2021 IEEE Conference on Dependable and Secure Computing (DSC)最新文献

筛选
英文 中文
Highly Efficient Anonymous IoT Authentication using Composite Hashing 使用复合哈希的高效匿名物联网身份验证
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346263
H. Chien
{"title":"Highly Efficient Anonymous IoT Authentication using Composite Hashing","authors":"H. Chien","doi":"10.1109/DSC49826.2021.9346263","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346263","url":null,"abstract":"Considering many Internet of Things (IoT) devices are resource-limited and their identities might disclose sensitive information, highly efficient and anonymous IoT authentication scheme is desirable for these IoT scenarios. In this paper, we propose a new anonymous IoT authentication scheme, using the composite hashing. The merits of this work are four-fold. (1) A new anonymous IoT authentication scheme is proposed; (2) the pre-calculation of pseudonym vectors can tackle Denial-of-Service attacks or unreliable connection issues; (3) the evaluations and analysis demonstrate its excellent performance in terms of computation, communication, and security properties; (4) an instantiation of applying this scheme on a standard IOT protocol like MQTT is described. Its excellent performances make it very attractive for those resource-limited IoT devices with anonymity requirement.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126143390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Outsourced Private Set Intersection with Linear Complexity 具有线性复杂度的安全外包私有集交集
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346230
Sumit Kumar Debnath, K. Sakurai, Kunal Dey, Nibedita Kundu
{"title":"Secure Outsourced Private Set Intersection with Linear Complexity","authors":"Sumit Kumar Debnath, K. Sakurai, Kunal Dey, Nibedita Kundu","doi":"10.1109/DSC49826.2021.9346230","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346230","url":null,"abstract":"In the context of privacy preserving protocols, Private Set Intersection (PSI) plays an important role due to their wide applications in recent research community. In general, PSI involves two participants to securely determine the intersection of their respective input sets, not beyond that. These days, in the context of PSI, it is become a common practice to store datasets in the cloud and delegate PSI computation to the cloud on outsourced datasets, similar to secure cloud computing. We call this outsourced PSI as OPSI. In this paper, we design a new construction of OPSI in malicious setting under the Decisional Diffie-Hellman (DDH) assumption without using any random oracle. In particular, our OPSI is the first that incurs linear complexity in malicious environment with not-interactive setup. Further, we employ a random permutation to extend our OPSI to its cardinality variant OPSI-CA. In this case, all the properties remain unchanged except that the adversarial model is semi-honest instead of malicious.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131798075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Distributed Ledger Management Mechanism for Storing and Selling Private Data 存储和销售私有数据的分布式账本管理机制
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346258
Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Rangan, K. Sakurai
{"title":"A Distributed Ledger Management Mechanism for Storing and Selling Private Data","authors":"Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Rangan, K. Sakurai","doi":"10.1109/DSC49826.2021.9346258","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346258","url":null,"abstract":"Storing and processing huge amount of private data is a challenging problem. The problem becomes, in particular, interesting if the user-side storage and computational power is limited. One way to solve the problem of outsourcing private data and maintaining an access control on the storage is proposed by using blockchain technology. However, blockchain technology requires heavy computational power and machinery. In this paper, we propose an approach to store and sell private data with the help of secret sharing. In comparison to blockchain, our methodology is simpler and preserves the privacy of stored data.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective 关于无许可区块链系统的安全性:挑战和研究视角
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346243
Hao Wang, Chunpeng Ge, Zhe Liu
{"title":"On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective","authors":"Hao Wang, Chunpeng Ge, Zhe Liu","doi":"10.1109/DSC49826.2021.9346243","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346243","url":null,"abstract":"Blockchain technology enables global mutually trustless participants to reach a consensus on the final state of permissionless distributed and decentralized ledgers. Due to its properties of openness, transparency, irreversibility, and credibility, many systems have been built based on blockchains' structure, such as Bitcoin and Ethereum. With the wide application of blockchains, however, many security problems still exist in blockchains and there have been many malicious attacks against blockchain systems. Although these attacks have been proposed, there lacks a systematic exploration of how these attacks have been conducted and what underlying relationship they have. In this paper, we firstly present and summarize several current attacks on blockchains in three aspects: system deficiency attacks, mining attacks, and network-level attacks. Secondly, we conduct a systematic analysis and evaluation of the possibility of these attacks occurring on major blockchain platforms. Finally, we motivate some research perspectives and challenges for blockchain system security and highlight some potential solutions to these problems.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability 指定验证者签名转换:一次性授权验证的新框架
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346244
Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen
{"title":"Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability","authors":"Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang, Yu-Chi Chen","doi":"10.1109/DSC49826.2021.9346244","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346244","url":null,"abstract":"Designated verifier signature (DVS) is a variant of digital signature which can designate a verifier to verify signatures. The main difference between message authentication code and DVS is that no shared key is initially set in DVS. In this paper, we propose a new notion, designated verifier signature transformation (DVST), which allows a cloud server to convert a DVS to a multi-designated verifier signature (MDVS) as long as the original verifier provides a token to the server. For more flexible use, the converted signature can support verification with more than threshold number of designated verifiers. Accordingly, a specific security definition is formalized as token unforgability. Our construction is proposed and built from bilinear map with security analysis.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud BDF-SDN:大规模sdn云环境下DDoS攻击检测的大数据框架
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346269
Phuc Trinh Dinh, Minho Park
{"title":"BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud","authors":"Phuc Trinh Dinh, Minho Park","doi":"10.1109/DSC49826.2021.9346269","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346269","url":null,"abstract":"Software-defined networking (SDN) nowadays is extensively being used in a variety of practical settings, provides a new way to manage networks by separating the data plane from its control plane. However, SDN is particularly vulnerable to Distributed Denial of Service (DDoS) attacks because of its centralized control logic. Many studies have been proposed to tackle DDoS attacks in an SDN design using machine-learning-based schemes; however, these feature-based detection schemes are highly resource-intensive and they are unable to perform reliably in such a large-scale SDN network where a massive amount of traffic data is generated from both control and data planes. This can deplete computing resources, degrade network performance, or even shut down the network systems owing to being exhausting resources. To address the above challenges, this paper proposes a big data framework to overcome traditional data processing limitations and to exploit distributed resources effectively for the most compute-intensive tasks such as DDoS attack detection using machine learning techniques, etc. We demonstrate the robustness, scalability, and effectiveness of our framework through practical experiments.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116405497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification 智能合约中的智能标记:在区块链中启用多路分支和合并以进行分散的运行时验证
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2021-01-30 DOI: 10.1109/DSC49826.2021.9346270
Tieming Geng, L. Njilla, Chin-Tser Huang
{"title":"Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification","authors":"Tieming Geng, L. Njilla, Chin-Tser Huang","doi":"10.1109/DSC49826.2021.9346270","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346270","url":null,"abstract":"The increasing complexity of modern hardware and software platform along with the imperative assurance on stability deems runtime verification of task fulfillment necessary in distributed systems. Distributing the burden of a central verification monitor to individual devices could improve the efficiency. Our previous work shows the possibility of achieving decentralized runtime verification by incorporating some mechanisms of the blockchain technology for locating the accountability when error occurs. However, traditional blockchain technology disallows branching and hence does not support verification of tasks which involves multiway dependencies. In this paper, we introduce a novel approach of smart marker that can be included in a blockchain to enable multiway branching and merging in order to verify the fulfillment of tasks that involve one-to-many and many-to-one dependencies. The design of smart marker satisfies three requirements of recognizability, compatibility, and authenticability. We implement a prototype of the smart marker scheme and analyze its performance.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Construction of a Post-Quantum Blockchain 后量子b区块链的构建
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2020-12-31 DOI: 10.1109/DSC49826.2021.9346253
Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien‐Ming Chen
{"title":"On the Construction of a Post-Quantum Blockchain","authors":"Jiahui Chen, Wensheng Gan, Muchuang Hu, Chien‐Ming Chen","doi":"10.1109/DSC49826.2021.9346253","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346253","url":null,"abstract":"Consensus and transaction are the main parts in a blockchain system. However, most cryptographic protocols used in these parts of current blockchains are vulnerable to rapid development of quantum computers. Besides, traditional proof of work (PoW) based consensus protocols such as Bitcoin can not supply memory mining. And the transaction capacity of each block in a blockchain is limited that need to be expanded. In this paper, a new post-quantum poof of work (PoW) consensus algorithm is proposed, which can be used to not only protect the blockchain under the quantum computing attack over existing classical hash based PoW algorithms but also can supply memory mining. Meanwhile, a identity-based post-quantum signature is embed into a transaction process so as to construct lightweight transactions. We thereafter give a detailed description on how the post-quantum lightweight transaction in a blockchain runs. All in all, this work can help to enrich the research on the future post-quantum blockchain (PQB).","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128736784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
DualNet: Locate Then Detect Effective Payload with Deep Attention Network DualNet:定位和检测有效载荷与深度关注网络
2021 IEEE Conference on Dependable and Secure Computing (DSC) Pub Date : 2020-10-23 DOI: 10.1109/DSC49826.2021.9346261
Shiyi Yang, Peilun Wu, Hui Guo
{"title":"DualNet: Locate Then Detect Effective Payload with Deep Attention Network","authors":"Shiyi Yang, Peilun Wu, Hui Guo","doi":"10.1109/DSC49826.2021.9346261","DOIUrl":"https://doi.org/10.1109/DSC49826.2021.9346261","url":null,"abstract":"Network intrusion detection (NID) is an essential defense strategy that is used to discover the trace of suspicious user behaviour in large-scale cyberspace, and machine learning (ML), due to its capability of automation and intelligence, has been gradually adopted as a mainstream hunting method in recent years. However, traditional ML based network intrusion detection systems (NIDSs) are not effective to recognize unknown threats and their high detection rate often comes with the cost of high false alarms, which leads to the problem of alarm fatigue. To address the above problems, in this paper, we propose a novel neural network based detection system, DualNet, which is constructed with a general feature extraction stage and a crucial feature learning stage. DualNet can rapidly reuse the spatial-temporal features in accordance with their importance to facilitate the entire learning process and simultaneously mitigate several optimization problems occurred in deep learning (DL). We evaluate the DualNet on two benchmark cyber attack datasets, NSL-KDD and UNSW-NB15. Our experiment shows that DualNet outperforms classical ML based NIDSs and is more effective than existing DL methods for NID in terms of accuracy, detection rate and false alarm rate.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"7 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信