Please wait a minute...

����Ŀ¼

    15 November 2017, Volume 3 Issue 11
    Academic paper
    Research on attribute-based encryption with keyword search for cloud storage
    Zhi-qiang ZHU,Hang SU,Lei SUN,Zuo-hui LI
    2017, 3(11):  1-11.  doi:10.11959/j.issn.2096-109x.2017.00214
    Asbtract ( 1700 )   HTML ( 7)   PDF (759KB) ( 2820 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism that requires the private key of data owner to resist the keyword guessing attack,supports one-to-many application scenarios based on the linear secret shared access structure,introduces the conjunctive subset keyword search technique and online/offline technique to improve search flexibility and efficien-cy.Theoretical analysis and experimental evaluation show that the proposed scheme enjoys high efficiency.

    Routing scheme for key-relaying-based quantum key distribution network in wide-area
    Chao YANG,Hong-qi ZHANG,Jin-hai SU,Hua-cheng CHEN
    2017, 3(11):  12-21.  doi:10.11959/j.issn.2096-109x.2017.00215
    Asbtract ( 1379 )   HTML ( 12)   PDF (716KB) ( 2120 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing routing schemes for key relaying QKD network had a limited scope of application and could not satisfy the requirements of the routing issue of wide-area QKD network.A multi-domain routing scheme based on visual link was proposed for QKD network after the analyzing of the characteristics of QKD network and the proposing of the design requirements of routing issue.In this routing scheme,the QKD network was divided into multiple routing areas to reduce the complexity of intra-domain routing,and a visual QKD link striding over the whole key routing area was built to shorten the routing path.Therefore,the routing efficiency can be increased by this scheme.After theoretical analysis,the proposed routing scheme has advantages of fast convergence of routing update,little time delay and low key material cost.

    Privacy-preserving scheme for logistics systems based on 2D code and information hiding
    Wen-bo YAN,Yuan-zhi YAO,Wei-ming ZHANG,Neng-hai YU
    2017, 3(11):  22-28.  doi:10.11959/j.issn.2096-109x.2017.00210
    Asbtract ( 2142 )   HTML ( 14)   PDF (905KB) ( 2220 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With regard to the user privacy leakage problem in existing logistics systems,a privacy-preserving scheme for logistics systems based on 2D code and information hiding was proposed.The information hiding tech-nique was used in the proposed scheme to embed the user privacy information into the 2D code on the logistics waybill to achieve access control.To secure the user privacy information,a JPEG image stenographic algorithm for 2D code was designed.Experimental results demonstrate that this algorithm can guarantee the high undetectable performance and the stego 2D code can be correctly decoded.Using the proposed scheme,the institution or the per-son that has the access right can obtain the important privacy information so that the express can be delivered cor-rectly and the user privacy can be preserved.

    Design and implementation of hardware-based dynamic instruction set randomization framework
    San DU,Hui SHU,Fei KANG
    2017, 3(11):  29-39.  doi:10.11959/j.issn.2096-109x.2017.00216
    Asbtract ( 1233 )   HTML ( 2)   PDF (673KB) ( 2508 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    All the existing ISR methods have some defects including stripping data from code segment is hard to accomplish,static ISR has fixed key and pseudo-random key is not secure.To introduce ISR technology into the se-curity protection of kernel layer and application layer,hardware-based dynamic instruction set randomization framework (HDISR) was designed and implemented,in which program code was encrypted at loading time.Kernel encryption uses kernel key and applications encryption uses a different user key per process.The experimental re-sults show that HDISR can degrade code injection attack to Denial of Service attack with less than 2.57% additional hardware and 0.31s startup delay of each megabyte code encryption.

    Secure control plane for SDN using Bayesian Stackelberg games
    Zhen-ping LU,Fu-cai CHEN,Guo-zhen CHENG
    2017, 3(11):  40-49.  doi:10.11959/j.issn.2096-109x.2017.00211
    Asbtract ( 1542 )   HTML ( 2)   PDF (1058KB) ( 2282 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A dynamic scheduling controller in SDN control layer was proposed by dynamically transform heteroge-neous controlled in order to increase the difficulty of the attacker.Firstly,a dynamic scheduling method based on Bayesian Stackelberg games the attacker and defender were game participation on both sides,obtained the equili-brium,which guided the scheduling strategy.Secondly,introducing a self-cleaning mechanism,it improved the gain of the control layer security combined with game strategy form closed-loop defense mechanism.The experiments described quantitatively based on the game strategy compared with traditional safety control layer to deploy a single controller and adopt the strategy of random scheduling profit gain of the controller,and self-cleaning mechanism could make the control plane to be in a higher level of security.

    Key security detection based on dynamic binary instrumentation
    Hao LIN,Fei KANG,Yan GUANG
    2017, 3(11):  50-58.  doi:10.11959/j.issn.2096-109x.2017.00213
    Asbtract ( 1483 )   HTML ( 15)   PDF (678KB) ( 2614 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the key security problem in the cryptographic software,the method of key security detection based on dynamic binary instrumentation was proposed.Aimed at CryptoAPI cryptographic software,the method firstly pointed out the potential key security vulnerabilities by analyzing the key applying patterns of CryptoAPI.Then it recorded cryptographic data information during the execution of the program dynamically using Pin platform.On this basis,a relevance vulnerability detection algorithm was designed to detect the key security.Test result indicated that it can effectively detect the two kinds of key security vulnerabilities.

    Research of location privacy protection in wireless sensor network
    Ren-ji HUANG,Qing YE,Qian WU
    2017, 3(11):  59-67.  doi:10.11959/j.issn.2096-109x.2017.00212
    Asbtract ( 1228 )   HTML ( 18)   PDF (572KB) ( 2775 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.

    Malware classification method based on static multiple-feature fusion
    Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI
    2017, 3(11):  68-76.  doi:10.11959/j.issn.2096-109x.2017.00217
    Asbtract ( 1718 )   HTML ( 85)   PDF (529KB) ( 7668 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In recent years,the amount of the malwares has tended to rise explosively.New malicious samples emerge as variability and polymorphism.By means of polymorphism,shelling and confusion,traditional ways of detecting can be avoided.On the basis of massive malicious samples,a safe and efficient method was designed to classify the mal-wares.Extracting three static features including file byte features,assembly features and PE features,as well as im-proving generalization of the model through feature fusion and ensemble learning,which realized the complementarity between the features and the classifier.The experiments show that the sample achieve a stable F1-socre (93.56%).

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: