<span>This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually.</span><p><span> The 33 full papers were selected from 61 submi
Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings ... and Telecommunications Engineering)
â Scribed by Ding Wang (editor), Weizhi Meng (editor), Jinguang Han (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 465
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
⌠Table of Contents
Preface
Conference Organization
Contents
Network Security
A Characterisation of Smart Grid DoS Attacks
1 Introduction
2 Smart Grids Background
2.1 Smart Grid Domains
2.2 Smart Grid Structure
2.3 Smart Grid Components
3 Smart Grid DoS Survey
4 Smart Grid Denial-of-Service Characterisation
4.1 Network Saturation Scenarios (A.1)
4.2 Network Exploit Scenarios (A.2)
4.3 Device Exhaustion Scenarios (B.1)
4.4 Device Compromise Scenarios (B.2)
5 Discussion
6 Related Work
7 Conclusions
References
Security and Privacy in 5G Applications: Challenges and Solutions
1 Introduction
2 Usage Scenarios and Applications of 5G
2.1 5G Enabled Smart Manufacturing
2.2 5G Enabled Smart Traffic
2.3 5G Enabled Smart Grids
2.4 5G Enabled Smart Campus
3 Security and Privacy Issues in 5G Applications
3.1 eMBB Scenario
3.2 uRLLC Scenario
3.3 mMTC Scenario
4 Security and Privacy Solutions in a Systematic View
4.1 Reference Architecture of 5G Application Systems
4.2 Solutions on Terminal Layer
4.3 Solutions on Network Layer
4.4 Solutions on Platform Layer
4.5 Solutions on Service Layer
5 Countermeasures Against Security and Privacy Risks in 5G Applications
5.1 eMBB Scenario
5.2 uRLLC Scenario
5.3 mMTC Scenario
6 Conclusions
References
Alarm Elements Based Adaptive Network Security Situation Prediction Model
1 Introduction
2 Network Security Situation Prediction Model
3 Quantification of Network Security Situation Assessment
4 Network Security Situation Prediction Sub-module
4.1 Sliding Window Mechanism
4.2 Adaptive Cubic Exponential Smoothing Model
5 Predictive Value Correction Sub-module
5.1 Error State Division
5.2 Time-Varying Weighted Markov Chain Based on Error State
5.3 Threshold Test
6 Experimental Results and Analysis
6.1 Experimental Data Processing
6.2 Experimental Comparison and Analysis
7 Conclusion
References
Watermark Based Tor Cross-Domain Tracking System for Tor Network Traceback
1 Introduction
2 Related Work
3 Watermark Based Tor Cross-Domain Tracking System
4 Design of Digital Watermark Model
4.1 Inter Packet Delay Based Watermark Design
4.2 Interval Based Watermark Design
4.3 Interval Gravity Based Watermark Design
5 Experimental Results
5.1 Experiment Design
5.2 Results Analysis of IPD Model
5.3 Results Analysis of IW Model
5.4 Results Analysis of IWG Model
5.5 Results Analysis
6 Conclusion
References
System Security
Research on IoT Security Technology and Standardization in the 5G Era
1 Introduction
1.1 5G Accelerates the Development of IoT
1.2 Security Risks for IoT in the 5G Era
2 IoT Security Policies and Standards in the 5G Era
2.1 Security Policies
2.2 Security Standards
3 Security Requirements and Measures of IoT
3.1 Sensing Devices and Cards
3.2 Network and Transmission Exchange
3.3 Business Application and Service
3.4 Security Management and Operation
4 Suggestions on the Development of IoT in the 5G Era
4.1 Sensing Devices and Cards
4.2 Network and Transmission Exchange
4.3 Business Application and Service
4.4 Security Management and Operation
5 Conclusion
References
MIMEC Based Information System Security Situation Assessment Model
1 Introduction
2 Security Situation Assessment Model
3 Multi-source Data Standardization
3.1 Standardization of Qualitative Indicators
3.2 Standardization of Quantitative Indicators
4 Interval Matrix Correction Module
4.1 Interval Matrix Consistency Degree Judgment Sub-module
4.2 Interval Matrix Element Adjustment Sub-module
4.3 The Best Deterministic Matrix Acquisition Sub-module
5 Entropy Weight Based Cloud Module
5.1 Expert Evaluation of Membership Cloud
5.2 Membership Cloud Gravity Center
6 Experiment and Analysis
7 Conclusion
References
IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings
1 Introduction
2 Use Cases
3 Communication Technologies
3.1 Available IoT Smart Building Systems
3.2 Networking Standards/technologies for Smart Buildings
4 System Architecture
4.1 Entities
4.2 Functionality of Layers
4.3 Security and Privacy Solutions
5 Comparative Analysis
6 Conclusions
References
A Secure Experimentation Sandbox for the Design and Execution of Trusted and Secure Analytics in the Aviation Domain
1 Introduction
2 Materials and Methods
2.1 The ICARUS Technical Solution
2.2 The ICARUS Secure Experimentation Sandbox
3 Results
3.1 Extra-Aviation Services in an Integrated Airport Environment
3.2 Routes Analysis for Fuel Consumption Optimization and Pollution Awareness
3.3 Aviation-Related Disease Spreading
3.4 Enhancing Passenger Experience with ICARUS Data
4 Conclusions
References
Machine Learning
Research on a Hybrid EMD-SVR Model for Time Series Prediction
1 Introduction
2 Methodology
2.1 Theory of Empirical Mode Decomposition (EMD)
2.2 Theory of Support Vector Regression (SVR)
2.3 EMD-SVR Method for Time Series Analysis
3 Experiments and Results
3.1 The EMD-SVR Forecasting Model of Non-stationary Time Series for Building Energy Consumption
3.2 Comparison of Noise-Resistant Capabilities for SVR and EMD-SVR
4 Conclusion
References
Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-instance Attention in Cybersecurity
1 Introduction
2 Related Work
3 The Proposed Model
3.1 Vector Representation
3.2 Deep Residual Neural Network
3.3 Multi-instance Attention
4 Performance Evaluation
4.1 Datasets
4.2 Results
5 Conclusions
References
User Identity Linkage Across Social Networks Based on Neural Tensor Network
1 Introduction
2 Preliminaries
2.1 Terminology Definition
2.2 Problem Definition
3 NUIL: The Proposed Model
3.1 Network Embedding Based on Random Walks and Skip-Gram
3.2 Modeling Relations Between Users Based on Neural Tensor Network
3.3 Matching Identities Based on Multi-Layer Perceptron
4 Experiments
4.1 Dataset, Baselines and Parameter Setup, and Evaluation Metrics
4.2 User Identity Linkage Performance
4.3 Discussions
5 Conclusion
References
An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System
1 Introduction
2 System Model and Security Requirements
2.1 System Model
2.2 Security Requirements
3 Preliminaries
3.1 Bilinear Pairing
3.2 Support Vector Machine (SVM)
3.3 Okamoto-Uchiyama (OU) Homomorphic Cryptosystem
4 The Proposed EPPC Scheme
4.1 System Initialization
4.2 PU Physiological Case Generation
4.3 PU Physiological Case Normalization
4.4 Privacy-Preserving Physiological Case Classification
5 Security Analysis
6 Performance Evaluation
6.1 Security Comparison
6.2 Experimental Setup
6.3 Computational Cost
6.4 Communication Overhead
7 Conclusion
References
A Multi-class Detection System for Android Malicious Apps Based on Color Image Features
1 Introduction
2 Related Work
3 Prerequirement
3.1 Malicious App Behavior of Android
3.2 Android Malicious App Family
4 Our Approach
4.1 Select Features
4.2 Android App Color Visualization
4.3 Malware Detection
5 Experiments
5.1 Characterization of Gray and Color Images
5.2 Multi-classification of Color Images Using Different DL Models
5.3 Color Visualization Experiments with Different Features
6 Discussions and Limitations
7 Conclusion
References
Authentication and Access Control
PUF-Based Two-Factor Group Authentication in Smart Home
1 Introduction
1.1 Related Work
2 Preliminaries
2.1 Chinese Reminder Theorem ch14Zhang2019Chinese
2.2 Physical Unclonable Function ch14Wallrabenstein2016Practical
2.3 Fuzzy Extractor ch14Odelu2015Secure
3 Authentication Scheme Construction
3.1 Smart Device Registration Phase
3.2 User Registration Phase
3.3 Home Gateway Registration Phase
3.4 Login and Authentication Phase
3.5 Biometrics and Password Update Phase
4 Security Analysis
5 Performance Analysis
6 Conclusion
References
An Authentication Framework in ICN-Enabled Industrial Cyber-Physical Systems
1 Introduction
1.1 Related Work
2 Problem Statement
2.1 System Model
2.2 Threat Model
2.3 Objectives
3 Building Block: Proxy Signature
3.1 Construction
3.2 Comparison
4 Our Solutions
4.1 Overview
4.2 The Complete Authentication Scheme
5 Security Analysis
5.1 Security Properties Analysis
5.2 Comparison
6 Performance Analysis
7 Conclusion
References
Access Control for Wireless Body Area Networks
1 Introduction
2 Preliminaries
2.1 System Model
2.2 Design Goals
2.3 CP-ABE Scheme
2.4 Access Tree
3 The Proposed Concrete Scheme
3.1 System Initialization
3.2 Key Generation
3.3 Data Encryption
3.4 Data Re-encryption
3.5 Data Decryption
3.6 Attribute Update
4 Security Analysis
4.1 Resist Internal Attacks
4.2 Resist External Attacks
4.3 Collusion Resistance
5 Performance Evaluation
5.1 Comparative Analysis
5.2 Performance Evaluation
6 Conclusion
References
FIDO â That Dog Won't Hunt
1 Introduction
2 Starting Over
3 Introducing Client-Side Secure Hardware
3.1 Username/Password
4 FIDO
4.1 The Problem with PKI
4.2 So How Does FIDO Protect Public Keys? Spoiler â It Doesn't
4.3 Is FIDO Truly Two-Factor?
4.4 Is Secure Hardware Secure?
5 FIDO â Our Verdict
6 An Alternative Approach
6.1 Client Side, Look â No Hardware!
6.2 Server Side, Look â No Credential Database!
7 Conclusion
References
Blockchain-Enabled User Authentication in Zero Trust Internet of Things
1 Introduction
1.1 IoT Authentication
1.2 Blockchain
2 Blockchain-Enabled Device Mutual Authentication
2.1 Self-sovereign Security
2.2 Challenges
3 Proposed Device Authentication in zIoT
4 Evaluation
5 Conclusion
References
Cloud Security
Security Analysis and Improvement of a Dynamic-Hash-Table Based Auditing Scheme for Cloud Storage
1 Introduction
2 Review of DHT-PA
2.1 Setup Phase
2.2 Verification Phase
3 Cryptanalysis of Li et al.'s Scheme
4 Possible Countermeasure
5 Conclusion
References
A Public Auditing Framework Against Malicious Auditors for Cloud Storage Based on Blockchain
1 Introduction
2 Related Works
3 Preliminaries
4 The Framework of Public Auditing Scheme Based on Blockchain
4.1 System Model
4.2 The Proposed Framework
5 The Detailed Scheme
6 Security Requirements Discussions
7 Experimental Analysis
8 Conclusion
References
A Secure and Verifiable Outsourcing Scheme for Machine Learning Data
1 Introduction
2 Related Work
3 Problem Description and Research Goals
3.1 Research Goals and Challenges
3.2 System Model
3.3 Linear Regression and Gradient Descent
3.4 System Framework
4 System Solutions
4.1 Encryption and Decryption Methods for Outsourced Data
4.2 Description of Scheme
5 System Analysis
5.1 Security
5.2 System Performance Analysis
6 Conclusion
References
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
1 Introduction
2 Related Works
3 Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
4 PCA and PSO-Optimized SVM for Intrusion Detection
4.1 PCA Data Dimensionality Reduction
4.2 SVM Algorithm
4.3 PCA and PSO-Optimized Support Vector Machine for Intrusion Detection
5 Experimental Evaluation
5.1 Data Preprocessing
5.2 Experimental Evaluation Index
5.3 Experimental Analysis
6 Conclusions
References
An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing
1 Introduction
2 Related Work
3 Approach
3.1 RetinaNet for Object Location
3.2 Fusion of SIFT Features and CNN Features to Classification
4 Experimental Results and Analysis
5 Conclusion and Future Work
References
Cryptography
Generative Image Steganography Based on Digital Cardan Grille
1 Introduction
2 Related Work
3 The Proposed Algorithm
3.1 Design Principles of Digital Cardan Grille
3.2 Automatic Generation of Digital Cardan Grille
3.3 Completion Stego Image
4 Experiment and Analysis
5 Conclusion and Future Work
References
Pixel Grouping Based Image Hashing for DIBR 3D Image
1 Introduction
2 Related Work
3 Review of Depth-Image-Based Rendering Process
4 Proposed Image Hashing
4.1 Pre-processing
4.2 Pixel Grouping
4.3 Hash Generation
5 Experimental Results
6 Conclusions
References
Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP
1 Introduction
1.1 Related Work
1.2 Our Contributions
1.3 Organization
2 Preliminaries
2.1 Description of KATAN
2.2 Conditional Differential Analysis
3 Improved Conditional Differential Cryptanalysis
3.1 Modeling the Difference Propagation of the Round Function
3.2 Detecting the Bias of the Difference
4 Application to KATAN32
4.1 Key-Recovery Attack on 79-Round KATAN32
4.2 Key-Recovery Attack on 81-Round KATAN32
5 Extension with the Standard Differential Attack
5.1 Key-Recovery Attack on 97-Round KATAN32
5.2 Key-Recovery Attack on 98-Round KATAN32
5.3 Key-Recovery Attack on 99-Round KATAN32
6 Conclusion
References
Applied Cryptography
A Verifiable Combinatorial Auction with Bidder's Privacy Protection
1 Introduction
2 Privacy Preserving Combinatorial Auction Model
2.1 System Model
2.2 Adversary Model
3 Our Proposed Scheme
3.1 Privacy-Preserving Winner Determination Model
3.2 Privacy-Preserving Verifiable Payment Determination Model
4 Security Analysis
5 Performance Analysis
6 Conclusion
References
A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query
1 Introduction
1.1 Our Contributions
1.2 Related Work
2 Preliminaries
2.1 Notations
2.2 Adversary Model
2.3 Complexity Assumptions
2.4 Security Definition
3 SQL Database
3.1 SQL Database
3.2 Dictionary Creation
4 The Detailed Scheme
4.1 System Model
4.2 Multi-user Fine-Grained Access Control
4.3 Secure Key Transmission with Dual Encryption
5 Security Analysis
5.1 Confidentiality of Queries
5.2 Security of Secret Keys
6 Experimental Analysis
6.1 Experimental Environment
6.2 Query Security
6.3 Multi-user Keyword Query Performance
7 Conclusion and Future Work
References
Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-user
1 Introduction
1.1 Our Contributions
1.2 Related Work
1.3 Organization
2 Problem Statement
2.1 System Model
2.2 Threat Model
2.3 Design Goals
3 Preliminaries
3.1 Bilinear Maps
3.2 Dynamic Symmetric Searchable Encryption
3.3 Security Definition
3.4 Result Pattern Leakage
3.5 Asymmetric Scalar-Product-Preserving Encryption ch29wong2009secure
4 Our Scheme
4.1 Construction
4.2 How to Deploy
5 Security Analysis
6 Efficiency Analysis and Performance Evaluation
6.1 Efficiency Comparison
6.2 Experiment Results
7 Conclusion
References
A3BAC: Attribute-Based Access Control Model with Anonymous Access
1 Introduction
2 Preliminary
2.1 ABAC Model
2.2 HABS Algorithm
3 A3BAC Framework
3.1 A3BAC Framework
3.2 Workflow of A3BAC
4 Analysis
5 Conclusion
References
Blockchain-Based Decentralized Privacy-Preserving Data Aggregation (BDPDA)
1 Introduction
2 Related Work
3 Preliminaries
4 System Model and Design Goals
5 The Proposed Scheme
6 Security Analysis
7 Performance Evaluation
8 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<span>This book constitutes the refereed proceedings of the 5</span><span><sup>th</sup></span><span> International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xiâan, china, in December 30-31, 2022.</span><p><span> The 12 full papers were selected from 38 sub
This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xiâan, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentica
<span>This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17</span><span><sup>th </sup></span><span>International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was h
<span>This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17</span><span><sup>th </sup></span><span>International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was h
<span>This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The rapidly increasing devices and data traffic in the