Please wait a minute...

����Ŀ¼

    15 April 2016, Volume 2 Issue 4
    Comprehensive Reviews
    Data security and protection techniques in big data:a survey
    Kai-min WEI,Jian WENG,Kui REN
    2016, 2(4):  1-11.  doi:10.11959/j.issn.2096-109x.2016.00046
    Asbtract ( 4054 )   HTML ( 132)   PDF (1446KB) ( 8167 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Big Data has attracted tremendous attention from all over the world nowadays.Its sheer volume,complex structure and realtime processing requirements often obsolete traditional technologies when coming to provide suffi-cient security protection.To address this challenge,significant research efforts have been carried out by the research community since recent years.Different technical aspects of big data security,including encryption algorithms,data integrity auditing,access control,secure data duplication,assured deletion,and secure search were surveyed,and in-depth discussions on their pros and cons were provided.Various future research directions were also discussed.

    Research and prospect of reversible data hiding method with contrast enhancement
    Yang YANG,Wei-ming ZHANG,ong-dong HOUD,Hui WANG,Neng-hai YU
    2016, 2(4):  12-20.  doi:10.11959/j.issn.2096-109x.2016.00045
    Asbtract ( 1728 )   HTML ( 16)   PDF (1137KB) ( 1790 )   Knowledge map   
    References | Related Articles | Metrics

    Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.

    Prospect of secure-efficient search and privacy-preserving mechanism on big data
    Shang LI,Zhi-gang ZHOU,Hong-li ZHANG,Xiang-zhan YU
    2016, 2(4):  21-32.  doi:10.11959/j.issn.2096-109x.2016.00041
    Asbtract ( 2003 )   HTML ( 28)   PDF (655KB) ( 2520 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With rapid development of information industry,services related to big data search have permeated into almost every aspect of human lives.Relevant technologies are undergoing profound changes,such as privacy pres-ervation for data fusion,context-aware search intention comprehending and statistic search pattern.The issues of secure-efficient search and privacy-preserving for big data were studied and looked ahead.Firstly,three chief scien-tific problems were refined from the aspects of multi-source data publication,awareness of users’ search require-ments and privacy-aware wise solutions,respectively.Secondly,main research contents were proposed,including big data oriented information fusion and knowledge extraction,granular knowledge representation and inference,interactive representation of search task,user experience driven task management,granular search pattern balancing utility with cost,and secure search mechanism based on differential privacy.Lastly,several promising techniques in future were discussed.

    Overview of privacy preserving in social network
    Rui-xin YAO,Hui LI,Jin CAO
    2016, 2(4):  33-43.  doi:10.11959/j.issn.2096-109x.2016.00036
    Asbtract ( 3846 )   HTML ( 127)   PDF (363KB) ( 5291 )   Knowledge map   
    References | Related Articles | Metrics

    Social network has gradually become the main way in communication with the development of informa-tion technology and the issue of privacy preserving in social network has also obtained more and more attention due to the interactive information exposed in the open social networks.Firstly,an overview of the concept of social net-work and privacy was givem.Secondly,the current mainly two methods:anonymity mechanism and access control technique employed for privacy preservation in social networks were reviewed and discussed.Finally,the vulner-abilities and challenges of the current mechanism were analyzed and the potential research issues for the future re-search works were showed.

    Survey of big-data-analysis-resistant privacy protection
    Wei TONG,AOYun-long M,Qing-jun CEHN,Bin-ru WANG,Bao-jia ZHANG,Sheng ZHONG
    2016, 2(4):  44-55.  doi:10.11959/j.issn.2096-109x.2016.00042
    Asbtract ( 3079 )   HTML ( 35)   PDF (367KB) ( 5509 )   Knowledge map   
    References | Related Articles | Metrics

    Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages.Therefore,privacy protection mechanisms that can defend against big data analysis is needed.A survey on related works was conducted,and the previous works were classified into three categories:privacy protection for massive high-dimensional heterogeneous data,location privacy protection and privacy protec-tion with enhanced utility.Then,the works in this area by COSEC group from nanjing university were introduced.At last,the privacy protection against big data analysis which was important and forward-looking was concluded,and the possible directions in this research area were introduced.

    Papers
    Research and simulation of timing attacks on ECC
    Hui-hui JIA,Chao WANG,Jian GU,Hao-hao SONG,Di TANG
    2016, 2(4):  56-63.  doi:10.11959/j.issn.2909-109x.2016.00025
    Asbtract ( 1527 )   HTML ( 5)   PDF (670KB) ( 2112 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.

    Differential fault analysis on EMV application cryptogram
    Qian PENG,Zeng-ju LI,Ru-hui SHI
    2016, 2(4):  64-72.  doi:10.11959/j.issn.2096-109x.2016.00044
    Asbtract ( 1209 )   HTML ( 2)   PDF (645KB) ( 1500 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using safe-error attack.The differential fault attack model and steps to implement the attack were proposed,two key factors(the probability of generating wrong key and the probability of collision happening) affecting an attacking result were analyzed.The theoretical result and simulation of the attack were given.The experiment results show that the two keys could be distinguished in a real attacking when the dif-ference of two key’s collision probability was bigger than 0.003 5.The dummy bits in the key will increase the dif-ference and make distinguishing easier.Finally,several countermeasures against the attack were proposed.

    Research on multi-dimensional iOS privacy disclosure evaluation model
    Yue-xiu XING,Ai-qun HU,Yong-jian WANG,Ran ZHAO
    2016, 2(4):  73-79.  doi:10.11959/j.issn.2096-109x.2016.00043
    Asbtract ( 1597 )   HTML ( 8)   PDF (303KB) ( 2250 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing iOS platform is lacking ofsystematic assessment methods of privacy leak detection.To solve this problem,a multi-dimensional iOSprivacy disclosure evaluation model was presented.This model combined static analysis,dynamic analysis and network data analysis method to extract the features of the application’s pri-vacy disclosure behavior and evaluate it form multiple dimensions way.The model on 30 different types of apps from the iOS App Store and found out that more than 50% of all investigated apps aretracking users’ locations were evaluated,almost 40% of all send data to a server without the user’s consent.The model makes up for the limitations of single static analysis or dynamic analysis methods,solves the quantization problem of privacy disclosure effectively.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: