Please wait a minute...

����Ŀ¼

    15 December 2016, Volume 2 Issue 12
    Overview
    Review of semantic-based privacy-preserving approaches in LBS
    Ming-jie MA,Yue-jin DU,Feng-hua LI,IUJia-wen L
    2016, 2(12):  1-11.  doi:10.11959/j.issn.2096-109x.2016.00088
    Asbtract ( 1751 )   HTML ( 25)   PDF (639KB) ( 3194 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The development of location-based services (LBS) caused serious privacy concerns.Semantic-based pri-vacy-preserving approaches is an important part of privacy protection in LBS.The recent work on location privacy protection based on semantics were summarized,including key factors in design of privacy protection,the feasibility of semantic protection,related concepts.Then semantic-based location privacy-preserving mechanisms,measure-ment methods of semantic similarity,evaluation index of privacy for semantic location privacy were discussed.Fi-nally,some future research directions of semantic-based location privacy protection were prospected.

    Papers
    Dynamic hierarchical quantum information sharing protocol
    Heng-yue JIA,Xia WU,Ke-jia ZHANG,Jian-ming ZHU,Yang LI
    2016, 2(12):  12-18.  doi:10.11959/j.issn.2096-109x.2016.00115
    Asbtract ( 1460 )   HTML ( 4)   PDF (904KB) ( 1665 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this protocol.The quantum information leader,in the absence of the establishment of a new quantum channel,can remove some of the participants in the secret reconstruction system.After the layoffs,the leader can also update the quantum information using quantum operations,and the remaining effective partici-pants can recover the new quantum information without performing additional operations.In addition,the correct-ness,security and the hierarchy of the participants of the protocol were discussed.

    Digital media representation under complex number base and its application on information hiding
    Wei CHEN,Ya-nan CHEN,IUYuan L
    2016, 2(12):  20-26.  doi:10.11959/j.issn.2096-109x.2016.00106
    Asbtract ( 1156 )   HTML ( 3)   PDF (1379KB) ( 1860 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development and wide application of the digital media technology,the information security problem is becoming more and more highly attention.Because of the various kinds of medias,previous research works have focused on a specific digital media from,such as text,image,audio and video.As a fact that all the objects were expressed in digital forms under the environment of computer and network,a unified form for all kinds of digital media under the complex number base system was proposed.The algorithm of the digital media signal and the complex number intercom version were given,so the relationship among the digital media could be converted to the corresponding geometric relationship on the complex plane.In the experiments,the proposed method was applied to the application of the digital media information hiding.

    Toward discovering and exploiting private server-side Web API
    Jia CHEN,Shan-qing1 GUO
    2016, 2(12):  27-38.  doi:10.11959/j.issn.2096-109x.2016.00134
    Asbtract ( 3215 )   HTML ( 43)   PDF (719KB) ( 2879 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Most of the interfaces for mobile application and server interaction use the Web API for communication,but the Web API introduced by these mobile applications may introduce new security issues.To facilitate the study of the security of Web API,a system for automatically discovering the server-side Web API interface in APK files based on the conventional Android program testing framework was designed and implemented.This system can help to develop the research on private server-side Web API interface security.

    Anonymous survey system based on NIZK
    Lu LIU,Yu-xi LI,Fu-cai ZHOU
    2016, 2(12):  39-46.  doi:10.11959/j.issn.2096-109x.2016.00121
    Asbtract ( 2073 )   HTML ( 25)   PDF (1563KB) ( 4169 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.

    HyperSpector:VMM dynamic trusted monitor based on UEFI
    Kai WANG,Zhi-hua LI,Fan, HUANG,Fei1 YAN
    2016, 2(12):  47-55.  doi:10.11959/j.issn.2096-109x.2016.00133
    Asbtract ( 1477 )   HTML ( 4)   PDF (439KB) ( 1990 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid innovation of computer technology,cloud computing model expands.VMM was intro-duced to enhance the cloud safety and enhance the cloud safety.The safety of VMM itself,however,is the prerequi-site of the safety of the cloud service.A method of VMM dynamic trusted monitor based on UEFI was proposed on the purpose of enhancing the safety of VMM.The monitor of VMM was realized by adding a monitor layer beneath it,which needed no more newly hardware cost.Experiment results show that the solution is efficient.

    Research on networking troubleshooting method based on software defined network
    Jia-wei LI,Zhi-ju YANG,Xi-jun LIN,UHai-peng Q
    2016, 2(12):  56-62.  doi:10.11959/j.issn.2096-109x.2016.00118
    Asbtract ( 1078 )   HTML ( 8)   PDF (596KB) ( 2115 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the reaserch status of networking troubleshooting in software defined network,a new net-working troubleshooting method was proposed.A TCP packet marked in head field was sent and detailed forward information in every hop would be written in its data filed once the test packet was matched.Taking advantages of the programmable feature of the controller and OpenFlow extensible match,special flow table was designed for matching test-used packet.The analysis module extracted and split the forward information,and thus printed the suspicious network problem which can be used to track and located the problematic network node.The experiment results indicate that the proposed method is fairy efficient.

    Research and applications of intelligent public security information system based on big data
    Dong-ke LI
    2016, 2(12):  63-68.  doi:10.11959/j.issn.2096-109x.2016.00138
    Asbtract ( 2189 )   HTML ( 28)   PDF (941KB) ( 5311 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The rapid development of big data push the big changes to every industries and government agencies.The concept of big data and security intelligent system framework was cleared.Then,the serious problems of the devel-opment of intelligent public security were analyzed,the novel work model of public security was also studied,and the new paths and method were pointed ont.Next,the intelligent information system for public security was built up,and the effectiveness of this system were evaluated.The system can efficiently meet the requirements of the current public security,and serve the national security with great significance.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: