{"title":"Highly Efficient Anonymous IoT Authentication using Composite Hashing","authors":"H. Chien","doi":"10.1109/DSC49826.2021.9346263","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346263","url":null,"abstract":"Considering many Internet of Things (IoT) devices are resource-limited and their identities might disclose sensitive information, highly efficient and anonymous IoT authentication scheme is desirable for these IoT scenarios. In this paper, we propose a new anonymous IoT authentication scheme, using the composite hashing. The merits of this work are four-fold. (1) A new anonymous IoT authentication scheme is proposed; (2) the pre-calculation of pseudonym vectors can tackle Denial-of-Service attacks or unreliable connection issues; (3) the evaluations and analysis demonstrate its excellent performance in terms of computation, communication, and security properties; (4) an instantiation of applying this scheme on a standard IOT protocol like MQTT is described. Its excellent performances make it very attractive for those resource-limited IoT devices with anonymity requirement.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126143390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sumit Kumar Debnath, K. Sakurai, Kunal Dey, Nibedita Kundu
{"title":"Secure Outsourced Private Set Intersection with Linear Complexity","authors":"Sumit Kumar Debnath, K. Sakurai, Kunal Dey, Nibedita Kundu","doi":"10.1109/DSC49826.2021.9346230","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346230","url":null,"abstract":"In the context of privacy preserving protocols, Private Set Intersection (PSI) plays an important role due to their wide applications in recent research community. In general, PSI involves two participants to securely determine the intersection of their respective input sets, not beyond that. These days, in the context of PSI, it is become a common practice to store datasets in the cloud and delegate PSI computation to the cloud on outsourced datasets, similar to secure cloud computing. We call this outsourced PSI as OPSI. In this paper, we design a new construction of OPSI in malicious setting under the Decisional Diffie-Hellman (DDH) assumption without using any random oracle. In particular, our OPSI is the first that incurs linear complexity in malicious environment with not-interactive setup. Further, we employ a random permutation to extend our OPSI to its cardinality variant OPSI-CA. In this case, all the properties remain unchanged except that the adversarial model is semi-honest instead of malicious.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131798075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Rangan, K. Sakurai
{"title":"A Distributed Ledger Management Mechanism for Storing and Selling Private Data","authors":"Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Rangan, K. Sakurai","doi":"10.1109/DSC49826.2021.9346258","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346258","url":null,"abstract":"Storing and processing huge amount of private data is a challenging problem. The problem becomes, in particular, interesting if the user-side storage and computational power is limited. One way to solve the problem of outsourcing private data and maintaining an access control on the storage is proposed by using blockchain technology. However, blockchain technology requires heavy computational power and machinery. In this paper, we propose an approach to store and sell private data with the help of secret sharing. In comparison to blockchain, our methodology is simpler and preserves the privacy of stored data.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective","authors":"Hao Wang, Chunpeng Ge, Zhe Liu","doi":"10.1109/DSC49826.2021.9346243","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346243","url":null,"abstract":"Blockchain technology enables global mutually trustless participants to reach a consensus on the final state of permissionless distributed and decentralized ledgers. Due to its properties of openness, transparency, irreversibility, and credibility, many systems have been built based on blockchains' structure, such as Bitcoin and Ethereum. With the wide application of blockchains, however, many security problems still exist in blockchains and there have been many malicious attacks against blockchain systems. Although these attacks have been proposed, there lacks a systematic exploration of how these attacks have been conducted and what underlying relationship they have. In this paper, we firstly present and summarize several current attacks on blockchains in three aspects: system deficiency attacks, mining attacks, and network-level attacks. Secondly, we conduct a systematic analysis and evaluation of the possibility of these attacks occurring on major blockchain platforms. Finally, we motivate some research perspectives and challenges for blockchain system security and highlight some potential solutions to these problems.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability","authors":"Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen","doi":"10.1109/DSC49826.2021.9346244","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346244","url":null,"abstract":"Designated verifier signature (DVS) is a variant of digital signature which can designate a verifier to verify signatures. The main difference between message authentication code and DVS is that no shared key is initially set in DVS. In this paper, we propose a new notion, designated verifier signature transformation (DVST), which allows a cloud server to convert a DVS to a multi-designated verifier signature (MDVS) as long as the original verifier provides a token to the server. For more flexible use, the converted signature can support verification with more than threshold number of designated verifiers. Accordingly, a specific security definition is formalized as token unforgability. Our construction is proposed and built from bilinear map with security analysis.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud","authors":"Phuc Trinh Dinh, Minho Park","doi":"10.1109/DSC49826.2021.9346269","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346269","url":null,"abstract":"Software-defined networking (SDN) nowadays is extensively being used in a variety of practical settings, provides a new way to manage networks by separating the data plane from its control plane. However, SDN is particularly vulnerable to Distributed Denial of Service (DDoS) attacks because of its centralized control logic. Many studies have been proposed to tackle DDoS attacks in an SDN design using machine-learning-based schemes; however, these feature-based detection schemes are highly resource-intensive and they are unable to perform reliably in such a large-scale SDN network where a massive amount of traffic data is generated from both control and data planes. This can deplete computing resources, degrade network performance, or even shut down the network systems owing to being exhausting resources. To address the above challenges, this paper proposes a big data framework to overcome traditional data processing limitations and to exploit distributed resources effectively for the most compute-intensive tasks such as DDoS attack detection using machine learning techniques, etc. We demonstrate the robustness, scalability, and effectiveness of our framework through practical experiments.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification","authors":"Tieming Geng, L. Njilla, Chin-Tser Huang","doi":"10.1109/DSC49826.2021.9346270","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346270","url":null,"abstract":"The increasing complexity of modern hardware and software platform along with the imperative assurance on stability deems runtime verification of task fulfillment necessary in distributed systems. Distributing the burden of a central verification monitor to individual devices could improve the efficiency. Our previous work shows the possibility of achieving decentralized runtime verification by incorporating some mechanisms of the blockchain technology for locating the accountability when error occurs. However, traditional blockchain technology disallows branching and hence does not support verification of tasks which involves multiway dependencies. In this paper, we introduce a novel approach of smart marker that can be included in a blockchain to enable multiway branching and merging in order to verify the fulfillment of tasks that involve one-to-many and many-to-one dependencies. The design of smart marker satisfies three requirements of recognizability, compatibility, and authenticability. We implement a prototype of the smart marker scheme and analyze its performance.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Construction of a Post-Quantum Blockchain","authors":"Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien‐Ming Chen","doi":"10.1109/DSC49826.2021.9346253","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346253","url":null,"abstract":"Consensus and transaction are the main parts in a blockchain system. However, most cryptographic protocols used in these parts of current blockchains are vulnerable to rapid development of quantum computers. Besides, traditional proof of work (PoW) based consensus protocols such as Bitcoin can not supply memory mining. And the transaction capacity of each block in a blockchain is limited that need to be expanded. In this paper, a new post-quantum poof of work (PoW) consensus algorithm is proposed, which can be used to not only protect the blockchain under the quantum computing attack over existing classical hash based PoW algorithms but also can supply memory mining. Meanwhile, a identity-based post-quantum signature is embed into a transaction process so as to construct lightweight transactions. We thereafter give a detailed description on how the post-quantum lightweight transaction in a blockchain runs. All in all, this work can help to enrich the research on the future post-quantum blockchain (PQB).","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128736784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DualNet: Locate Then Detect Effective Payload with Deep Attention Network","authors":"Shiyi Yang, Peilun Wu, Hui Guo","doi":"10.1109/DSC49826.2021.9346261","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346261","url":null,"abstract":"Network intrusion detection (NID) is an essential defense strategy that is used to discover the trace of suspicious user behaviour in large-scale cyberspace, and machine learning (ML), due to its capability of automation and intelligence, has been gradually adopted as a mainstream hunting method in recent years. However, traditional ML based network intrusion detection systems (NIDSs) are not effective to recognize unknown threats and their high detection rate often comes with the cost of high false alarms, which leads to the problem of alarm fatigue. To address the above problems, in this paper, we propose a novel neural network based detection system, DualNet, which is constructed with a general feature extraction stage and a crucial feature learning stage. DualNet can rapidly reuse the spatial-temporal features in accordance with their importance to facilitate the entire learning process and simultaneously mitigate several optimization problems occurred in deep learning (DL). We evaluate the DualNet on two benchmark cyber attack datasets, NSL-KDD and UNSW-NB15. Our experiment shows that DualNet outperforms classical ML based NIDSs and is more effective than existing DL methods for NID in terms of accuracy, detection rate and false alarm rate.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"7 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}