- Cloud Data Security Solutions
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Advanced Authentication Protocols Security
- Security and Verification in Computing
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Korean Peninsula Historical and Political Studies
- Advanced Steganography and Watermarking Techniques
- Caching and Content Delivery
- User Authentication and Security Systems
- Access Control and Trust
- Indoor and Outdoor Localization Technologies
- Ethics and Legal Issues in Pediatric Healthcare
- Underwater Vehicles and Communication Systems
- Wireless Body Area Networks
- Innovation in Digital Healthcare Systems
- 3D Shape Modeling and Analysis
- Robotics and Sensor-Based Localization
- Chaos-based Image/Signal Encryption
Jiangsu Yanjiang Chemical Resources Development Research Institute (China)
2021-2024
Shanghai Ocean University
2021-2024
Southwest Jiaotong University
2021
Nanjing University of Information Science and Technology
2015-2020
Peng Cheng Laboratory
2019
State Key Laboratory of Cryptology
2019
Institute of Information Engineering
2017
Chinese Academy of Sciences
2017
Nanjing University
2017
University of Information Science
2017
The vehicular cloud provides many significant advantages to Vehicular ad-hoc Networks (VANETs), such as unlimited storage space, powerful computing capability and timely traffic services. Traffic data aggregation in the cloud, which can aggregate from vehicles for further processing sharing, is very important. Incorrect feedback may affect safety; therefore, security of should be ensured. In this paper, by using property recovery message signature (MRS), we propose a secure real-time scheme...
Internet of things (IoT) has emerged as a promising technology that can be widely used in various industries to realize real-time information collection, so improve production efficiency and reduce running costs. By combining the IoT, maritime transportation systems (MTS) prevent vessels collision, loss revenue for ports shipbuilders. The large amount data generated IoT-enabled MTS efficiently utilized predict future trajectories hotspots on sea combined with historical data. However,...
With the fast growing demands for big data, we need to manage and store data in cloud. Since cloud is not fully trusted it can be accessed by any users, may face threats. In this paper, propose a secure authentication protocol with hierarchical attribute authorization structure. Our proposed resorts tree-based signature significantly improve security of authorization. To satisfy requirements, extend support multiple levels Security analysis shows that our resist forgery attack replay attack....
Storage is one of the main services that cloud provides users. Utilizing to store large amounts data can alleviate cost storage and hardware investment on local side, which very important for resource-restricted clients. An emerging issue clients how verify database in could after outsourcing their cloud. Many verifiable (VDB) schemes have been proposed by researchers solve this issue. However, some existing cannot satisfy practical requirements verifiability. In paper, we propose a secure...
Vehicular networking is a communication platform that integrates the computing power of vehicles, roadside units, and infrastructures, which capable offering services to terminals characterized by low latency, high bandwidth, reliability. Artificial intelligence (AI) has been developed rapidly over past few years, numerous AI applications requiring in vehicular have emerged (e.g., automatic driving, collision avoidance, trajectory prediction). However, computation model requires power,...
With the rapid development of cloud services, resources-constrained enterprises and individuals can outsource huge sensitive data into Cloud Service Providers (CSPs) who fully control physically. Since CSPs are not trusted, it is essential to protect integrity confidentiality users' data. Plenty researchers have devoted considerable attention solve this issue in last decade such as various PDP POR schemes. In paper, we propose an algebraic signature-based auditing scheme that ensures with...
In edge computing, the idle resources of devices in network can be virtualized into a platform that provides clients with storage resource and computing capability. Note service response is faster than cloud computing. The provision speed distributed utilization rate will further improved when integrated 5G software definition paradigm design system. However, issues data security devices' trustworthiness seriously restrict development To enhance secure integrity auditing proposed. proposed...
Incompletely predictable vehicular ad hoc networks is a type of where vehicles move in certain range or just particular tendency, which very similar to some circumstances reality. However, how route such more efficiently according the node motion characteristics and related historical big data still an open issue. In this paper, we propose novel routing protocol named trustworthiness evaluation-based (TERP). our protocol, each individual calculated by cloud depending on attribute parameters...
There are many concerns about the sensitivity and privacy of data in hierarchical wireless sensor networks (HWSNs) because low-cost nodes neither tamper-proof nor capable performing public key cryptography efficiently. In existing studies, researchers only focus on existence single node network, while arrangement that multiple attached to one cluster is out consideration. this paper, we propose a lightweight practical clustering authentication protocol for HWSNs. As assume be authenticated...
Cloud storage is now a hot research topic in information technology, which has changed the technical architecture and implementation method of electronic records management. However, due to loss physical control record cloud environment, it more difficult guarantee evidential quality for manager. In this paper, we analyzes requirements preserving based on security theory. Moreover construct first technology framework storage. addition, integration insure authenticity, integrity, reliability...
With the rapid spread of smart sensors, data collection is becoming more and important in Mobile Edge Networks (MENs). The collected can be used many applications based on analysis results these by cloud computing. Nowadays, schemes have been widely studied researchers. However, most researches take amount into consideration without thinking about problem privacy leakage data. In this paper, we propose an energy-efficient anonymous scheme for MENs to keep a balance between energy consumption...
Cloud computing is a newfound service which has rapid growth in IT industry recent years. With the development of social network, group data sharing system been developed to store and process large amounts data. Due cloud provided by third party, server semi-trusted. In this paper, we propose secure identity-based dynamic scheme for computing, based on transplanted signature algorithm perform identity authorization authentication. order make members share efficiently, utilize multi-owner...
There are many concerns about the sensitivity and privacy of data in hierarchical wireless sensor networks (HWSNs) because low-cost nodes neither tamper-proof nor capable performing public key cryptography efficiently. In existing studies, researchers only focus on existence single node network, while arrangement that multiple attached to one cluster is out consideration. this paper, we propose a lightweight practical clustering authentication protocol for HWSNs. As assume be authenticated...
It is important to improve the registration precision and speed in process of registration. In order solve this problem, we proposed a robust point cloud method based on deep learning, called PDC-Net, using principal component analysis adjustment network that quickly adjusts initial position between two slices cloud, then an iterative neural inverse compositional algorithm complete final transformation. We compare it ModelNet40 dataset with closest point, which traditional method,...
Cloud computing is a newfound service which has rapid growth in IT industry recent years. Despite it huge contribution to the development of technology and society, cloud still exists some security deficiencies block its such as data leakage, illegal access privacy risks. Hence, control user authentication very important environment. Some related schemes been proposed solve problems cloud, however, high computation cost crucial factor practical use. In this paper we propose novel lightweight...
Cloud storage which provides efficiency and convenience has been paid more attention by not only users but also researchers. Users can save their local costs outsourcing the data to cloud. While enjoying benefits of cloud storage, are worried about whether remain intact in or private information leaked. This makes them hesitate outsource cannot fully trust servers. Because concern users, integrity becomes an essential security factor storage. Many scholars have dedicated themselves research...