchain,which not only ensures the integrity of the data but also solves the storage limitation problem on the blockchain.Finally,we use the simulation paradigm to prove the security of the scheme in the semi-honest model.The discussion results of the comparison and the analysis of performance show that the blockchain data security sharing scheme proposed in this paper has lower computational overhead and higher security than other similar schemes.
基金supported by the National Natural Science Foundation of China (Nos. 61173170, 61300222, 61433006, and U1401258)Independent Innovation Fund of Huazhong University of Science and Technology (Nos. 2012TS052, 2012TS053, 2013QN120, and CXY13Q019)
文摘Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security.
基金the National Natural Science Foundation of China(No.61133014)
文摘In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography.
基金supported by the National Natural Science Foundation of China(Grant Nos.61272057,61572081 and 61502200)Beijing Higher Education Young Elite Teacher Project(Grant Nos.YETP0475and YETP0477)+2 种基金the Natural Science Foundation of Guangdong Province(Grant No.2014A030310245)the Fundamental Research Funds for the Central Universities(Grant No.21615313)the Youth Foundation of Heilongjiang University from January,2016
文摘In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes.
文摘A community of shared destiny(whose content is the same as community of shared future, an update translation) is the guiding principle and strategic objective of China's diplomacy, and is just, peaceful, inclusive, comprehensive and scientific. It reflects a rational concept of how a rising China handles relations with the outside world. It rejects analysis and understanding of simple traditional thinking that a strong power is bound to seek hegemony. However, the Chinese diplomacy also needs Chinese thinking and perspectives. With analysis eclecticism and incorporated process constructivism to carry out study on the international relations, it can be found that the community of shared destiny is an economic, political and security order, is also a concept order; while a community of shared interests is its foundation, a community of shared security is its guarantee, the common knowledge composes its highest standard. Common security is the important guarantee and strategic goal for the community of shared destiny, i.e. it shows that the peaceful development strategy highlights the reasonable security demands of others China respects; win-win cooperation principle reflects the importance of cooperative security in the international pattern of deepening interdependence; partnership strategy shows diplomatic efforts of Chinese exploration and practice of the new security concept beyond "security alliance".
文摘Chinese investors seek opportunities in Europe At present,Chinese investment in Europe is entering a period of rapid growth.China and the European Union(EU)are discussing how to dock their strategic economic development and investment plans together,Shen Danyang,spokesperson of China’s Ministry of Commerce,said at a press briefing in Beijing on July 7.