Fucai Zhou

ORCID: 0000-0003-2667-6853
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Access Control and Trust
  • Security and Verification in Computing
  • Security in Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Advanced Data Storage Technologies
  • Vehicular Ad Hoc Networks (VANETs)
  • Innovation in Digital Healthcare Systems
  • Advanced Image and Video Retrieval Techniques
  • China's Ethnic Minorities and Relations
  • Internet Traffic Analysis and Secure E-voting
  • Cooperative Communication and Network Coding
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Communication Security Techniques
  • Caching and Content Delivery
  • Spam and Phishing Detection
  • Complexity and Algorithms in Graphs
  • Distributed systems and fault tolerance
  • Web Data Mining and Analysis

Northeastern University
2013-2024

Wuhan National Laboratory for Optoelectronics
2009

Huazhong University of Science and Technology
2009

Northeastern University
2008

Cloud storage has been gaining tremendous popularity, which provides facilitative data and sharing services for distributed clients. To maximize the availability reliability, some customers may store multiple replicas of critical on cloud servers. However, servers collude to make it look like they are storing copies data, whereas in fact only a single copy. Currently, several multi-replica provable possession schemes have proposed provide verifications ensure that all outsourced actually...

10.1109/access.2017.2776275 article EN cc-by-nc-nd IEEE Access 2017-01-01

In 2015, Wang proposed the first identity-based provable data possession scheme named ID-DPDP (IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328-340, Mar./Apr. 2015) to verify outsourced publicly without implementation of PKI. Unfortunately, in this letter, we demonstrate that is insecure sense cloud servers can generate valid proofs possessing original blocks. We also show another security issue which leads some blocks never be verified unless all are challenged. Meanwhile,...

10.1109/tsc.2016.2589248 article EN IEEE Transactions on Services Computing 2016-11-01

10.1016/j.compeleceng.2024.109434 article EN Computers & Electrical Engineering 2024-07-08

AbstractWe consider the problem of authenticating packets transmitted over a Wireless Sensor Networks (WSN) controlled by an adversary who may perform arbitrary attacks on packets: He drop or modify chosen packets. The prior works data authentication WSN have focused less powerful adversarial network model examined considerably more restrictive setting with specific timing structural assumptions about WSN. We also ability to n parameter: survival rate α (0 < α≤ 1) denoting fraction that are...

10.4103/0256-4602.113496 article EN IETE Technical Review 2013-01-01

10.1007/s12652-015-0258-y article EN Journal of Ambient Intelligence and Humanized Computing 2015-02-21

10.6688/jise.2017.33.4.7 article EN Journal of information science and engineering 2017-07-01

With the growing trend toward using cloud storage, problem of efficiently checking and proving data integrity needs more consideration. Many cryptography security schemes, such as PDP (Provable Data Possession) POR (Proofs Retrievability) were proposed for this problem. Although many efficient schemes static have been constructed, only a few dynamic exist, DPDP (Dynamic Provable Possession). But scheme falls short when updates are not proportional to fixed block size. The FlexList-based...

10.1109/cc.2016.7405710 article EN China Communications 2016-01-01

Logical key tree is an important issue for multicast management. The degree of a and the algorithm which maintains balance has great effect on paper makes analysis with using hierarchical data processing model. complete quad taken as logical structure management, rebuilding based idea subtree movement so that external cost caused by balancing can be reduced. This gives designing idea, analyzes devises realization algorithms, constructs practical management scheme. shows this scheme simple to...

10.1109/icycs.2008.252 article EN 2008-11-01

10.1016/j.jisa.2019.102392 article EN Journal of Information Security and Applications 2019-10-15

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4765590 preprint EN 2024-01-01

As authentication provides crucial online identity, it is the basis of data security. In this paper, a session based proposed and long unique un-guessable identifier used as parameter an token. It has advantages one-timeness, short-lived no prior knowledge requirement. The model established with detailed implementation communication protocol. security protocol then analyzed formally results show that can resist various attacks, e.g. hijacking, message replay pharming attacks etc. Finally,...

10.1109/icc.2009.5199560 article EN IEEE International Conference on Communications 2009-06-01

In the era of big data, cloud storages become prevalent while security issues on outsourced data emerge. Without physical control owners, faces more risks. Provable Data Possession (PDP) is a probabilistic technique for checking whether correctly stored in remote servers without retrieving entire data. For many previous PDP schemes, choosing public keys owners relies Public Key Infrastructure (PKI), which resource consuming. this paper, we propose an Identity-Based Batch (ID-BPDP) scheme to...

10.1142/s0129054117400160 article EN International Journal of Foundations of Computer Science 2017-09-01

In the collaborative design metaverse application, team as data owner(DO) has demanded to outsource digital model a cloud service provider(CSP) due limit of local storage. They also need frequently search and update for improving design. But virtual world is mutual distrusted, which brings 4 major security concerns: 1) CSP may partially execute DOs' queries curious about keywords data, how protect privacy queries? 2) dishonestly save cost or under other considerations, correctness integrity...

10.1109/smartworld-uic-atc-scalcom-digitaltwin-pricomp-metaverse56740.2022.00343 article EN 2022-12-01
Coming Soon ...