In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose...In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average.展开更多
Controlling the growth of bacterial biofilms in a specific pattern greatly enhances the study of cell-to-cell interactions and paves the way for expanding their biolog-ical applications.However,the development of simple...Controlling the growth of bacterial biofilms in a specific pattern greatly enhances the study of cell-to-cell interactions and paves the way for expanding their biolog-ical applications.However,the development of simple,cost-effective,and highly resolved biopatterning approaches remains a persistent challenge.Herein,a pio-neering photodynamic biopatterning technique for the creation of living bacterial biofilms with customized geometries at high resolutions is presented.First of all,an outstanding aggregation-induced emission photosensitizer is synthesized to enable efficient photodynamic bacterial killing at a low concentration.By combining with custom-designed photomasks featuring both opaque and transparent patterns,the viability of photosensitizer-coated bacteria is successfully manipulated by control-ling the degree of light transmittance.This process leads to the formation of living bacterial biofilms with specific patterns replicated from the photomask.Such an innovative strategy can be employed to generate living bacterial biofilms composed of either mono-or multispecies,with a spatial resolution of approximately 24µm.Furthermore,its potential applications in information storage/encryption and antibi-otic screening are explored.This study provides an alternative way to understand and investigate the intricate interactions among bacteria within 3D biofilms,hold-ing great promise in the controlled fabrication of dynamic biological systems for advanced applications.展开更多
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ...The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).展开更多
Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed...Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed of chiral dialkyl glutamides and achiral vibration-induced emission(VIE)moiety,which can switch on CPL after a simple gelation process.It is noteworthy that the CPL colors vary in different solvents,and this is attributed to various self-assembly-induced microstructures,in which the VIE moiety is restrained to different degrees.Accordingly,a multidimensional code system composed of a quick response code,a ultraviolet(UV)light-activated color code,and a CPL information figure was constructed.To our satisfaction,the system possesses multiple information-storage functions.The orthogonal anticounterfeiting and CPLenhanced encryption functions also improve the system information encryption ability.In brief,this study provides a practical example of CPL applied to information security and an effective approach to obtain a single-component color-tunable CPL material with multiple information storage and encryption functions as well.展开更多
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. I...With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP(Ali Pay) on mobile device. Therefore, only encryption cannot protect sensitive APP and privacy data stored on user's smartphone. To address these obstacles, we design a protection system called Mobi Gemini. It enables automatic uninstalling service that can immediately uninstall multiple APP at same time, and also enabling plausibly deniable encryption(PDE) on mobile devices by hiding encrypted volume within random data in free space of cache partition. We improve the key store way of previous PDE schemes on mobile device. The evaluation results show that the scheme introduces a few overhead compared with original android system enabling full disk encryption.展开更多
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server i...Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme.展开更多
文摘In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average.
基金National Natural Science Foundation of China,Grant/Award Numbers:92163126,52293380,52293383Beijing National Laboratory for Molecular Sciences,Grant/Award Number:BNLMS202308Fundamental Research Funds for the Central Universities,Grant/Award Numbers:63223030,63223017。
文摘Controlling the growth of bacterial biofilms in a specific pattern greatly enhances the study of cell-to-cell interactions and paves the way for expanding their biolog-ical applications.However,the development of simple,cost-effective,and highly resolved biopatterning approaches remains a persistent challenge.Herein,a pio-neering photodynamic biopatterning technique for the creation of living bacterial biofilms with customized geometries at high resolutions is presented.First of all,an outstanding aggregation-induced emission photosensitizer is synthesized to enable efficient photodynamic bacterial killing at a low concentration.By combining with custom-designed photomasks featuring both opaque and transparent patterns,the viability of photosensitizer-coated bacteria is successfully manipulated by control-ling the degree of light transmittance.This process leads to the formation of living bacterial biofilms with specific patterns replicated from the photomask.Such an innovative strategy can be employed to generate living bacterial biofilms composed of either mono-or multispecies,with a spatial resolution of approximately 24µm.Furthermore,its potential applications in information storage/encryption and antibi-otic screening are explored.This study provides an alternative way to understand and investigate the intricate interactions among bacteria within 3D biofilms,hold-ing great promise in the controlled fabrication of dynamic biological systems for advanced applications.
基金supported by the National Natural Science Foundation of China(6120200461472192)+1 种基金the Special Fund for Fast Sharing of Science Paper in Net Era by CSTD(2013116)the Natural Science Fund of Higher Education of Jiangsu Province(14KJB520014)
文摘The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).
基金support from the National Key Research and Development Program of China(grant no.2022YFB3203500)the National Natural Science Foundation of China(grant nos.21788102,22125803,and 22020102006)+2 种基金project support by the Shanghai Municipal Science and Technology Major Project(grant no.2018SHZDZX03)the Program of Shanghai Academic/Technology Research Leader(grant no.20XD1421300)the Fundamental Research Funds for the Central Universities.
文摘Metal-free materials with multicolor tunable circularly polarized luminescence(CPL)are attractive because of their potential applications in information storage and encryption.Here,we designed two enantiomers composed of chiral dialkyl glutamides and achiral vibration-induced emission(VIE)moiety,which can switch on CPL after a simple gelation process.It is noteworthy that the CPL colors vary in different solvents,and this is attributed to various self-assembly-induced microstructures,in which the VIE moiety is restrained to different degrees.Accordingly,a multidimensional code system composed of a quick response code,a ultraviolet(UV)light-activated color code,and a CPL information figure was constructed.To our satisfaction,the system possesses multiple information-storage functions.The orthogonal anticounterfeiting and CPLenhanced encryption functions also improve the system information encryption ability.In brief,this study provides a practical example of CPL applied to information security and an effective approach to obtain a single-component color-tunable CPL material with multiple information storage and encryption functions as well.
基金supported in part by Natural Science Foundation of China under (Grant No. U1536112) National Key Technology Research and Development Program of China (Grant No. 2012BAH94F02)+1 种基金National High-tech R&D Program of China (863 Program) under Grant No. 2013AA102301 Project of New Generation Broad band Wireless Network under Grant No. 2014ZX03006003
文摘With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP(Ali Pay) on mobile device. Therefore, only encryption cannot protect sensitive APP and privacy data stored on user's smartphone. To address these obstacles, we design a protection system called Mobi Gemini. It enables automatic uninstalling service that can immediately uninstall multiple APP at same time, and also enabling plausibly deniable encryption(PDE) on mobile devices by hiding encrypted volume within random data in free space of cache partition. We improve the key store way of previous PDE schemes on mobile device. The evaluation results show that the scheme introduces a few overhead compared with original android system enabling full disk encryption.
基金partially supported by National Natural Science Foundation of China No.61202034,61232002,61303026,6157237861402339CCF Opening Project of Chinese Information Processing No.CCF2014-01-02+2 种基金the Program for Innovative Research Team of Wuhan No.2014070504020237Fundamental Application Research Plan of Suzhou City No.SYG201312Natural Science Foundation of Wuhan University No.2042016gf0020
文摘Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme.