http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Energy-Efficient Algorithm for Assigning Verification Tasks in Cloud Storage
( Guangwei Xu ),( Zhifeng Sun ),( Cairong Yan ),( Xiujin Shi ),( Yue Li ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.1
Mobile Cloud Computing has become a promising computing platform. It moves users` data to the centralized large data centers for users` mobile devices to conveniently access. Since the data storage service may not be fully trusted, many public verification algorithms are proposed to check the data integrity. However, these algorithms hardly consider the huge computational burden for the verifiers with resource-constrained mobile devices to execute the verification tasks. We propose an energy-efficient algorithm for assigning verification tasks (EEAVT) to optimize the energy consumption and assign the verification tasks by elastic and customizable ways. The algorithm prioritizes verification tasks according to the expected finish time of the verification, and assigns the number of checked blocks referring to devices` residual energy and available operation time. Theoretical analysis and experiment evaluation show that our algorithm not only shortens the verification finish time, but also decreases energy consumption, thus improving the efficiency and reliability of the verification.
Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing
Guangwei Xu,Chen Wang,Shan Li,Xiujin Shi,Xin Luo,Yanglan Gan 한국인터넷정보학회 2024 KSII Transactions on Internet and Information Syst Vol.18 No.4
Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks
( Wei Li ),( Chenyu Ge ),( Dawu Gu ),( Linfeng Liao ),( Zhiyong Gao ),( Xiujin Shi ),( Ting Lu ),( Ya Liu ),( Zhiqiang Liu ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.7
With the enlargement of wireless technology, vehicular ad-hoc networks (VANETs) are rising as a hopeful way to realize smart cities and address a lot of vital transportation problems such as road security, convenience, and efficiency. To achieve data confidentiality, integrity and authentication applying lightweight cryptosystems is widely recognized as a rather efficient approach for the VANETs. The Khudra cipher is such a lightweight cryptosystem with a typical Generalized Feistel Network, and supports 80-bit secret key. Up to now, little research of fault analysis has been devoted to attacking Khudra. On the basis of the single nibble-oriented fault model, we propose a differential fault analysis on Khudra. The attack can recover its 80-bit secret key by introducing only 2 faults. The results in this study will provides vital references for the security evaluations of other lightweight ciphers in the VANETs.