数字虚拟资产安全管理与交易原型系统
项目来源
国(略)研(略)((略)D(略)
项目主持人
王(略)
项目受资助机构
四(略)
项目编号
2(略)Y(略)8(略)0(略)
立项年度
2(略)
立项时间
未(略)
研究期限
未(略) (略)
项目级别
国(略)
受资助金额
3(略)0(略)
学科
网(略)安(略)业(略)
学科代码
未(略)
基金类别
“(略)间(略)重(略)
关键词
数(略)资(略) (略)理(略)交(略)系(略) (略)i(略) (略)t(略) (略)e(略) (略)u(略)y(略)n(略)m(略) (略)r(略)a(略)o(略)r(略)t(略) (略)t(略)
参与者
赵(略)
参与机构
北(略)大(略)都(略)
项目标书摘要:本研(略)安全管理与交易原型(略)验证手段,为其改进(略)时,通过研究系统的(略)、实现策略等,为大(略)、产品研发等提供依(略)题1数字虚拟资产基(略)虚拟资产安全管理与(略)拟资产安全威胁感知(略)产动态风险控制机制(略)原型系统,以达到项(略)的研究内容包括研究(略)交易原型系统体系架(略)方式、实现策略等;(略)基础数学模型和课题(略)与交易技术的理论和(略)安全应用系统,包括(略)、安全存储和使用控(略)溯源3 大子系统;(略)基础数学模型、课题(略)感知方法和课题4数(略)机制的理论和方法,(略)控系统,包括数字虚(略)及数字虚拟资产动态(略)究利用原型系统进行(略)括人机界面的交互形(略)仿真,以及系统参数(略)项目理论及方法验证(略)据。
Applicati(略): This pr(略)des a ver(略)ethod for(略) and meth(略)ructing a(略)rtual ass(略) manageme(略)ing, and (略)perimenta(略)its impro(略)enhanceme(略)same time(略)ng the ty(略)cation sc(略)ployment (略)mplementa(略)gies of t(略)Provide a(略)large-sca(略)ation app(略)technolog(略), product(略)t and so (略)oject wil(略)orrespond(略)pe system(略)he theori(略)ods of pr(略)project 4(略)achieve t(略)of projec(略)erificati(略)cific res(略)nts inclu(略) on digit(略)asset sec(略)ement and(略)n prototy(略)rchitectu(略) applicat(略)os, deplo(略) implemen(略)tegies, e(略)on the th(略)thod of p(略)d project(略)igital vi(略) security(略)n systems(略) three su(略)identity (略)ion and a(略)ration, s(略)ge and us(略), and sec(略)tion and (略)y; resear(略)al virtua(略)eat manag(略)ms, inclu(略)l virtual(略)rity, Bas(略)heories a(略)of projec(略)t 3 and p(略)his paper(略)e digital(略)set threa(略)t and con(略), includi(略)virtual a(略)ty threat(略)and digit(略)asset dyn(略)ontrol su(略)he resear(略) prototyp(略) carry on(略)t achieve(略)cation me(略)ding the (略) interfac(略)ve form, (略) the mode(略), the sim(略) well as (略)parameter(略) and the (略)d so on w(略)es the ex(略)data for (略) theory a(略)od verifi(略) improvem(略) enhancem(略)
项目受资助省
四(略)
1.Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
- 关键词:
- Data sharing; cloud computing; conditional proxy re-encryption;attribute-based encryption; privacy conflict;PROXY RE-ENCRYPTION; ACCESS-CONTROL; BROADCAST ENCRYPTION; SOCIALNETWORKS; EFFICIENT; PRIVACY; SCHEME; MODEL
- Huang, Qinlong;Yang, Yixian;Yue, Wei;He, Yue
- 《IEEE TRANSACTIONS ON CLOUD COMPUTING》
- 2021年
- 9卷
- 4期
- 期刊
With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over ciphertext associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data. In this paper, we propose a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing, in which data owner can share private data with a group of users via the cloud in a secure way, and data disseminator can disseminate the data to a new group of users if the attributes satisfy the access policies in the ciphertext. We further present a multiparty access control mechanism over the disseminated ciphertext, in which the data co-owners can append new access policies to the ciphertext due to their privacy preferences. Moreover, three policy aggregation strategies, including full permit, owner priority and majority permit, are provided to solve the privacy conflicts problem caused by different access policies. The security analysis and experimental results show our scheme is practical and efficient for secure data sharing with multi-owner in cloud computing.
...2.Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
- 关键词:
- Access control; Cloud computing; Data protection; Receivers; Libraries;Outsourcing; Cryptography; Data dissemination; attribute-basedencryption; conditional proxy re-encryption; timed-release encryption;cloud computing;PROXY RE-ENCRYPTION
- Huang, Qinlong;Yang, Yixiang;Fu, Jingyi
- 《IEEE TRANSACTIONS ON SERVICES COMPUTING》
- 2021年
- 14卷
- 4期
- 期刊
Cloud computing has become increasingly popular among users and businesses around the world. Although cryptographic techniques can provide data protection for users in public cloud, several issues also remain problematic, such as secure data group dissemination and fine-grained access control of time-sensitive data. In this paper, we propose an identity-based data group sharing and dissemination scheme in public cloud, in which data owner could broadcast encrypted data to a group of receivers at one time by specifying these receivers' identities in a convenient and secure way. In order to achieve secure and flexible data group dissemination, we adopt attribute-based and timed-release conditional proxy re-encryption to guarantee that only data disseminators whose attributes satisfy the access policy of encrypted data can disseminate it to other groups after the releasing time by delegating a re-encryption key to cloud server. The re-encryption conditions are associated with attributes and releasing time, which allows data owner to enforce fine-grained and timed-release access control over disseminated ciphertexts. The theoretical analysis and experimental results show our proposed scheme makes a tradeoff between computational overhead and expressive dissemination conditions.
...3.Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
- 关键词:
- Media; Cloud computing; Videos; Privacy; Access control; Encryption;Multi-dimensional media; scalable access control; secure deduplication;mobile cloud computing;STREAMS
- Huang, Qinlong;Zhang, Zhicheng;Yang, Yixian
- 《IEEE TRANSACTIONS ON MOBILE COMPUTING》
- 2021年
- 20卷
- 5期
- 期刊
Benefiting from cloud computing and mobile devices, a huge number of media contents, such as videos are shared in mobile networks. Although scalable video coding can be utilized to provide flexible adaptation, the cloud poses a serious threat to media privacy. In this paper, we propose a privacy-preserving multi-dimensional media sharing scheme named SMACD in mobile cloud computing. First, each media layer is encrypted with an access policy based on attribute-based encryption, which guarantees media confidentiality as well as fine-grained access control. Then, we present a multi-level access policy construction with secret sharing scheme. It ensures that the mobile consumers who obtain a media layer at a higher access level must satisfy the access trees of its child layers at the lower access level, which is compatible with the characteristics of multi-dimensional media and also reduces the complexity of access policies. Moreover, we introduce decentralized key servers to achieve both intra-server and inter-server deduplication by associating different access policies into the same encrypted media. Finally, we conduct experimental evaluation on mobile device and cloud platform with real-world datasets. The results indicate that SMACD protects media privacy against cloud media center and unauthorized parties, while incurring less computational and storage cost.
...4.Plagiarism detection in students’ programming assignments based on semantics: multimedia e-learning based smart assessment methodology
- 关键词:
- Computer aided instruction;E-learning;Students;C++ (programming language);Codes (symbols);Computer software;Intellectual property;Machine learning;Assessment methodologies;E-learning methodologies;Learning management system;Multimedia e-learning;Plagiarism detection;Programming assignments;Semantic similarity;Source code plagiarisms
- Ullah, Farhan;Wang, Junfeng;Farhan, Muhammad;Jabbar, Sohail;Wu, Zhiming;Khalid, Shehzad
- 《Multimedia Tools and Applications》
- 2020年
- 79卷
- 13-14期
- 期刊
The multimedia-based e-Learning methodology provides virtual classrooms to students. The teacher uploads learning materials, programming assignments and quizzes on university’ Learning Management System (LMS). The students learn lessons from uploaded videos and then solve the given programming tasks and quizzes. The source code plagiarism is a serious threat to academia. However, identifying similar source code fragments between different programming languages is a challenging task. To solve the problem, this paper proposed a new plagiarism detection technique between C++ and Java source codes based on semantics in multimedia-based e-Learning and smart assessment methodology. First, it transforms source codes into tokens to calculate semantic similarity in token by token comparison. After that, it finds semantic similarity in scalar value for the complete source codes written in C++ and Java. To analyse the experiment, we have taken the dataset consists of four (4) case studies of Factorial, Bubble Sort, Binary Search and Stack data structure in both C++ and Java. The entire experiment is done in R Studio with R version 3.4.2. The experimental results show better semantic similarity results for plagiarism detection based on comparison. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
...5.LSA Based Smart Assessment Methodology for SDN Infrastructure in IoT Environment
- 关键词:
- Information management;Internet of things;Machine learning;Complex networks;Semantic Web;Education computing;Semantics;Architecture modeling;Assessment methodologies;Internet of thing (IOT);Latent Semantic Analysis;Learning management system;Semantic similarity;Undergraduate students;Virtual university
- Ullah, Farhan;Wang, Junfeng;Farhan, Muhammad;Jabbar, Sohail;Naseer, Muhammad Kashif;Asif, Muhammad
- 《International Journal of Parallel Programming》
- 2020年
- 48卷
- 2期
- 期刊
The Software Defined Network (SDN) is merged in the Internet of Things (IoT) to interconnect large and complex networks. It is used in the education system to interconnect students and teacher by heterogenous IoT devices. In this paper, the SDN-based IoT model for students’ Interaction is proposed which interconnects students to a teacher in a smart city environment. The students and teachers are free to move to anywhere, anytime and with any hardware. An architecture model for students’ teacher’s interaction in IoT is proposed which shows the details procedure about the interaction of teacher with students for electronic assessment. The SDN solves the scalability and interoperability issues between their heterogenous IoT devices. A Methodology for Students’ Answer Assessment using Latent Semantic Analysis (LSA) is proposed which calculates the semantic similarity between teacher’s question and students’ answers. The LSA is used to calculate semantic similarity between text documents. It is used to mark the students’ answers automatically by semantics. The Students’ can see results through their IoT devices just after finishing the examination with more accurate marks We have collected fifty (50) undergraduate students’ data from Learning Management System (LMS) of Virtual University (VU) of Pakistan. The experiment is implemented on eighteen (18) students’ answers in R Studio with R version 3.4.2. Teachers are provided with four (4) bins of the mark while the proposed method assigns accurate marks. The experimental results show that the proposed methodology gave accurate results as compared to teacher’s marks. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
...6.An E-Assessment Methodology Based on Artificial Intelligence Techniques to Determine Students' Language Quality and Programming Assignments' Plagiarism
- 关键词:
- Electronic-Assessment; Machine Learning; Artificial Intelligence;WordNet; Technology Enhanced Assessment; Semantic Similarity
- Ullah, Farhan;Bajahzar, Abdullah;Aldabbas, Hamza;Farhan, Muhammad;Naeem, Hamad;Bukhari, S. Sabahat H.;Malik, Kaleem Razzaq
- 《INTELLIGENT AUTOMATION AND SOFT COMPUTING》
- 2020年
- 26卷
- 1期
- 期刊
This research aims to an electronic assessment (e-assessment) of students' replies in response to the standard answer of teacher's question to automate the assessment by WordNet semantic similarity. For this purpose, a new methodology for Semantic Similarity through WordNet Semantic Similarity Techniques (SS-WSST) has been proposed to calculate semantic similarity among teacher' query and student's reply. In the pilot study-1 42 words' pairs extracted from 8 students' replies, which marked by semantic similarity measures and compared with manually assigned teacher's marks. The teacher is provided with 4 bins of the mark while our designed methodology provided an exact mcamre of marks. Secondly, the source codes plagiarism in students' assignments provide smart e-assessment. The WordNet semantic similarity techniques are used to investigate source code plagiarism in binary search and stack data structures programmed in C++, Java, C# respectively.
...7.A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference
- 关键词:
- Computing power;Lakes;Bitcoin;Fuzzy inference;Block delay;Block withholding attack;Computing power;Delay blocks;Optimum strategy;Takagi-Sugeno-Kang fuzzy inference systems
- Liu, Liang;Chen, Wen;Zhang, Lei;Liu, JiaYong;Qin, Jian
- 《Mathematical Biosciences and Engineering》
- 2020年
- 17卷
- 1期
- 期刊
We proposed a new type of bitcoin withholding attack named block withholding delay (BWD). It is different from the traditional withholding attacks which always drop valid blocks. BWD attackers never discard blocks but they delay the submissions of blocks to the pool managers, resulting the pool failed in the mining competitions and loss of rewards. We analyzed the optimum strategy of a BWD attacker who split its computing power into two parts, one was utilized to launch BWD attacks on the victim pools, while the other part was used for solo mining. We present detailed quantitative analysis of the maximum incentive that an attacker can earn by carefully splitting its computing power, and demonstrated that the attacker can obtain higher incentives than its contribution to the network in different conditions. Furthermore, we proposed a countermeasure against BWD based on the interval type-2 Takagi-Sugeno-Kang fuzzy inference system (IT2-TSK-FIS). The principle is to modify the private payoff scheme of pools to increase the risk of losing revenues of the rogue miners who deliberately delay block submissions. The scheme dealing the uncertain cause of block delay using fuzzy inference, and it is so designed that it does not require modifications of public mining protocols or data structures of the bitcoin network, which makes it applicable in practical pools. © 2020 the Author(s), licensee AIMS Press.
...8.数字虚拟资产安全管理与交易原型系统技术报告(Scientific and Technical Report on Digital Virtual Assets Security Management and Transaction Prototype)
- 关键词:
- 数字虚拟资产、安全管理、交易原型系统、Digital virtual asset、Security management、Transaction prototype system
- 赵辉;
- 《四川大学;》
- 2019年
- 报告
本研究通过构建数字虚拟资产安全管理与交易原型系统,为理论及方法提供验证手段,为其改进和提高提供实验数据;同时,通过研究系统的典型应用场景、部署方式、实现策略等,为大规模示范应用、技术推广、产品研发等提供依据。本研究将严格基于课题1数字虚拟资产基础数学模型、课题2数字虚拟资产安全管理与交易技术、课题3数字虚拟资产安全威胁感知方法和课题4数字虚拟资产动态风险控制机制的理论和方法构建相应的原型系统,以达到项目成果验证的目的。具体的研究内容包括研究数字虚拟资产安全管理与交易原型系统体系架构、典型应用场景、部署方式、实现策略等;基于课题1数字虚拟资产基础数学模型和课题2数字虚拟资产安全管理与交易技术的理论和方法,研究数字虚拟资产安全应用系统,包括用户身份认证和资产登记、安全存储和使用控制、以及安全交易和追踪溯源3 大子系统;基于课题1数字虚拟资产基础数学模型、课题3数字虚拟资产安全威胁感知方法和课题4数字虚拟资产动态风险控制机制的理论和方法,研究数字虚拟资产威胁管控系统,包括数字虚拟资产安全威胁发现、以及数字虚拟资产动态风险控制2大子系统;研究利用原型系统进行项目成果验证的方法,包括人机界面的交互形式,以方便模型的调试、仿真,以及系统参数的调整和分析等工作,为项目理论及方法验证、改进和提高提供实验数据。 This project provides a verification method for the theory and method by constructing a digital virtual asset security management and trading,and provides experimental data for its improvement and enhancement.At the same time,by studying the typical application scenarios,deployment mode,and implementation strategies of the system,Provide a basis for large-scale demonstration applications,technology promotion,product development and so on.This project will build a corresponding prototype system based on the theories and methods of project 1 to project 4,so as to achieve the purpose of project results verification.The specific research contents include research on digital virtual asset security management and transaction prototype system architecture,typical application scenarios,deployment mode,implementation strategies,etc.;Based on the theory and method of project 1 and project 2,study digital virtual asset security application systems,including three sub-systems:identity authentication and asset registration,secure storage and usage control,and secure transaction and traceability;research on digital virtual asset threat management systems,including digital virtual asset security,Based on the theories and methods of project 1,project 3 and project 4,this paper studies the digital virtual asset threat management and control system,including digital virtual asset security threat detection and digital virtual asset dynamic risk control sub-system.The research USES the prototype system to carry on the project achievement verification method,including the man-machine interface interactive form,facilitates the model debugging,the simulation,as well as the system parameter adjustment and the analysis and so on work,provides the experimental data for the project theory and the method verification,the improvement and the enhancement.
...9.Pseudo-random encryption for security data transmission in wireless sensor networks
- 关键词:
- Data transfer;Data communication systems;Sensor data fusion;Cryptography;Inverse problems;Network security;Matrix algebra;Mapping;Binary Hypothesis Testing;Distributed detection;Lightweight securities;Likelihood ratio tests;Pseudo-random functions;Security of wireless sensor networks;Security problems;Sensor measurements
- Liu, Liang;Chen, Wen;Li, Tao;Liu, Yuling
- 《Sensors 》
- 2019年
- 19卷
- 11期
- 期刊
The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors and an ally fusion center (AFC) over insecure links. For the typical security problem of WSN’s binary hypothesis testing of a target’s state, sensors were divided into flipping and non-flipping groups according to the outputs of a pseudo-random function which was held by sensors and the AFC. Then in order to prevent an enemy fusion center (EFC) from eavesdropping, the binary outputs from the flipping group were intentionally flipped to hinder the EFC’s data fusion. Accordingly, the AFC performed inverse flipping to recover the flipped data before data fusion. We extended the scheme to a more common scenario with multiple scales of sensor quantification and candidate states. The underlying idea was that the sensor measurements were randomly mapped to other quantification scales using a mapping matrix, which ensured that as long as the EFC was not aware of the matrix, it could not distract any useful information from the captured data, while the AFC could appropriately perform data fusion based on the inverse mapping of the sensor outputs. © 2019 by the authors. Licensee MDPI, Basel, Switzerland.
...10.Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles
- 关键词:
- Information dissemination;Authentication;Privacy-preserving techniques;Attribute-based encryptions;Authentication and message integrity;Conditional privacies;Identity based signature;Message authentication;Outsourcing construction;Security and privacy issues;Warning message disseminations
- Huang, Qinlong;Li, Nan;Zhang, Zhicheng;Yang, Yixian
- 《2019 IEEE Conference on Communications and Network Security, CNS 2019》
- 2019年
- June 10, 2019 - June 12, 2019
- Washington, DC, United states
- 会议
Cloud-Assisted Internet of Vehicles (IoV)which merges the advantages of both cloud computing and Internet of Things that can provide numerous online services, and bring lots of benefits and conveniences to the connected vehicles. However, the security and privacy issues such as confidentiality, access control and driver privacy may prevent it from being widely utilized for message dissemination. Existing attribute-based message encryption schemes still bring high computational cost to the lightweight vehicles. In this paper, we introduce a secure and privacy-preserving dissemination scheme for warning message in cloud-Assisted IoV. Firstly, we adopt attribute-based encryption to protect the disseminated warning message, and present a verifiable encryption and decryption outsourcing construction to reduce the computational overhead on vehicles. Secondly, we present a conditional privacy preservation mechanism which utilizes anonymous identity-based signature technique to ensure anonymous vehicle authentication and message integrity checking, and also allows the trusted authority to trace the real identity of malicious vehicle. We further achieve batch verification to improve the authentication efficiency. The analysis indicate that our scheme gains more security properties and reduces the computational overhead on the vehicles. © 2019 IEEE.
...