Abstract:Statistics
from security firms, research institutions and government organizations
show that the number of data-leak instances have grown rapidly in recent
years. Among various data-leak cases, human mistakes are one of the main
causes of data loss. There exist solutions detecting inadvertent
sensitive data leaks caused by human mistakes and to provide
alerts for organizations. A common approach is to screen content in storage and transmission
for exposed sensitive information. Such an approach usually requires the
detection operation to be conducted in secrecy. However, this secrecy
requirement is challenging to satisfy in practice, as detection servers
may be compromised or outsourced. In this paper, we present a
privacypreserving data-leak detection (DLD) solution to solve the
issue where a special set of sensitive data digests is used in
detection. The advantage of our method is that it enables the data owner
to safely delegate the detection operation to a semihonest
provider without revealing the sensitive data to the provider. We
describe how Internet service providers can offer their customers DLD
as an add-on service with strong privacy guarantees. The
evaluation results show that our method can support accurate
detection with very small number of false alarms under various
data-leak scenarios.
IEEE 2015: An Energy-Efficient and Delay-Aware Wireless Computing System
for Industrial Wireless Sensor Networks
Abstract: Industrial wireless sensor networks have attracted much
attention as a cornerstone to making the smart factories real. Utilizing
industrial wireless sensor networks as a base for smart factories makes it
possible to optimize the production line without human resources since it
provides industrial Internet of Things (IoT) service, where various types
of data are collected from sensors and mined to control the machines based
on the analysis result. On the other hand, a fog computing node,
which executes such real-time feedback control, should be capable of
real-time data collection, management, and processing. To achieve these
requirements, in this paper, we introduce Wireless Computing System (WCS)
as a fog computing node. Since there are a lot of servers and each server
has 60 GHz antennas to connect to other servers and sensors, WCS has high
collecting and processing capabilities. However, in order to fulfill a
demand for real-time feedback control, WCS needs to satisfy an
acceptable delay for data collection. Additionally, lower power
consumption is required in order to reduce the cost for factory
operation. Therefore, we propose an Energy-Efficient and
Delay-Aware Wireless Computing System (E2DA-WCS). Since there is a
tradeoff relationship between the power consumption and the delay
for data collection, our proposed system controls the sleep
schedule and the number of links to minimize the power
consumption while satisfying an acceptable delay constraint.
Furthermore, the effectiveness of our proposed system is evaluated
through extensive computer simulations.
IEEE 2015: Cost-Effective Authentic and Anonymous Data Sharing with Forward
Security
Abstract: Data
sharing has never been easier with the advances of cloud computing, and an
accurate analysis on the shared data provides an array of benefits to both
the society and individuals. Data sharing with a large number of participants
must take into account several issues, including efficiency, data
integrity and privacy of data owner. Ring signature is a promising candidate to
construct an anonymous and authentic data sharing system. It allows a data
owner to anonymously authenticate his data which can be put into the cloud
for storage or analysis purpose. Yet the costly certificate verification in the
traditional public key infrastructure (PKI) setting becomes a bottleneck
for this solution to be scalable. Identity-based (ID-based) ring signature,
which eliminates the process of certificate verification, can be used
instead. In this paper, we further enhance the security of ID-based ring
signature by providing forward security: If a secret key of any user has
been compromised, all previous generated signatures that include this user
still remain valid. This property is especially important to any large
scale data sharing system, as it is impossible to ask all data owners to
reauthenticate their data even if a secret key of one single user has been
compromised. We provide a concrete and efficient instantiation of our
scheme, prove its security and provide an implementation to show its
practicality.
IEEE 2015 : k Nearest Neighbor Search for Location-Dependent Sensor Data
in MANETs
Abstract:K nearest neighbor (kNN) queries, which
retrieve the k nearest sensor data items associated with a
location (location-dependent sensor data) from the location of the
query issuer, are useful for location-based services (LBSs) in mobile environments.
Here, we focus on kNN query processing in mobile ad hoc networks
(MANETs). Key challenges in designing system protocols for MANETs include
low-overhead adaptability to network topology changes due to node
mobility, and query processing that achieves high accuracy of the query
result without a centralized server. In this paper, we propose the Filling
Area (FA) method to efficiently process kNN queries in
MANETs. The FA method achieves low overhead in query processing
by reducing a search area. In the FA method, data items remain
at nodes near the locations with which the items are associated,
and nodes cache data items whose locations are near their own so that
the query issuer retrieves kNNs from nearby nodes. Through extensive
simulations, we verify that our proposed approach achieves low overhead
and high accuracy of the query result.
No comments:
Post a Comment