Please wait a minute...

Current Issue

    25 July 2017, Volume 38 Issue 7
    Papers
    Cloud storage scheme based on closed-box encryption
    Rui-zhong DU,Shao-xuan WANG,Jun-feng TIAN
    2017, 38(7):  1-10.  doi:10.11959/j.issn.1000-436x.2017138
    Asbtract ( 377 )   HTML ( 4)   PDF (905KB) ( 878 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.

    Multiuser cyclic shift keying spread spectrum underwater acoustic communication
    Cheng-bing HE,Shao-jing JING,Fei HUA,Rui XI,Rui-yu ZHANG,Wen-tao SHI,Qun-fei ZHANG
    2017, 38(7):  11-17.  doi:10.11959/j.issn.1000-436x.2017141
    Asbtract ( 442 )   HTML ( 9)   PDF (963KB) ( 1032 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of low data rate and high receiver complexity of existing direct sequence spread spectrum code division multiple access (DS-CDMA),a novel code division multiple access (CDMA) using cyclic shift keying (CSK) signaling,namely CSK-CDMA,was proposed for multiuser underwater acoustic communication.The proposed method used the cyclic correlation characteristic of spread spectrum signals with M-ary modulation to provide a higher data rate than conventional.Passive time reversal technology was employed to suppress inter-code interference between users and the co-channel interference.The quasi-orthogonality of spread spectrum code was used to improve the processing gain.Multiuser communications are demonstrated with lake experimental recorded data under the condition of 5.27 km distance and complex multipath interference.The data rate is 39 bit/s/user for 6 users with bit error rate around 10-2~10-4.

    PoSW:novel secure deduplication scheme for collaborative cloud applications
    Jin-bo XIONG,Su-ping LI,Yuan-yuan ZHANG,Xuan LI,EA-yong Y,Zhi-qiang YAO
    2017, 38(7):  18-27.  doi:10.11959/j.issn.1000-436x.2017139
    Asbtract ( 429 )   HTML ( 9)   PDF (886KB) ( 756 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme.

    Incoherent dictionary learning and sparse representation for single-image rain removal
    Hong-zhong TANG,Xiang WANG,Xiao-gang ZHANG,Xiao LI,Li-zhen MAO
    2017, 38(7):  28-35.  doi:10.11959/j.issn.1000-436x.2017149
    Asbtract ( 439 )   HTML ( 4)   PDF (1873KB) ( 1038 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The incoherent dictionary learning and sparse representation algorithm was present and it was applied to single-image rain removal.The incoherence of the dictionary was introduced to design a new objective function in the dictionary learning,which addressed the problem of reducing the similarity between rain atoms and non-rain atoms.The divisibility of rain dictionary and non-rain dictionary could be ensured.Furthermore,the learned dictionary had similar properties to the tight frame and approximates the equiangular tight frame.The high frequency in the rain image could be decomposed into a rain component and a non-rain component by performing sparse coding based learned incoherent dictionary,then the non-rain component in the high frequency and the low frequency were fused to remove rain.Experimental results demonstrate that the learned incoherent dictionary has better performance of sparse representation.The recovered rain-free image has less residual rain,and preserves effectively the edges and details.So the visual effect of recovered image is more sharpness and natural.

    Nonlinear blind source separation algorithm based on spline interpolation and artificial bee colony optimization
    Lei CHEN,Shi-zhong GAN,Li-yi ZHANG,Guang-yan WANG
    2017, 38(7):  36-46.  doi:10.11959/j.issn.1000-436x.2017147
    Asbtract ( 346 )   HTML ( 3)   PDF (1213KB) ( 687 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A post-nonlinear blind source separation algorithm based on spline interpolation fitting and artificial bee colony optimization was proposed for the more complicated nonlinear mixture situations.The separation model was constructed by using the spline interpolation to fit the inverse nonlinear distortion function and using entropy as the separation criterion.The spline interpolation node parameters were solved by the modified artificial bee colony optimization algorithm.The correlation constraint was added into the objective function for limiting the solution space and the outliers wuld be restricted in the separation process.The results of speech sounds separation experiment show that the proposed algorithm can effectively realize the signal separation for the nonlinear mixture.Compared with the traditional separation algorithm based on odd polynomial fitting,the proposed algorithm has higher separation accuracy.

    Construction and count of multi-output rotation symmetric resilient functions with 8 input variables
    Jiao DU,Yu-jing SHANG,Jin-ling ZHAO,Le DONG,En ZHANG
    2017, 38(7):  47-55.  doi:10.11959/j.issn.1000-436x.2017140
    Asbtract ( 267 )   HTML ( 2)   PDF (732KB) ( 634 )   Knowledge map   
    References | Related Articles | Metrics

    The value ranges of the number of output variables were determined respectively under the existence of multi-output rotation symmetric balanced functions and resilient functions with 2rinput variables.Based on the equivalence between the resilient functions and large sets of orthogonal arrays,some results on the construction and count of multi-output rotation symmetric balanced functions with 8 input variables were presented according to the different dimensions of output vectors,and construction and count of multi-output rotation symmetric 1-resilient functions with 8 input variables were also studied.Besides,constructions of multi-output rotation symmetric resilient functions are transformed into the problem of solving a system of equations.

    Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking
    Le-tian SHA,Fu XIAO,Wei CHEN,Jing SUN,Ru-chuan WANG
    2017, 38(7):  56-69.  doi:10.11959/j.issn.1000-436x.2017143
    Asbtract ( 386 )   HTML ( 7)   PDF (1248KB) ( 1200 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.

    Study on distributed and dynamic resource management for delay-sensitive sensor network
    Wei LIU,Jun LIU
    2017, 38(7):  70-77.  doi:10.11959/j.issn.1000-436x.2017144
    Asbtract ( 248 )   HTML ( 12)   PDF (832KB) ( 816 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The delay-aware dynamic resource management problem was investigated in sensor network,with a focus on resource allocation among the sensors and power control along the time.By taking account of average delay requirements and power constraints,the considered problem was formulated into a stochastic optimization problem.Inspired by Lyapunov optimization theory,the intractable stochastic optimization problem was transformed into a tractable deterministic optimization problem,which was a mixed-integer resource management problem.By exploiting the specific problem structure,the mixed-integer resource management problem was equivalently transformed into a single variable problem,and the cooperative distributed method was present to effectively solve it with guaranteed global optimality.Finally,a dynamic resource management algorithm was proposed to solve the original stochastic optimization problem.Simulation results show the performance of the proposed dynamic algorithm and reveal that there exists a fundamental tradeoff between delay requirements and power consumption.

    Approach of location privacy protection based on order preserving encryption of the grid
    Nan SHEN,Chun-fu JIA,Shuang LIANG,Rui-qi LI,Zhe-li LIU
    2017, 38(7):  78-88.  doi:10.11959/j.issn.1000-436x.2017146
    Asbtract ( 459 )   HTML ( 2)   PDF (1034KB) ( 905 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The centralized structure of the trusted third party is a major privacy protection structure on location based services.However,if the central third party server can not be trusted or compromised,users have the risk of leakage of privacy location.Aiming at the above problems,location privacy protection approach based on a user-defined grid to hide location was proposed.The system first automatically converted the query area into a user-defined grid,and then the approach utilized order preserving encryption,which made the user’s real-time position in the hidden state could still be compared.Because the information in the process of the approach was in a state of encryption,the server could not know the user’s location information,thus improved privacy protection of the user location.The central third party server only need to do simple comparison work,so its processing time overhead would effectively decrease.Security analysis certificate the security of the proposed approach and simulation experimental show the proposed approach can reduce the time cost of the central third party server.

    Two-factor authenticated key agreement protocol based on biometric feature and password
    Xiao-wei LI,Deng-qi YANG,Ben-hui CHEN,Yu-qing ZHANG
    2017, 38(7):  89-95.  doi:10.11959/j.issn.1000-436x.2017148
    Asbtract ( 443 )   HTML ( 16)   PDF (686KB) ( 879 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.

    Multi-authority ABS supporting dendritic access structure
    Ruo MO,Jian-feng MA,Xi-meng LIU,Qi LI
    2017, 38(7):  96-104.  doi:10.11959/j.issn.1000-436x.2017150
    Asbtract ( 373 )   HTML ( 4)   PDF (861KB) ( 742 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Attribute-based signature (ABS),which could realize fine-grained access control,was considered to be an important method for anonymous authentication in cloud computing.However,normal ABS only provided simple access control through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud.Moreover,the attribute sets were supervised by only one attribute authority,which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached.Aiming at tackling the problems above,a novel scheme,was proposed called multi-authority ABS supporting dendritic access structure which supported any AND,OR and threshold gates and affords more flexible access control.Meanwhile,the attribute sets of users were classified by diverse attribute authorities which reduced the overhead and the risk of systems.Besides,the scheme is proved to be selective predicate chosen message attack secure in the random oracle model.

    Improving deep convolutional neural networks with mixed maxout units
    Hui-zhen ZHAO,Fu-xian LIU,Long-yue LI,Chang LUO
    2017, 38(7):  105-114.  doi:10.11959/j.issn.1000-436x.2017145
    Asbtract ( 419 )   HTML ( 3)   PDF (1213KB) ( 957 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The maxout units have the problem of not delivering non-max features, resulting in the insufficient of pooling operation over a subspace that is composed of several linear feature mappings,when they are applied in deep convolutional neural networks.The mixed maxout (mixout) units were proposed to deal with this constrain.Firstly,the exponential probability of the feature mappings getting from different linear transformations was computed.Then,the averaging of a subspace of different feature mappings by the exponential probability was computed.Finally,the output was randomly sampled from the max feature and the mean value by the Bernoulli distribution,leading to the better utilizing of model averaging ability of dropout.The simple models and network in network models was built to evaluate the performance of mixout units.The results show that mixout units based models have better performance.

    Research on the anti-synchronization chaos system group &large scale distributed system security communication
    Guang-ming SUN,Jin-jie HUANG,Qiao LIU
    2017, 38(7):  115-122.  doi:10.11959/j.issn.1000-436x.2017151
    Asbtract ( 261 )   HTML ( 2)   PDF (1012KB) ( 440 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Chaotic system model about point group symmetry in the phase space was constructed,and the anti-synchronization problem of the chaotic system group was studied.Besides,a kind of chaotic system group anti-synchronization controller was proposed,and the anti-synchronization of the chaos system group was realized.Through experimental observation,the position of chaos system about the subsystem and the source system after the point symmetry transform changed in phase space.The phase space power trajectory,space topology and other original system presented symmetrical structure.By using the above research conclusions,a kind of carrier communication method of anti-synchronization chaos system group was put forward.It solved the increasingly urgent communication security issues of modern complex distributed and large scale communication system with many access signals and parallel transmission.In addition,with permanent magnet synchronous motor chaos model,simulation and validation were conducted.The experimental results show that the method has good application prospect,and is suitable for modern communication system.

    Provably secure certificateless aggregate signature scheme in wireless roaming authentication
    Zhi-yan XU,Li-bing WU,Li LI,De-biao HE
    2017, 38(7):  123-130.  doi:10.11959/j.issn.1000-436x.2017152
    Asbtract ( 371 )   HTML ( 15)   PDF (693KB) ( 737 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue,a new secure and efficient certificateless aggregate signature scheme was presented,which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme,the proposal is more secure and the total computational cost is greatly reduced .

    Block Markov superposition transmission over turbulence channels in outdoor optical wireless communication
    Jin-shun ZHU,Xiao MA
    2017, 38(7):  131-140.  doi:10.11959/j.issn.1000-436x.2017153
    Asbtract ( 396 )   HTML ( 2)   PDF (1043KB) ( 990 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the equivalent genie-aided system,the bit-error rate of the block Markov superposition transmission system was analyzed and the union bound of the bit-error rate of the genie-aided system was derived.When the bit-error rate was extremely low at which the Monte Carlo simulation was time-consuming,the union bound could be adopted to evaluate the performance of the block Markov superposition transmission system.Simulations under turbulence conditions from weak to strong are performed which show that,in the low bit-error rate region,performance of the block Markov superposition transmission system matches well with the lower bound.It is also illustrated that the derived union bound matches well with Monte Carlo simulation result.At the BER of 10-5,block Markov superposition transmission system with transmission memory 2 performs within 1 dB away from the Shannon limit.

    Comprehensive Reviews
    Scalability of software defined network
    Yong-hong FU,Jun BI,Ke-yao ZHANG,Jian-ping WU
    2017, 38(7):  141-154.  doi:10.11959/j.issn.1000-436x.2017137
    Asbtract ( 665 )   HTML ( 31)   PDF (1268KB) ( 1258 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of software-defined networking (SDN),its scalability has become one of the most important issues of SDN.The features of SDN was studied which lead to its scalability problem when SDN was applied to large-scale network.The three main causes leading to scalability problem were discussed:control plane and data plane separation,logical centralized control and fine-grained flow control.Meanwhile,the studies which focus on the scalability of SDN from three aspects:scalability of performance,scalability of geographic and scalability of control was presented.Further,the studies on the performance evaluation of the scalability of SDN were introduced.Finally,the future work was discussed.

    Survey of controller placement problem in software defined network
    Xian-ming GAO,Bao-sheng WANG,Wen-ping DENG,Jing TAO
    2017, 38(7):  155-164.  doi:10.11959/j.issn.1000-436x.2017136
    Asbtract ( 631 )   HTML ( 8)   PDF (787KB) ( 1199 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to change situation of high management complexity in current Internet,software defined network (SDN) was proposed,which mainly aimed to directly control forwarding behaviors of data-flow by using flow strategies generated by controllers.With the deployment and applications of SDN,research communities found that the controller placement in SDN network could directly affect network performance.In recent years,controller placement problem (CPP) has become a hot topic,where performance metric and searching algorithms are important research areas.Based on current researches,the existing controller placement problem was systematically analyzed and summarized,which was expected to be helpful for the follow-up research.

    Correspondences
    Research on dynamic migration of virtual machine based on security level
    Shuo ZHAO,Xin-sheng JI,Yu-xing MAO,Guo-zhen CHENG,Hong-chao HU
    2017, 38(7):  165-174.  doi:10.11959/j.issn.1000-436x.2017091
    Asbtract ( 467 )   HTML ( 4)   PDF (768KB) ( 817 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Side-channel attacks were the main ways of multi-tenant information leakage in the cloud computing and data center environments.The existing defense approaches based on dynamic migration of virtual machine have long convergence time of migration algorithm and high migration cost.Hence,a dynamic migration of virtual machine based on security level was proposed.Firstly,security level classification of virtual machines was used to reduce the number of migrating virtual machines.Then the corresponding virtual machines embedding strategy was used to reduce the frequency of virtual machines migration.Simulation experiments demonstrate that the proposed approach can reduce convergence time of migration algorithm and migration cost.

    Cooperative spectrum sensing scheduling scheme based on discrete particle swarm optimization algorithm
    Xing ZHANG,Ye WANG,Yi YANG,Qin-yu ZHANG
    2017, 38(7):  175-185.  doi:10.11959/j.issn.1000-436x.2017046
    Asbtract ( 285 )   HTML ( 4)   PDF (1790KB) ( 707 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The statistical characteristics of the network state changes were analyzed by using the CTMC model.Considering the difference of each secondary user’s sensing ability,two integer programming problems on cooperative sensing scheduling scheme were established from two aspects:the primary users and the secondary users respectively.A discrete particle swarm optimization algorithm was proposed to solve the integer programming problems,and compared with the traditional random scheduling scheme and greedy scheduling scheme based on SNR.The simulation results show that the cooperative sensing scheduling scheme based on discrete particle swarm optimization algorithm is superior to random scheduling scheme and greedy scheduling scheme based on the SNR,which gets a higher spectrum sensing accuracy.

    Research on industrial control system intrusion detection method based on simulation modelling
    Yi-wei GAO,Rui-kang ZHOU,Ying-xu LAI,Ke-feng FAN,Xiang-zhen YAO,Lin LI
    2017, 38(7):  186-198.  doi:10.11959/j.issn.1000-436x.2017133
    Asbtract ( 350 )   HTML ( 10)   PDF (1281KB) ( 768 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    At present,intrusion detection system over fieldbus network layer was a basic protection method in industrial control system.However,it has some weakness,such as poor generality,high false-positive rate,and unable to detect unknown anomaly.An industrial control system intrusion detection method based on fieldbus network equipment simulation was proposed.The method prevented control program from being tampered or destroyed based on controller simulation modelling.Controlled object simulation modelling was designed for ensuring that the system input was credible.Thus the intrusion detection of industrial control network was realized.At last,the results indicate that the proposed intrusion detecting method is available.

    Proxy-cryptocurrency payment system
    Xiao-tong FU,Si CHEN,Ning ZHANG
    2017, 38(7):  199-206.  doi:10.11959/j.issn.1000-436x.2017121
    Asbtract ( 452 )   HTML ( 23)   PDF (755KB) ( 1290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.In the system,public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.However,all the transaction information was recorded in the block chain,it was a potential threat for users’ privacy which might leak the payment information.Moreover,to avoid double-spending,it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.The long waiting time reduced the efficiency of the payment system.A model of payment system based on a proxy-cryptocurrency was proposed,and a solution based on blind signature techniques was proposed.The scheme introduced a proxy in the payment phase,by which transaction confirmation time could be reduced and the transaction efficiency could be improved.Meanwhile,the system implements better anonymity,namely as the privacy protection function.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: