http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Multi-domain Security Authentication Protocol for Hybrid Cloud
Zhang Qikun,Zhang Lei,Gan Yong,Duan zhaolei,Zheng Jun 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.8
In recent years, with the high-speed development of cloud computing and its universal application, the cloud security technology is more and more important. In cloud computing, it is mainly through the resource sharing and collaborative action to meet the demand for an unlimited access speed, unlimited storage space and a reliable resource protection for users. For the secure access resources among different domains in cloud network, today most Cloud Computing Systems provide data security and mutual authentication with asymmetric and traditional public key cryptography. For these researches, the authentication process is cumbersome, and the certificate management is complex, which would bring some inconvenience for mutual authentication among servers or users in a Hybrid Cloud. This paper provides a security authentication protocol among multiple domains. It adopts the direct product decomposition and linear mapping technology of cyclic group to achieve mutual authentication between members in multi-domain systems or heterogeneous networks. Extensive security and performance analysis show that the proposed schemes have the advantages of in security, computation consumption and Communication consumption. It is suitable for safety authentication in large-scale Cloud computing environment.
Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives
( Junsong Zhang ),( Lei He ),( Qikun Zhang ),( Yong Gan ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.11
Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.
Jixiang Cai,Bing Huang,Qikun Ma,Wenwen Zhang 한국화학공학회 2017 Korean Journal of Chemical Engineering Vol.34 No.6
We propose a novel process for the preparation of silica and concentrated hydrochloric acid using chlorosilane residual liquid originating from the polysilicon production process. The process was designed and optimized after conducting pilot plant tests. The effects of circulating acid concentration, flow rate, chlorosilane residual liquid treatment load and other factors on silica products were studied. The results showed that the circulating acid flowrate can effectively control the formation of gel, and the amount of chlorosilane residual liquid has significant influence on the hydrolysis efficiency and operation of the hydrolysis tower. The prepared silica was characterized using XRD, XRF, FTIR, SEM, DLS, TG-MS and N2 adsorption/desorption experiments. The results indicated that silica consisted of amorphous particles, which were spherical, had surface hydroxyl, and showed heterogeneous distribution. The average particle size was 50-80 μm and had high specific surface area (565.049m2g−1), large pore volume (0.449 cm3g−1), and a narrow pore size distribution (3.419 nm). The new technology provides a simple, efficient and environmentally friendly way for treating chlorosilane residual liquid, as well as a cost-effective method for the preparation of silica.
A Chebyshev-Map Based One-Way Authentication and Key Agreement Scheme for Multi-Server Environment
Zengyu Cai,Yuan Feng,Junsong Zhang,Yong Gan,Qikun Zhang 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.6
One-way authentication and key agreement scheme can achieve strong user anonymity and transmitted data confidentiality over insecure public communication channel, which is very useful for the user who cares about his/her identity information. In conventional networks, Public Key Infrastructure (PKI) is a very useful component to design one-way authentication key agreement scheme. However, it will consume large amounts of computing resources. Therefore, it is inappropriate to PKI in a resource-constrained environment. In this paper, we proposed a new one-way authentication and key agreement scheme based on Chebyshev chaotic map. Compared with the related research activities, our proposed scheme has not only the high efficiency and unique functions, but also robust to various attacks and achieves perfect forward secrecy. Security and performance analyses demonstrate that the proposed scheme can solve various types of security problems and can meet the requirements of computational complexity for low-power mobile devices.