- Cryptography and Data Security
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Access Control and Trust
- Security and Verification in Computing
- Security in Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Advanced Data Storage Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Innovation in Digital Healthcare Systems
- Advanced Image and Video Retrieval Techniques
- China's Ethnic Minorities and Relations
- Internet Traffic Analysis and Secure E-voting
- Cooperative Communication and Network Coding
- IPv6, Mobility, Handover, Networks, Security
- Wireless Communication Security Techniques
- Caching and Content Delivery
- Spam and Phishing Detection
- Complexity and Algorithms in Graphs
- Distributed systems and fault tolerance
- Web Data Mining and Analysis
Northeastern University
2013-2024
Wuhan National Laboratory for Optoelectronics
2009
Huazhong University of Science and Technology
2009
Northeastern University
2008
Cloud storage has been gaining tremendous popularity, which provides facilitative data and sharing services for distributed clients. To maximize the availability reliability, some customers may store multiple replicas of critical on cloud servers. However, servers collude to make it look like they are storing copies data, whereas in fact only a single copy. Currently, several multi-replica provable possession schemes have proposed provide verifications ensure that all outsourced actually...
In 2015, Wang proposed the first identity-based provable data possession scheme named ID-DPDP (IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328-340, Mar./Apr. 2015) to verify outsourced publicly without implementation of PKI. Unfortunately, in this letter, we demonstrate that is insecure sense cloud servers can generate valid proofs possessing original blocks. We also show another security issue which leads some blocks never be verified unless all are challenged. Meanwhile,...
AbstractWe consider the problem of authenticating packets transmitted over a Wireless Sensor Networks (WSN) controlled by an adversary who may perform arbitrary attacks on packets: He drop or modify chosen packets. The prior works data authentication WSN have focused less powerful adversarial network model examined considerably more restrictive setting with specific timing structural assumptions about WSN. We also ability to n parameter: survival rate α (0 < α≤ 1) denoting fraction that are...
With the growing trend toward using cloud storage, problem of efficiently checking and proving data integrity needs more consideration. Many cryptography security schemes, such as PDP (Provable Data Possession) POR (Proofs Retrievability) were proposed for this problem. Although many efficient schemes static have been constructed, only a few dynamic exist, DPDP (Dynamic Provable Possession). But scheme falls short when updates are not proportional to fixed block size. The FlexList-based...
Logical key tree is an important issue for multicast management. The degree of a and the algorithm which maintains balance has great effect on paper makes analysis with using hierarchical data processing model. complete quad taken as logical structure management, rebuilding based idea subtree movement so that external cost caused by balancing can be reduced. This gives designing idea, analyzes devises realization algorithms, constructs practical management scheme. shows this scheme simple to...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
As authentication provides crucial online identity, it is the basis of data security. In this paper, a session based proposed and long unique un-guessable identifier used as parameter an token. It has advantages one-timeness, short-lived no prior knowledge requirement. The model established with detailed implementation communication protocol. security protocol then analyzed formally results show that can resist various attacks, e.g. hijacking, message replay pharming attacks etc. Finally,...
In the era of big data, cloud storages become prevalent while security issues on outsourced data emerge. Without physical control owners, faces more risks. Provable Data Possession (PDP) is a probabilistic technique for checking whether correctly stored in remote servers without retrieving entire data. For many previous PDP schemes, choosing public keys owners relies Public Key Infrastructure (PKI), which resource consuming. this paper, we propose an Identity-Based Batch (ID-BPDP) scheme to...
In the collaborative design metaverse application, team as data owner(DO) has demanded to outsource digital model a cloud service provider(CSP) due limit of local storage. They also need frequently search and update for improving design. But virtual world is mutual distrusted, which brings 4 major security concerns: 1) CSP may partially execute DOs' queries curious about keywords data, how protect privacy queries? 2) dishonestly save cost or under other considerations, correctness integrity...