- Cloud Data Security Solutions
- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Cryptography and Data Security
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Network Security and Intrusion Detection
- Mycorrhizal Fungi and Plant Interactions
- Blockchain Technology Applications and Security
- Plant-Microbe Interactions and Immunity
- Complexity and Algorithms in Graphs
- Distributed systems and fault tolerance
- Gut microbiota and health
- Privacy, Security, and Data Protection
- Sentiment Analysis and Opinion Mining
- Advanced Authentication Protocols Security
- Innovation in Digital Healthcare Systems
- Digital Marketing and Social Media
- Access Control and Trust
- Advanced Text Analysis Techniques
- Advanced Data Storage Technologies
- Plant Pathogens and Fungal Diseases
- Microbial Community Ecology and Physiology
- Ecology and Vegetation Dynamics Studies
National University of Defense Technology
2013-2024
Plant genotype drives the development of plant phenotypes and assembly microbiota, but potential influence phenotypic characters on its microbiota is not well characterized co-occurrence interrelations for specific microbial taxa are poorly understood. We established a common garden experiment, quantifying prokaryotic fungal communities in phyllosphere rhizosphere six spruce (Picea spp.) tree species, through Illumina amplicon sequencing. tested relationships between bacterial/archaeal their...
Research has shown that forest management can improve the post-drought growth and resilience of Qinghai spruce in eastern Qilian Mountains, located on northeastern Tibetan Plateau. However, impact such tree-associated phyllosphere microbiome is not yet fully understood. This study provides new evidence positive effects after extreme drought, from perspectives community diversity, structure, network inference, keystone species, assembly processes. In managed forest, α-diversity bacterial...
Previous studies indicate that the plant phenotypic traits eventually shape its microbiota due to community assembly based on functional types. If so, distance-related variations of microbial communities are mostly only in taxonomical composition different seeds pool, and there is no difference structure if location associated factors would not cause phenotypical plants. We test this hypothesis by investigating phyllospheric from five species spruce (Picea spp.) trees planted similarly but...
Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of public infrastructure. In CCS system, user can define and manage access control data by himself without help service provider. The ciphertext-policy attribute-based encryption (CP-ABE) considered as critical technology to implement such control. However, there still exists large security obstacle implementation CP-ABE CCS. That is, how identify malicious who illegally shares his private keys with others or...
The cloud computing has become the most popular service model with a proven ability to reduce costs and improve resource efficiency. However platform also suffer from potent attacks internal external environment. cooperation Managed Security Service Providers (MSSPs) becoming compelling solution security privacy risks in platform. But it is difficult deploy manage variety of efficiently effectively. In this paper, we propose novel framework, ESI-Cloud (Easy services Integration Cloud),...
While cloud customers can benefit from migrating applications to the cloud, they are concerned about security of hosted applications. This is complicated by not knowing whether their working as expected. Although memory-safety Java Virtual Machine (JVM) alleviate anxiety due control flow integrity, prone a violation bytecode integrity. The analysis some exploits indicates that results primarily given excess sandbox permission, loading flaws in class libraries and third-party middlewares...
Cloud computing has expanded rapidly as a promising technology in the recent years and drastically altered majority of opinions about mode application deployment. While cloud been proved to improve efficiency earn benefit for great number various services providers, yet good few enterprises still hesitate move because security threats. In this paper, we present jMonAtt architecture provide robust trustworthy guarantees high-level applications through enforcement trustworthiness evaluation...
Cloud computing emerges as a change in the business paradigm that offers pay-as-you-go capability and brings enormous benefits, but there are numerous organizations showing hesitation for adoption of cloud due to security concerns. Remote attestation has been proven boost confidence clouds guarantee hosted applications’ integrity. However, state-of-the-art schemes do not fit multiple requesters raise their challenges simultaneously, thereby leading larger performance overheads on attester...
The dramatic proliferation of cloud computing makes it an attractive target for malicious attacks. Increasing solutions resort to virtual machine introspection (VMI) deal with security issues in the environment. However, existing works are not feasible support tenants customize individual services based on their requirements flexibly. Additionally, adoption VMI-based at risk exposing sensitive information attackers. To alleviate and privacy anxieties tenants, we present SECLOUD, a framework...
As one of the most influential technologies, cloud computing brings users more benefits and improves efficiency in comparison to traditional model. However, it also introduces a number unknown risks challenges, upon which effectiveness those security protection solutions could have very little influence. We introduce DTEM into JVM, gives robust trust guarantees Java applications makes dynamic attestation about integrity state current applications. advanced art trusted is designed tackle...
With the introduction of virtual machine introspection into IaaS cloud, indirect inspection state about guest VMs is supported with strong isolation. But it requires privilege access to monitor and lacks manageability due need installing various security vendors' agents in a privileged VM. In this paper, we propose an agentless uniform framework, called SE-Cloud, which supports expert vendors build robust flexible protections for their customers. separation security-business code, SE-Cloud...
Cloud computing has brought academic and industry tremendous benefits improved efficiency compared with the traditional model, however, adoption of this unique model also exacerbates security challenges raises trust risks. And existing solutions have less effectiveness upon these unchartered cloud threats. We introduce trusted into current platform to address above issues design JVM-based Dynamic Attestation Architecture, DTEM, support application services robust guarantee. This framework...
While Java Virtual Machine can provide applications with safety property to avoid memory corruption bugs, it continues encounter some security flaws. Real world exploits show that the current sandbox model be bypassed. In this paper, we focus our work on bytecode integrity measurement in clouds identify malicious execution and propose J-IMA architecture runtime remote attestation for integrity. To best of knowledge, is first approach dynamically-generated Moreover, has no need any...
With the rapid development of e-commerce, a large number product reviews have arisen on Internet. Sentimental orientation analysis and mining become important for study reputation. Sentiment takes form analyzing classifying contents about product, event, place etc into positive, negative or neutral opinion. In this paper, we establish dynamic evaluation system consumers satisfaction. And grey prediction model is applied to discover evolution consumers' Finally, sentiment finished. The...
The arms race between offense and defense in the cloud impels innovation of techniques for monitoring attacks unauthorized activities. promising technique virtual machine introspection (VMI) becomes prevalent its tamper-resistant capability. However, some elaborate exploitations are capable invalidating VMI-based tools by breaking assumption a trusted guest kernel. To achieve more reliable robust introspection, we introduce practical approach to monitor detect that attempt subvert VMI this...
In this paper, we present a new way for evaluating the Continuous Data Protection (CDP) system. This method primarily describes CDP systems in their snapshot views, which focus on major issues affecting system's performance. To explain application of method, several representative views and propose model analyzing systems' performances. The main contribution study is that provide methodological guide optimization.
Security exploits and ensuant malware pose an increasing challenge to the cloud computing environments as variety complexity of continue increase. Kernel rootkits are more formidable than other for their stealthiness high privilege. A software-based detection mechanisms have been explored defeat kernel rootkits. However, existing methods suffer from complexity. In this paper, we introduce HKRD, a system that utilizes low-level architectural features in hypervisor detect identify malicious...
Service-oriented architecture is a design paradigm for the larger-scaled heterogeneous enterprise information systems, and it enabling technology remote crossorganization e-business transaction.Trust reputation among cooperating parties are becoming increasingly vital in this scene, where services from different administration domains deployed cooperated.This paper presents attestation platform SOA.It gives out complete solution trust establishing SOA enabled IT systems with supporting of...