Shucheng Yu

ORCID: 0000-0001-6484-4382
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Security in Wireless Sensor Networks
  • User Authentication and Security Systems
  • Wireless Body Area Networks
  • Adversarial Robustness in Machine Learning
  • Advanced Authentication Protocols Security
  • Caching and Content Delivery
  • Vehicular Ad Hoc Networks (VANETs)
  • Complexity and Algorithms in Graphs
  • Advanced Neural Network Applications
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Computing and Resource Management
  • UAV Applications and Optimization
  • Network Security and Intrusion Detection
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Energy Efficient Wireless Sensor Networks
  • Advanced Data Storage Technologies
  • IoT and Edge/Fog Computing
  • Mobile Ad Hoc Networks
  • Indoor and Outdoor Localization Technologies
  • Biometric Identification and Security

Stevens Institute of Technology
2018-2024

University of Arkansas for Medical Sciences
2017

University of Arkansas at Little Rock
2011-2017

Xidian University
2014

Worcester Polytechnic Institute
2007-2011

Korea Institute of Nuclear Safety
2006

Cloud computing is an emerging paradigm in which resources of the infrastructure are provided as services over Internet. As promising it is, this also brings forth many new challenges for data security and access control when users outsource sensitive sharing on cloud servers, not within same trusted domain owners. To keep user confidential against untrusted existing solutions usually apply cryptographic methods by disclosing decryption keys only to authorized users. However, doing so, these...

10.1109/infcom.2010.5462174 article EN 2010-03-01

Personal health record (PHR) is an emerging patient-centric model of information exchange, which often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns personal could exposed those party servers and unauthorized parties. To assure the patients' control over access their own PHRs, it promising method encrypt PHRs before outsourcing. Yet, issues risks exposure, scalability in key management, flexible access, efficient user...

10.1109/tpds.2012.97 article EN IEEE Transactions on Parallel and Distributed Systems 2012-03-19

Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user associated with set attributes and data are encrypted structures on attributes. A able to decrypt ciphertext if only his satisfy the structure. Beside this basic property, practical applications usually have other requirements. paper we focus an important issue attribute revocation which cumbersome CP-ABE schemes. particular,...

10.1145/1755688.1755720 article EN 2010-04-13

Enabling keyword search directly over encrypted data is a desirable technique for effective utilization of outsourced to the cloud. Existing solutions provide multi-keyword exact that does not tolerate spelling error, or single fuzzy tolerates typos certain extent. The current schemes rely on building an expanded index covers possible misspelling, which lead significantly larger file size and higher complexity. In this paper, we propose novel scheme by exploiting locality-sensitive hashing...

10.1109/infocom.2014.6848153 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

In cloud computing, clients usually outsource their data to the storage servers reduce management costs. While those may contain sensitive personal information, cannot be fully trusted in protecting them. Encryption is a promising way protect confidentiality of outsourced data, but it also introduces much difficulty performing effective searches over encrypted information. Most existing works do not support efficient with complex query conditions, and care needs taken when using them because...

10.1109/icdcs.2011.55 article EN 2011-06-01

Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before-outsourcing fundamental solution to protecting user privacy the untrusted server environment. Many secure search schemes have been focusing on single-contributor scenario, outsourced dataset or searchable index of are and managed by single owner, typically based symmetric cryptography. In this paper, we focus different yet more challenging scenario can be contributed from...

10.1109/tpds.2014.2355202 article EN IEEE Transactions on Parallel and Distributed Systems 2014-09-17

As the data produced by individuals and enterprises that need to be stored utilized are rapidly increasing, owners motivated outsource their local complex management systems into cloud for its great flexibility economic savings. However, as sensitive may have encrypted before outsourcing, which obsoletes traditional utilization service based on plaintext keyword search, how enable privacy-assured mechanisms outsourced is thus of paramount importance. Considering large number on-demand users...

10.1109/infcom.2012.6195784 article EN 2012-03-01

To improve the accuracy of learning result, in practice multiple parties may collaborate through conducting joint Back-Propagation neural network on union their respective data sets. During this process no party wants to disclose her/his private others. Existing schemes supporting kind collaborative are either limited way partition or just consider two parties. There lacks a solution that allows more parties, each with an arbitrarily partitioned set, collaboratively conduct learning. This...

10.1109/tpds.2013.18 article EN IEEE Transactions on Parallel and Distributed Systems 2013-01-14

Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all directly publish their complete profiles others search. However, many applications, users' may contain sensitive information that they do not want make public. this paper, we propose FindU, first privacy-preserving profile schemes networks. an from...

10.1109/infcom.2011.5935065 article EN 2011-04-01

Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before-outsourcing fundamental solution to protecting user privacy the untrusted server environment. Many secure search schemes have been focusing on single-contributor scenario, outsourced dataset or searchable index of are and managed by single owner, typically based symmetric cryptography. In this paper, we focus different yet more challenging scenario can be contributed from...

10.1109/infocom.2014.6847943 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Vehicle-to-grid (V2G) networks are important components of the smart grid (SG) for their capability providing better ancillary services and facilitating adoption renewable resources. The operation V2G is based on continuously monitoring status individual battery vehicle (BV) as well a carefully designed incentive scheme to attract sufficient participating BVs. However, close tends raise privacy concerns from BV owners about identity location information leakage, which have not been...

10.1109/tsg.2011.2140343 article EN IEEE Transactions on Smart Grid 2011-05-20

Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) Possession (PDP) techniques assure data Ownership (POW) improves by securely removing unnecessarily duplicated on the server. However, trivial combination techniques, in order to achieve both efficiency, results non-trivial duplication metadata (i.e., authentication tags), which contradicts objectives POW. Recent attempts this problem introduce tremendous computational...

10.1109/cns.2013.6682702 article EN 2013-10-01

In wireless body area network (BAN), node authentication is essential for trustworthy and reliable gathering of patient's critical health information. Traditional solutions depend on prior trust among nodes whose establishment would require either key pre-distribution or non-intuitive participation by inexperienced users. Most existing non-cryptographic schemes advanced hardware significant modifications to the system software, which are impractical BANs. this paper, first time, we propose a...

10.1109/jsac.2013.130913 article EN IEEE Journal on Selected Areas in Communications 2013-08-23

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows mobile users of WSNs to broadcast messages multiple nodes secure way. Although symmetric-key-based solutions such muTESLA and multilevel have been proposed, they all suffer from severe energy-depletion attacks resulting the nature delayed message authentication. This paper presents several efficient public-key-based schemes achieve immediate thus avoid vulnerability that intrinsic...

10.1109/tvt.2009.2019663 article EN IEEE Transactions on Vehicular Technology 2009-04-03

Distributed sensor data storage and retrieval have gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more robust fault-tolerant wireless network (WSN), such also poses number of security challenges especially when applied mission-critical applications as battlefield e-healthcare. First, are stored maintained by individual sensors unattended easily subject to strong attacks physical compromise, it is significantly harder...

10.1109/tpds.2010.130 article EN IEEE Transactions on Parallel and Distributed Systems 2010-07-01

For data storage outsourcing services, it is important to allow owners efficiently and securely verify that the server stores their correctly. To address this issue, several proof-of-retrievability (POR) schemes have been proposed wherein a must prove verifier all of client's are stored While existing POR offer decent solutions addressing various practical issues, they either non-trivial (linear or quadratic) communication complexity, only support private verification, i.e., owner can...

10.1145/2484402.2484408 article EN 2013-05-08

The body area network (BAN) is a key enabling technology in e-healthcare. An important security issue to establish initial trust relationships among the BAN devices before they are actually deployed and generate necessary shared secret keys protect subsequent wireless communications. Due ad hoc nature of extreme resource constraints sensor devices, providing secure as well efficient user-friendly initialization challenging task. Traditional solutions for networks mostly depend on...

10.1145/2422966.2422975 article EN ACM Transactions on Sensor Networks 2013-03-01

In past years, the rapid development of cloud storage services makes it easier than ever for users to share data with each other. To ensure users' confidence integrity their shared on cloud, a number techniques have been proposed auditing focuses various practical features, e.g., support dynamic data, public auditing, low communication/computational audit cost, and overhead. However, most these consider that only original owner can modify which limits client read-only applications. Recently,...

10.1109/tifs.2015.2423264 article EN IEEE Transactions on Information Forensics and Security 2015-04-15

With the increasing adoption of cloud computing for data storage, assuring service reliability, in terms correctness and availability, has been outstanding. While redundancy can be added into problem becomes challenging "pay-as-you-use" paradigm where we always want to efficiently resolve it both corruption detection repair. Prior distributed storage systems based on erasure codes or network coding techniques have either high decoding computational cost users, too much burden repair being...

10.1109/infcom.2012.6195814 article EN 2012-03-01

In past years a body of data integrity checking techniques have been proposed for securing cloud services. Most these works assume that only the owner can modify cloud-stored data. Recently few attempts started considering more realistic scenarios by allowing multiple users to with assurance. However, are still far from practical due tremendous computational cost on users. Moreover, collusion between misbehaving servers and revoked is not considered. This paper proposes novel scheme...

10.1109/infocom.2014.6848154 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN to securely associate group sensor nodes patient, and generate necessary secret keys protect subsequent wireless communications. Due ad hoc nature extreme resource constraints devices, providing secure, fast, efficient user-friendly secure association challenging task. In this paper, we propose lightweight scheme for management...

10.1109/infcom.2010.5462095 article EN 2010-03-01

Biometric identification is a reliable and convenient way of identifying individuals. The widespread adoption biometric requires solid privacy protection against possible misuse, loss, or theft data. Existing techniques for privacy-preserving primarily rely on conventional cryptographic primitives such as homomorphic encryption oblivious transfer, which inevitably introduce tremendous cost to the system are not applicable practical large-scale applications. In this paper, we propose novel...

10.1109/infcom.2013.6567073 article EN 2013-04-01

Image search has been widely deployed in many applications for the rich content that images contain. In era of big data, image engines have to be hosted data centers. As a viable solution, outsourcing public clouds is an economic choice small organizations. However, as contain sensitive information, e.g., healthcare information and personal faces/locations, directly services obviously raises privacy concerns. With this observation, several attempts are made towards secure over encrypted...

10.1109/infocom.2015.7218593 article EN 2015-04-01
Coming Soon ...