This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentica
Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings
✍ Scribed by Qi Jiang, Xinghua Li, Ding Wang
- Publisher
- Springer-EAI
- Year
- 2023
- Tongue
- English
- Leaves
- 187
- Series
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 496
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022.
The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.
✦ Table of Contents
Preface
Organization
Contents
Authentication and Key Agreement
User Authentication Using Body Vibration Characteristics
1 Introduction
2 Background
3 System Overview
3.1 Data Sampling and Preprocessing
3.2 Feature Extraction
3.3 User Classification
4 Experimental Setup
4.1 Environment
4.2 System Performance
5 Conclusion
References
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
1 Introduction
1.1 Related Work
1.2 Contribution
1.3 Organization
2 Preliminaries and Security Model
2.1 Computationally Difficult Problems
2.2 Security Model
3 Review and Security Analysis of ITGR Protocol
3.1 Review of ITGR Protocol
3.2 Security Analysis of ITGR Protocol
4 Proposed Scheme
4.1 System Establishment Phase
4.2 Registration Phase
4.3 Login and Authentication Phase
5 Security Analysis of eITGR Protocol
5.1 Security Proof Under the eCK Model
5.2 Security Analysis Using Scyther Tool
6 Comparison with Other Protocols
6.1 Comparison of Security Properties
6.2 Computation and Communication Overhead Comparison
7 Conclusion
References
Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice
1 Introduction
1.1 Contributions
1.2 Related Work
1.3 Organization of the Paper
2 Preliminaries
2.1 Compression and Decompression
2.2 Peikert’s Reconciliation Mechanism
2.3 MLWE
3 The Proposed LB-ID-2PAKA Protocol
3.1 System Setup Phase
3.2 Registration Phase
3.3 Authentication Key Agreement Phase
4 Correctness Analysis
4.1 The Correctness of Signature
4.2 The Correctness of Session Key
5 Security Analysis
5.1 Informal Security Analysis
5.2 Security Proof
6 Conclusion
References
Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture
1 Introduction
2 Related Work
3 Background
3.1 Fuzzy Extractor
4 System Model
5 Our Proposed Protocol
5.1 System Initialization Phase
5.2 Registration Phase
5.3 Login and Authentication Phase
5.4 Password and Biometric Update Phase
5.5 Smart Card Revocation Phase
6 Security Analysis
6.1 Security Model
6.2 Security Proof
7 Performance Analysis
7.1 Security Feature
7.2 Computation Cost
7.3 Communication Cost
8 Conclusion
References
Data Security
Cross-Chain Data Auditing for Medical IoT Data Sharing
1 Introduction
2 Related Work
3 Problem Statement
3.1 System Model
3.2 Threat Model
3.3 Design Goals
3.4 Security Model
4 The Proposed CCDAS Scheme
4.1 Main Idea
4.2 Construction of CCDAS
5 Security Analysis
6 Performance Analysis
6.1 Theoretical Analysis
6.2 Experimental Analysis
7 Conclusion
References
Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT
1 Introduction
2 Related Work
3 Our Proposed Design
4 Our Proposed Design
4.1 Overview
4.2 Communication Protocol
4.3 Classification Process
5 Security Analysis
6 Experiments
7 Conclusion
References
A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain
1 Introduction
2 Related Work
3 Preliminary Knowledge
3.1 Blockchain
3.2 Federated Learning
3.3 Ring Signature
3.4 Gradient Leaks
4 Gradient Protection Principles
5 An Overview of the System
5.1 System Model
5.2 Threat Model
5.3 Solution Principle
5.4 Program Construction
6 Analysis of Security
7 Conclusion
References
Analysis of a New Improved AES S-Box Structure
1 Introduction
2 Preliminaries
2.1 Algebraic Expression of the S-Box
2.2 An Improved S-Box Structure
3 Affine Invariant Properties of Fnnew
4 Proposed S-Box Performance Analysis
4.1 Strict Avalanche Criterion
4.2 Periodicity
4.3 Algebraic Complexity
4.4 Bit Independence Criterion
5 Comparison with Some Known S-boxes
6 Conclusion
References
Network Security
Social Internet of Tings Trust Management Based on Implicit Social Relationship
1 Introduction
2 Related Work
3 Preliminaries
3.1 Types of Social Relationships
3.2 Implicit Social Relationship
3.3 Multi-relationship Composite Network
4 The Proposed Trust Management Model
5 Experimental Results and Analysis
5.1 Trust Evaluation of Nodes in the Good Condition
5.2 Trust Management in the Dynamic Hostile Change Conditions
6 Conclusion
References
Romeo: SGX-Based Software Anti-piracy Framework
1 Introduction
2 Background
2.1 Anti-piracy Mechanism
2.2 Software Guard Extensions
3 Overview
3.1 User Experience
3.2 Developer Experience
3.3 Basic Working Process
3.4 Remote Attestation
4 Implementation
4.1 Client
4.2 Server
5 Experiment and Analysis
5.1 Experimental Environment
5.2 Performance Evaluation
6 Conclusion
References
P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes
1 Introduction
2 Related Works
3 P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes
3.1 Obtain the Historical Encounter Information Between Nodes
3.2 Obtain the Resource Availability Rate of the Node
3.3 Obtain the Social Engagement of Nodes
3.4 Calculate the Communication Relay Degree Between Nodes
3.5 The Pseudo-code of P-TECS
4 Simulations and Analyses
4.1 Simulation Settings
4.2 Results Analyses
5 Conclusion
References
Network Situation Awareness Model Based on Incomplete Information Game
1 Introduction
2 State Transfer for Vulnerability
2.1 Vulnerability Lifecycle and State Transition Matrix
2.2 State Transition Matrix
3 Attack-Defense Game Based on Incomplete Information
4 Experiments and Analyses
5 Conclusions
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually.</span><p><span> The 33 full papers were selected from 61 submi
<span>This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.</span><p><span> The 31 full papers were selected from 63 subm
<p><p>This book constitutes the refereed proceedings of the 2<sup>nd</sup> EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on priva
<span>This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings.<br><br> The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical section
<span>This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.<br>The 23 papers presented in this volume were carefully reviewed and selected from 103 submissio