Xin Chen, Qiao-lin Hu, Haopeng Lu, G. Xia, Jun Long
{"title":"ILACF: An Incentive-Based Low-Latency Anonymous Communication Framework","authors":"Xin Chen, Qiao-lin Hu, Haopeng Lu, G. Xia, Jun Long","doi":"10.1109/TrustCom.2012.180","DOIUrl":"https://doi.org/10.1109/TrustCom.2012.180","url":null,"abstract":"With the more emphasis paid on network security and privacy, the research on anonymous communication system has developed quickly. In the past, researchers mainly focused on how to improve the anonymity, but few focused on how to encourage users to contribute for whole system. This paper presents an incentive mechanism and designs an Incentive-based Low-latency anonymous communication framework (ILACF). In this framework, firstly all nodes in anonymous communication system are divided into four types according to their contribution, and then router selection mechanism is presented. The traffic performance of ILACF is analyzed. The theoretic analysis and simulation experiment indicate that the incentive mechanism is very useful and ILACF can gain better communication performance than Tor and ALHACF.","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Easy-to-implement Campus Electronic Anonymous Voting System","authors":"Ruxian Zhang, Zhaoju Zhang, Hong Di","doi":"10.1109/TrustCom50675.2020.00214","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00214","url":null,"abstract":"With the rapid development of internet, the applications requiring unobservable communications increased, such as electronic payment, electronic voting and electronic bidding. The most typical electronic voting protocol was the FOO protocol, which is the first protocol that could be employed in large-scale voting. However, when used on campus, FOO protocol was rather complicated to configure. This paper focuses on scenes of campus voting, such as course evaluation, students’ mutual evaluation and students’ union election. The character of these scenes was that the interest involved was relatively small and required more attention to anonymity. Therefore, the paper simplified the FOO protocol, removed the counter, concerned about abstention problem and optimized to solve the problem of ballot collision that originally existed due to bit commitment. The experiment showed the correctness, non-reusability and anonymity of our proposed scheme. In addition, because the application used OpenSSL for end-to-end encryption, it can authenticate users and resist eavesdropping attacks and tampering attacks. Keywords—Anonymous, voting protocol, blind signature","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125793747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huan-Qiao Liu, Zhengjie Wang, Bin Jiang, Hongyu Peng
{"title":"An inertia wheel pendulum control method based on actor-critic learning algorithm","authors":"Huan-Qiao Liu, Zhengjie Wang, Bin Jiang, Hongyu Peng","doi":"10.1109/TrustCom53373.2021.00176","DOIUrl":"https://doi.org/10.1109/TrustCom53373.2021.00176","url":null,"abstract":"Based on the state-space representation of inertia wheel pendulum, Euler method is used to update the state of inertia wheel pendulum system. The effect of actor-critic algorithm on inertia wheel pendulum system control is studied with different sample time and different proportion of angle in reward. The results show that the training effect is better with smaller sample time. Because the main goal of inertia wheel pendulum control is to control the angle of the pendulum, more weight should be given to the angle in reward to make the training to be stable more easily.","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126384291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huan-Qiao Liu, Zhengjie Wang, Yao Chen, Hongyu Peng
{"title":"An axis extract method for rotational parts based on point cloud normal lines","authors":"Huan-Qiao Liu, Zhengjie Wang, Yao Chen, Hongyu Peng","doi":"10.1109/TrustCom53373.2021.00173","DOIUrl":"https://doi.org/10.1109/TrustCom53373.2021.00173","url":null,"abstract":"Based on that the normal lines of points on the same latitude of a surface of revolution point to the same point on the axis, a strategy is proposed to find the axis of the surface of revolution by fitting the intersections of normal lines. The k-d tree is used in this paper to address the computational challenges. The shortest distance between the normal lines of two points in the neighborhood of a certain point is calculated to determine whether the intersection of normal lines needs to be calculated. The RANSAC algorithm is used to fit the line to the normal lines intersections to obtain the axis. The axis extraction method is tested on cone, cylinder, spindle, and incomplete shapes of them. the error of extracted axis is small, indicating the feasibility of this method.","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs","authors":"Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang","doi":"10.1109/TrustCom.2014.32","DOIUrl":"https://doi.org/10.1109/TrustCom.2014.32","url":null,"abstract":"","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan
{"title":"SCPORAM: a hardware support scheme for protecting memory access patterns","authors":"Zhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan","doi":"10.1109/TrustCom50675.2020.00131","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00131","url":null,"abstract":"Oblivious RAM is a cryptographic protocol for hiding memory access patterns in the un-trusted external storage environment. Recently, Path ORAM has received wide attentions due to its simplicity and efficiency in secure processor design. Unfortunately, the memory bandwidth demand for Path ORAM is still too high, which restricts Path ORAM from further development. But overlapping paths can be cached to reduce memory bandwidth without the loss of security. In this paper, we present SCPORAM (Self Clustering Path ORAM), a clustering method for path merging, which transform memory requests into different categories. For each set, the intersection can be cached for every member sharing. Therefore, SCPORAM has the ability to effectively reduce memory access bandwidth. Based on this algorithm, a new ORAM controller is proposed. Compared to baseline Path ORAM, SCPORAM can reduce system overhead by 53%.","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121060323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao
{"title":"Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency","authors":"Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao","doi":"10.1109/TrustCom50675.2020.00015","DOIUrl":"https://doi.org/10.1109/TrustCom50675.2020.00015","url":null,"abstract":"Code randomization is considered as the basis of mitigation against code reuse attacks, fundamentally supporting some recent proposals such as execute-only memory (XOM) that aims at dynamic return-oriented programming (ROP) attacks. However, existing code randomization methods are hard to achieve a good balance between high-randomization entropy and semantic consistency. In particular, they always ignore code semantic consistency, incurring performance loss and incompatibility with current security schemes, e.g., control flow integrity (CFI). In this paper, we present an enhanced code randomization method termed as HCRESC, which can improve the randomization entropy significantly, meanwhile ensure the semantic consistency between variants and the original code. HCRESC reschedules instructions within the range of functions rather than basic blocks, thus producing more variants of the original code and preserving the code's semantic. We implement HCRESC on Linux platform of x86-64 architecture and demonstrate that HCRESC can increase the randomization entropy of x86-64 code over than 120% compared with existing methods while ensuring control flow and size of the code unaltered.","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"45 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122418566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical architecture of integrated big data platform","authors":"Yuan Liu, Yanmei Liu, Minjing Zhong","doi":"10.1109/TrustCom56396.2022.00222","DOIUrl":"https://doi.org/10.1109/TrustCom56396.2022.00222","url":null,"abstract":"The integrated big data platform aims to provide one-stop development and operation capabilities for massive heterogeneous data. Various components are organically combined and managed in a unified way. At the same time, the underlying technical details are shielded from users, so as to finally achieve the purpose of convenient data development, reducing operation and maintenance costs, and standardizing management processes. This article introduces the functional modules that the platform should have one by one, covering data storage, data integration, data management and governance, data development, data processing and analysis, high availability, operation and maintenance management, and data security. Finally, the typical characteristics and development direction of the integrated big data platform are pointed out.","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114261850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus","authors":"Tao Zhou, Quan Wang, G. Wang","doi":"10.1109/TrustCom.2014.114","DOIUrl":"https://doi.org/10.1109/TrustCom.2014.114","url":null,"abstract":"","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131236097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Evaluation System of Relational Cloud Database","authors":"Pengwei Ma, Kai Wei, Chunyu Jiang, Junyi Li, Jiafeng Tian, Siyuan Liu, Minjing Zhong","doi":"10.1109/TrustCom53373.2021.00191","DOIUrl":"https://doi.org/10.1109/TrustCom53373.2021.00191","url":null,"abstract":"With the continuous emergence of cloud computing technology, cloud infrastructure software will become the mainstream application model in the future. Among the databases, relational databases occupy the largest market share. Therefore, the relational cloud database will be the main product of the combination of database technology and cloud computing technology, and will become an important branch of the database industry. This article explores the establishment of an evaluation system framework for relational databases, helping enterprises to select relational cloud database products according to a clear goal and path. This article can help enterprises complete the landing of relational cloud database projects.","PeriodicalId":173549,"journal":{"name":"International Conference on Trust, Security and Privacy in Computing and Communications","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}