Please wait a minute...

����Ŀ¼

    15 July 2016, Volume 2 Issue 7
    perspective
    Suggestion on establishing curriculum system for information security major
    Xiang-shen MIN,Jiu-lun FAN,Xue-feng ZHANG,Yi-xian LIU,Fang REN
    2016, 2(7):  1-7.  doi:10.11959/j.issn.2096-109x.2016.00068
    Asbtract ( 204 )   HTML ( 11)   PDF (987KB) ( 194 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The problems of information security demands for professional talents and existing curriculum system setting of information security major were analyzed.A modular and hierarchical curriculum system construction scheme of information security was given under the guidance of information security professional standards promulgated by the Ministry of Education Information Security Teaching Guidance Committee.The construction of curriculum system for information security major at Xi'an University of Posts and Telecommunications was taken as the example.The modular and hierarchical optimization and implementation scheme of information se-curity undergraduate curriculum system were designed.It will be valuable to the information security profes-sional talent training.

    Overview
    Research on privacy preserving mechanism of attribute-based encryption cloud storage
    Tao FENG,Xiao-yu YIN
    2016, 2(7):  8-17.  doi:10.11959/j.issn.2096-109x.2016.00070
    Asbtract ( 236 )   HTML ( 14)   PDF (426KB) ( 538 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The typical cloud storage architecture was presented as research objects and the privacy preserving mechanism of attribute-based encryption cloud storage including following aspects-data owner,cloud servers,au-thorized agency,data user and revocation of user was researched.By analyzing and comparing,it was discovered that the privacy preserving problems of cloud storage could be divided into privacy issues of users' identity,sensitive attribute information disclosure and leakage of privacy content in the system.Aiming at the above problems,the current privacy preserving mechanism of attribute-based encryption cloud storage was studied and shortages of the present schemes,possible solutions and the study trend in the future were discussed.

    Academic paper
    Research on metrics models for cloud services information security evaluation
    Yue-ming LU,Zhi-hui ZHANG
    2016, 2(7):  18-25.  doi:10.11959/j.issn.2096-109x.2016.00075
    Asbtract ( 135 )   HTML ( 3)   PDF (606KB) ( 174 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Due to the lack of metric standards and the metric imprecise problems of cloud service information secu-rity,the research status of the relevant standards at home and abroad were introduced.As for the demand for infor-mation security measurement requirements of the trusted cloud,the advantages and disadvantages of metric models based on the trusted root were analyzed.At last,the future research direction which was to study a scalable com-bined,real-time,privacy protected,easy to transplant and less cost metrics model was pointed out.

    Implementation of shared file encrypted storage hierarchical access control scheme
    Li LI,Guo-zhen SHI,Xuan WANG,Yun-fei CI
    2016, 2(7):  26-32.  doi:10.11959/j.issn.2096-109x.2016.00077
    Asbtract ( 180 )   HTML ( 8)   PDF (677KB) ( 148 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing classification management unit in the system,classification of users and documents,users of file access control were achieved,the scope of file access control was realized.Security of file storage and transmission was realized through encryption,the key storage was simplified using hierarchical key.Server file en-cryption and decryption operations were achieved through a special password card,which reduced the server work-load and accelerated the file encryption and decryption processing.The scheme was verified on PC and Zynq plat-form,and the predetermined function was realized.

    Pre-authentication and group management based secure handover for space-earth integration network
    Jia-nan HONG,Shao-hua LI,Kai-ping XUE,Pei-lin HONG
    2016, 2(7):  33-41.  doi:10.11959/j.issn.2096-109x.2016.00081
    Asbtract ( 247 )   HTML ( 21)   PDF (768KB) ( 155 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.

    On the coding rate for differential modulation and detections
    Ya-chong XU,Dong-wei HU
    2016, 2(7):  42-48.  doi:10.11959/j.issn.2096-109x.2016.00072
    Asbtract ( 147 )   HTML ( 3)   PDF (821KB) ( 105 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Differential demodulation is an important method of solving the information transmission which is used in the high dynamic condition of the wireless communication.The coding rate for differential modulation and detec-tions neither be too high,nor be too low.To find the optimal coding rate,the Shannon limit of error free transmis-sions with different rates for differential BPSK and differential QPSK were derived.Thereafter,the optimal coding rate was obtained from the view point of information theory.Convolutional codes and Turbo codes with different rates were employed,and simulations were conducted for the verification of the result.

    Research on FAHP based Trojan attack effect evaluation
    Chen-xi ZENG,Quan-yuan WU,Ai-ping LI,Rong JIANG
    2016, 2(7):  49-58.  doi:10.11959/j.issn.2096-109x.2016.00073
    Asbtract ( 140 )   HTML ( 2)   PDF (882KB) ( 132 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The particular characters of Trojan are not fully taken into consideration by existed network attack effect evaluation systems which mainly focus on DDoS and Warm.A few Trojan harm measurement systems is somewhat short for objectivity and completeness as the result of that its indicator values is confined to manually marked and qualitative values.Under the circumstances,the analysis of Trojan's features were started from,and a hierarchical index system which accepted both quantitative and qualitative values,and both manually marked and system col-lected values was built.Then,a FAHP based evaluation model was proposed to evaluate the Trojan attack effect.Meanwhile,a many-to-one method to ensemble multiple weight vectors was proposed.Finally,the rationality of proposed evaluation system was verified by comparison with others.

    Firmware vulnerability analysis based on formal verification of software and hardware
    Peng-hui ZHANG,Xi TIAN,Kang-wei LOU
    2016, 2(7):  59-68.  doi:10.11959/j.issn.2096-109x.2016.00071
    Asbtract ( 219 )   HTML ( 11)   PDF (1445KB) ( 432 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software and hardware in the computer boot process was modeled and analyzed.By adjusting the attack model,a secure vulnerability in the update process of the firmware was found,and its existence by an experiment,which proved the reliability of formal verification was demonstrated.

    Feature extraction of side channel signal based on EMD and difference spectrum of singular value
    Yan-li YAO,Zhen WU,Jin-tao RAO,Min WANG,Zhi-bo DU
    2016, 2(7):  69-75.  doi:10.11959/j.issn.2096-109x.2016.00069
    Asbtract ( 205 )   HTML ( 6)   PDF (1236KB) ( 341 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to extract feature information of side channel signal from the strong noise,the approach of signal feature extraction was proposed on account of empirical mode decomposition (EMD) and difference spectrum of singular value.Firstly,using EMD to decompose the original side channel signal,the correlation coefficient between all the intrinsic mode functions (IMF) and the original signal were calculated to find the component of biggest simi-lar characteristic.Then,to make a singular value decomposition of IMF component and corresponding difference spectrum of singular values was obtained.Finally,according to the difference spectrum,the filtered and recon-structed signal of IMF component was obtained,and the feature information of component was further extracted.The actual examples show that the method can extract characteristic information of side channel signal validly and improve the SNR and success rate of attack of signal successfully.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: