Please wait a minute...

����Ŀ¼

    15 December 2015, Volume 1 Issue 1
       Next Issue
    Papers
    A differentially-private mechanism for multi-level data publishing
    Wen-jing ZHANG,Hui LI
    2015, 1(1):  58-65.  doi:10.11959/j.issn.2096-109x.2015.00008
    Asbtract ( 1671 )   HTML ( 15)   PDF (708KB) ( 3510 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .

    Traffic anomaly detection method in networks based on improved clustering algorithm
    Hong-cheng LI,Xiao-ping WU,Hong-hai JIANG
    2015, 1(1):  66-71.  doi:10.11959/j.issn.2096-109x.2015.00009
    Asbtract ( 1427 )   HTML ( 9)   PDF (484KB) ( 2964 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem that traditional traffic abnormal detection methods were not accurate enough,a traf-fic anomaly detection method based on improved k-means was proposed.All kinds of network traffic data were pre-processed to make k-means algorithm can apply to enumeration data detection.Then a features selection method was pro-posed with the analysis of the distribution of network traffic data to avoid the distance useless caused by too much fea-tures.Furthermore,the clustering process of K clusters was optimized based on dichotomy,aiming to reduce the effects of initial clusters centers selection.Simulation results demonstrate the effectiveness of the algorithm.

    An ownership transfer protocol for wearable devices
    Shun HU,Jian WENG,Jia-nan LIU
    2015, 1(1):  72-80.  doi:10.11959/j.issn.2096-109x.2015.00010
    Asbtract ( 1081 )   HTML ( 4)   PDF (901KB) ( 1576 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Recently,wearable devices acted as a kind of smart devices are changing people’s life style.When these devices are used in multi-user setting,ownership transfer should usually be considered.To resolve the security and privacy problems introduced in the ownership transfer process of wearable devices,a secure ownership transfer pro-tocol including initialization,mutual authentication and key change for wearable devices was introduced.The secu-rity analysis indicates that the proposed protocol can resist either normal channel attacks or special attacks appeared in the ownership transfer scenarios.The experiment results indicate that the proposed scheme is fairy efficient and is quite suitable for wearable devices.

    Location privacy protection for mobile social network
    Zhi-kai XU,Hong-li ZHANG,Jian-tao SHI,Zhi-hong TIAN
    2015, 1(1):  50-57.  doi:10.11959/j.issn.2096-109x.2015.00007
    Asbtract ( 1478 )   HTML ( 7)   PDF (1337KB) ( 2345 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Given its high utility value,mobile social network services(MSNS),however,has raised serious concerns about users’ location privacy.The location privacy requirements of users in MSNS are personal and dynamic,thus a metric called confidence was proposed to quantify the privacy risks.To avoid the adversary inferring users’ privacy,a method of legation privacy protection was designed to calculate the correlation between the locations through lo-cation information,social relation and personal information.Then the correlation and the space-time background were used to evaluate whether the users’ published geo-content meet the user’s privacy requirement.Eventually,our experimental results demonstrate the validity and practicality of the proposed strategy.

    Comprehensive Reviews
    Analysis of cyberspace security based on game theory
    Jian-ming ZHU,Qin WANG
    2015, 1(1):  43-49.  doi:10.11959/j.issn.2096-109x.2015.00006
    Asbtract ( 1760 )   HTML ( 11)   PDF (764KB) ( 5685 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and defense,cryptographic protocol design,and security technology con-figuration.The conflicts between attackers and defenders as well as the dependence among defenders were mainly analyzed on network and defense.Game theory’s applications in secret sharing and secure multi-party computation were emphasized on cryptographic protocol design.The game theory’s applications in intrusion detection system and firewall technology were analyzed on security technology configuration.Finally,the limitations of current re-searches and carries on the forecast to the future research directions were pointed out.

    Research on scenario-based mechanism in privacy-aware mobile networks
    Ben NIU,Feng-hua LI,Jia-feng HUA,Yuan-yuan HE
    2015, 1(1):  31-42.  doi:10.11959/j.issn.2096-109x.2015.00005
    Asbtract ( 1169 )   HTML ( 12)   PDF (1471KB) ( 2040 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The well-developed information services has infiltrated in each part of our daily life,various novel ser-vice modes and applications provide us conveniences at the cost of our privacy.This situation becomes more serious with the increasing number of applications and users’ requirements.The privacy issues of scenario-based mechanism in mobile networks have been studied based on analyzing the state-of-the-art research trends.The threat and chal-lenges of privacy disclosure caused by the mobile network services,and review the scenarios,service models and attack models were introduced firstly.Followed,a comprehensive study on current status of background information,quality of services,and resource-restricted related privacy preservation were made.Finally,some key technologies on privacy preservation such as background information modeling and descripting,multi-background information fusion,quality of services descripting and modeling,self-adaptive methods based on historical information,pri-vacy-preserving solutions optimizing energy resources and privacy-preserving schemes equalizing multiple factors etc were posted.

    Perspectives
    Suggestions on cyber security talents cultivation
    Hui LI,Ning ZHANG
    2015, 1(1):  18-23.  doi:10.11959/j.issn.2096-109x.2015.00003
    Asbtract ( 1862 )   HTML ( 26)   PDF (357KB) ( 6857 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cyber security has been approved to be the first level discipline by Academic Degrees Committee of the State Council.It is important to figure out the curriculum of this new discipline and make it clear what is the differ-ence between this new discipline and existed ones.The relationship between cyber security discipline and other dis-ciplines such as information and communication engineering,computer sciences and technology,etc was analyzed.The cyber security was divided into 5 research areas,including fundamental theory,physical security,network secu-rity,system security,data and information security.Based on a given knowledge framework,the cultivation standard for master and Ph.D.students,as well as a reference curriculum of cyber security discipline was proposed.Finally,some suggestions were given for training talents of cyber security.

    Comprehensive Reviews
    Analysis of the situation and problem on the legislation of cyberspace in China
    Yong-jiang XIE,Shu-li JIANG
    2015, 1(1):  24-30.  doi:10.11959/j.issn.2096-109x.2015.00004
    Asbtract ( 1216 )   HTML ( 10)   PDF (391KB) ( 4063 )   Knowledge map   
    References | Related Articles | Metrics

    The internet governance and legislation have experienced the free development,the exploration and the comprehensive stages.There are some problems about the current legislation,such as the law level is low,the high-level law is lack,the legislation is relatively scattered,legislation is lagging far behind the technology,the cur-rent law is principle and lack of the operability,legislation is heavy duty,light-rights,and so on.According to these conditions,accelerating the basic legislation,such as the cyber security law,the personal information protection act,the internet service administration law,the act of e-commerce,the e-government law,the telecommunications act,and so on was suggested,so as to build a relatively complete cyber law system.

    Perspectives
    Development trends of the information technology and cyberspace security
    Feng-hua LI
    2015, 1(1):  8-17.  doi:10.11959/j.issn.2096-109x.2015.00002
    Asbtract ( 1575 )   HTML ( 12)   PDF (3787KB) ( 3219 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.

    A hierarchy model on the research fields of cyberspace security technology
    Bin-xing FANG
    2015, 1(1):  2-7.  doi:10.11959/j.issn.2096-109x.2015.00001
    Asbtract ( 2439 )   HTML ( 27)   PDF (365KB) ( 4030 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the concepts of cyberspace security were advanced,and the definition was given.Then,a hierarchy model of cyberspace security was proposed.Based on the model,the details technologies of eight research fields of cyberspace security including information security,information secrecy,information coun-termeasure,cloud security,big data,IOT security,mobile security,and trustable computing were presented.New guidance and experience for the research in cyberspace security could be taken as.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:YI Dong-shan
Address:F8,You Dian Publisher Building,No.11,Chengshousi Road,Fengtai District,Beijing 100078,PR China
Tel:+8610-81055479, 81055456
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: