2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing最新文献

筛选
英文 中文
Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU 轻量级分组密码抗GPGPU积分攻击的计算安全性评估
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.14
Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, T. Kurokawa
{"title":"Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU","authors":"Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, T. Kurokawa","doi":"10.1109/CSCloud.2015.14","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.14","url":null,"abstract":"Integral distinguisher is the main factor of integral attack. In the conventional search strategy of integral distinguisher (ID), there are two steps. In the first step, first order ID is obtained. In the second step, first order ID is extended by increasing the order. We find it is problematic to apply the conventional strategy for Feistel ciphers whose number of sub blocks N is large such as TWINE and LBlock (N = 16). To solve the problem, we propose new search strategy which has large search scope and feasibility in realistic computational condition. By the reduction of the computational complexity, it is reduced from O((nN)×(2mn)) to O(N×2mn). And for the acceleration of the experiment, we use GPGPU (general-purpose computing on graphics processing units) platform. By using GPGPU platform, we can test substantially higher order ID than existing CPU platform. We execute computer experiment to discover the precise fifteenth order ID of TWINE and LBlock by proposal strategy. As a result, we find new fifteenth order ID which has 8 balanced sub blocks (32-bit) after 15-round encryption both in TWINE and LBlock. These results are the most precise evaluatiPon of TWINE and LBlock.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Optimization of Air-Based Information Network with Guaranteed Security Protection 具有安全保障的空基信息网络能量优化
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.90
Xiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Kaiquan Cai
{"title":"Energy Optimization of Air-Based Information Network with Guaranteed Security Protection","authors":"Xiao Liu, Meikang Qiu, Xiaodong Wang, Weiran Liu, Kaiquan Cai","doi":"10.1109/CSCloud.2015.90","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.90","url":null,"abstract":"The air-based information network of the Space-Air-Ground Integrated Network has the distinct characteristics of heterogeneous, time-varying, distributed and self-organized, which bring not only new challenges of node mobility model, dynamic network grouping and interconnection and intercommunication of heterogeneous networks, but also higher requirements of network security. Therefore, selecting an efficient and safe communication link is critical when there may not be fixed rules. In this article, we build a model of the air-based information network, and use the method of dynamic programming to select the most efficient communication link by minimizing the energy consumption in the communication model. In the communication model, energy consumption is associated with the security level of the communication link. The experiments show that the presented algorithms can effectively reduce the total cost while satisfying security constraints.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128994345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments 云计算环境下的恶意软件和内核级rootkit检测
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.54
Thu Yein Win, H. Tianfield, Q. Mair
{"title":"Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments","authors":"Thu Yein Win, H. Tianfield, Q. Mair","doi":"10.1109/CSCloud.2015.54","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.54","url":null,"abstract":"Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has become increasingly sophisticated. This paper presents a novel malware and rookit detection system which protects the guests against different attacks. It combines system call monitoring and system call hashing on the guest kernel together with Support Vector Machines (SVM)-based external monitoring on the host. We demonstrate the effectiveness of our solution by evaluating it against well-known user-level malware as well as kernel-level rootkit attacks.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129450718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack 防冷启动攻击的正向安全设备上加密方案
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.43
S. Vivek, Rajkumar Ramasamy
{"title":"Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack","authors":"S. Vivek, Rajkumar Ramasamy","doi":"10.1109/CSCloud.2015.43","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.43","url":null,"abstract":"Encryption of data residing on the permanent memory of a device, also known as On-Device Encryption (ODE), is a well studied problem with many popular software available these days. We consider the adversary who is capable of taking one RAM snapshot (e.g: Cold Boot Attack) when the device is in locked state. Writing data securely, when the device is in locked state can be handled in the presence of this strong adversary, by employing public key encryption techniques. When it comes to reading of data from a locked device, it is not known until now, whether it is possible. In this paper, we state the impossibility of performing the read operation securely, when the device is in locked state. Moreover, we propose a new forward secure ODE scheme which supports secure writing in locked state and is more efficient when compared to the public key based solution. We have proposed the security model for forward secure ODE and proved the security of our scheme in the proposed security model.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129908685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android System 基于预缓存技术的高性能Android系统可维护移动模型
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.76
Hui Zhao, Meikang Qiu, Keke Gai, Jie Li, Xin He
{"title":"Maintainable Mobile Model Using Pre-Cache Technology for High Performance Android System","authors":"Hui Zhao, Meikang Qiu, Keke Gai, Jie Li, Xin He","doi":"10.1109/CSCloud.2015.76","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.76","url":null,"abstract":"As a mobile operating system framework, Android plays a significant role in supporting mobile apps. Using cloud-based approaches have further enabled the implementations of mobile apps. However, current Android application model is not efficient by using current common approaches. In this paper, we proposed a new mobile app model using precache technology to overcome the current existing obstacles. The results of experiments show that our model can reduce network traffic of Android apps efficiently. At the same time, using our proposed model can reduce the data redundancy and improve maintainability of Android apps.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improved Differential Characteristic Searching Methods 改进的差分特征搜索方法
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.42
Jiageng Chen, A. Miyaji, Chunhua Su, J. Teh
{"title":"Improved Differential Characteristic Searching Methods","authors":"Jiageng Chen, A. Miyaji, Chunhua Su, J. Teh","doi":"10.1109/CSCloud.2015.42","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.42","url":null,"abstract":"The success probability of differential and linear cryptanalysis against block ciphers heavily depend on finding differential or linear paths with high statistical bias compared with uniform random distribution. For large number of rounds, it is not a trivial task to find such differential or linear paths. Matsui first investigated this problem and proposed a solution based on a branch and bound algorithm in 1994. Since then, the research on finding good concrete differential or linear path did not receive much attention. In this paper, we revisit the differential attack against several S-Box based block ciphers by carefully studying the differential characteristics. Inspired by Matsui's algorithm, we provide an improved solution with the aid of several searching strategies, which enable us to find by far the best differential characteristics for the two investigated ciphers (LBlock, TWINE) efficiently. Furthermore, we provide another way to evaluate the security of ciphers against differential attack by comparing the strength of the ciphers from differential characteristic's point of view, and we also investigate the accuracy when using the active S-Box to evaluate the security margin against differential attack, which is the common method adapted when new ciphers are designed.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124136204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Class-Chord: Efficient Messages to Classes of Nodes in Chord Class-Chord:向Chord中节点类发送的有效消息
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.17
D. Fleck, Fengwei Zhang, Sharath Hiremagalore, Stephen Reese, Liam McGhee
{"title":"Class-Chord: Efficient Messages to Classes of Nodes in Chord","authors":"D. Fleck, Fengwei Zhang, Sharath Hiremagalore, Stephen Reese, Liam McGhee","doi":"10.1109/CSCloud.2015.17","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.17","url":null,"abstract":"Security Information Event Management (SIEM) systems are used to monitor large networks for malware infestations, DDoS attacks, and many other types of network intrusions. Typical SIEMs are centrally managed with information flowing in from across the enterprise. In this architecture, as the enterprise grows, the SIEM must also scale proportionally. In our research we are working to create a Peer-to-Peer distributed SIEM system to leverage the power of all the devices in the network for monitoring. The system scales naturally, as the enterprise grows, more devices come into the peer-to-peer network (P2P). The added devices increase the SIEM's processing power and storage ability. A P2P SIEM will drastically reduce upfront hardware costs and provide an increased processing power for advanced analytics. In this paper, we present Class-Chord which is a P2P network fabric designed to support a P2P SIEM. We have modified the well known Chord DHT to support efficient 1-n messaging that is required to enable SIEM administrators to query subsets of the network rather than flooding queries to all nodes. Class-Chord uses a modified Chord ID and a new message type that enables administrators to send messages to network subsets using complex class matching specifiers. We analyze theoretical models for the system and present experimental results from a live system deployed across 300 physical nodes. The results attest that Class-Chord is more efficient than traditional communication mechanisms used in SIEM systems.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133987773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Ant Colony Algorithm for Finding the Maximum Clique in Social Network 基于改进蚁群算法的社交网络最大团块求解
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.31
Suqi Zhang, Yongfeng Dong, Jun Yin, Jingjin Guo
{"title":"Improved Ant Colony Algorithm for Finding the Maximum Clique in Social Network","authors":"Suqi Zhang, Yongfeng Dong, Jun Yin, Jingjin Guo","doi":"10.1109/CSCloud.2015.31","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.31","url":null,"abstract":"The Maximum Clique is the most compact cohesive subgroup in Social Network. Finding the maximum clique in the Social Network has become an important aspect of social network analysis, such as privacy protection, citation and co-citation analysis, cohesive subgroup analysis et al. With the development of big data, the mass of nodes in the graph and complexity of analysis set a higher requirement for solving the maximum clique problem (MCP). Therefore, we propose an improved ant colony algorithm. Particularly, the strategy of the ant to select the nodes is improved so that the search space can be expanded and the variety of the solution is increased, with this approach local optimal solution can be avoided. Local improvement of the clique is also adopted to improve the accuracy and convergence speed of the proposed algorithm. The proposed algorithm has been tested on the DIMACS benchmark dataset and several typical social networks. Experimental results show the effectiveness and feasibility of the proposed algorithm.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Search Engine: A Hidden Power for Virus Propagation in Community Networks 搜索引擎:病毒在社区网络中传播的一种隐藏力量
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.83
Jia Yang, Cai Fu, Deliang Xu, Lansheng Han, Xiao-Yang Liu
{"title":"Search Engine: A Hidden Power for Virus Propagation in Community Networks","authors":"Jia Yang, Cai Fu, Deliang Xu, Lansheng Han, Xiao-Yang Liu","doi":"10.1109/CSCloud.2015.83","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.83","url":null,"abstract":"The propagation methods of viruses are diverse and studying the virus propagation is a hot topic. There appears a new way that the search engine quickly spreads network viruses, and many researches overlook its impact of propagation and few researches set a model to quantifiabely analyze how the search engine spread viruses. Based on community networks, this paper designs a specific model how the search engine spreads viruses. Moreover, this paper quantifiabely calculate the virus propagation velocity and the propagation effect. First, by analyzing the propagation process of viruses under the search engine condition, we design a positive feedback model to analyze how the search engine and the community network influence the propagation process of viruses. Second, we define relationship functions of propagation factors and calculate the rate of infected nodes while establishing mathematical propagation formulas for two situations. One situation is with the search engine, and another is without the search engine. Third, we design the experiment to verify the model analysis. Compared with two situations, we show that viruses have a much quicker propagation velocity, and the growth rate of infected rate is larger under the search engine condition. When the immune vaccine replaces the virus, this paper is also applicable.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Access Control for Multi-tenancy in Cloud-Based Health Information Systems 基于云的健康信息系统中多租户的访问控制
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing Pub Date : 2015-11-03 DOI: 10.1109/CSCloud.2015.95
Mohd Anwar, Ashiq Imran
{"title":"Access Control for Multi-tenancy in Cloud-Based Health Information Systems","authors":"Mohd Anwar, Ashiq Imran","doi":"10.1109/CSCloud.2015.95","DOIUrl":"https://doi.org/10.1109/CSCloud.2015.95","url":null,"abstract":"Cloud technology can be used to support costeffective, scalable, and well-managed healthcare information systems. However, cloud computing, particularly multitenancy, introduces privacy and security issues related to personal health information (PHI). In this paper, we designed ontological models for healthcare workflow and multi-tenancy, and then applied HIPAA requirements on the models to generate HIPAA-compliant access control policies. We used Semantic Web Rule Language (SWRL) to represent access control policies as rules, and we verified the rules with an OWL-DL reasoner. Additionally, we implemented HIPAA security rules through access control policies in a cloud-based simulated healthcare environment. More specifically, we investigated access control policy specification and enforcement for cloud based healthcare information systems using an open source cloud platform, OpenStack. The results manifest HIPAA compliance through authorization policies that are capable of addressing vulnerabilities of multi-tenancy.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114814337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信