Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    Preserving the Efficiency and Quality of Contributed Data in MCS via User and Task Profiling

    Dingwen Wang, Ming Zhao*

    Journal of Cyber Security, Vol.2, No.2, pp. 63-68, 2020, DOI:10.32604/jcs.2020.07229

    Abstract Mobile crowdsensing is a new paradigm with powerful performance for data collection through a large number of smart devices. It is essential to obtain high quality data in crowdsensing campaign. Most of the existing specs ignore users’ diversity, focus on solving complicated optimization problem, and consider devices as instances of intelligent software agents which can make reasonable choices on behalf of users. Thus, the efficiency and quality of contributed data cannot be preserved simultaneously. In this paper, we propose a new scheme for improving the quality of contributed data, which recommends tasks to users based on calculated score that jointly… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing

    Leqi Jiang1, 2, Zhangjie Fu1, 2, *

    Journal of Cyber Security, Vol.2, No.1, pp. 49-61, 2020, DOI:10.32604/jcs.2020.09308

    Abstract Genetic Algorithm (GA) has been widely used to solve various optimization problems. As the solving process of GA requires large storage and computing resources, it is well motivated to outsource the solving process of GA to the cloud server. However, the algorithm user would never want his data to be disclosed to cloud server. Thus, it is necessary for the user to encrypt the data before transmitting them to the server. But the user will encounter a new problem. The arithmetic operations we are familiar with cannot work directly in the ciphertext domain. In this paper, a privacy-preserving outsourced genetic… More >

  • Open Access

    ARTICLE

    An Amorphous 2-Dimensional Barcode

    Han Jin1, Shi Jin2, *, Junfeng Wu2

    Journal of Cyber Security, Vol.2, No.1, pp. 37-48, 2020, DOI:10.32604/jcs.2020.07209

    Abstract Most existing 2-dimensional barcodes are designed with a fixed shape and clear area. Having a fixed shape and clear area makes the barcode difficult to lay out with other text and pictures. To solve this problem, an amorphous 2-dimensional barcode is presented in this paper. The barcode uses encoding graph units to encode data. There are two key points in a 2-dimensional barcode: One is the encoding graph unit, the other is its encoding rules. Because encoding graph units of a 2-dimensional barcode are surrounded by other graphics, the units should be self-positioned and distinguished from other units. This paper… More >

  • Open Access

    ARTICLE

    A New Adaptive Regularization Parameter Selection Based on Expected Patch Log Likelihood

    Jianwei Zhang1, Ze Qin1, Shunfeng Wang1, *

    Journal of Cyber Security, Vol.2, No.1, pp. 25-36, 2020, DOI:10.32604/jcs.2020.06429

    Abstract Digital images have been applied to various areas such as evidence in courts. However, it always suffers from noise by criminals. This type of computer network security has become a hot issue that can’t be ignored. In this paper, we focus on noise removal so as to provide guarantees for computer network security. Firstly, we introduce a well-known denoising method called Expected Patch Log Likelihood (EPLL) with Gaussian Mixture Model as its prior. This method achieves exciting results in noise removal. However, there remain problems to be solved such as preserving the edge and meaningful details in image denoising, cause… More >

  • Open Access

    ARTICLE

    Searchable Encryption with Access Control on Keywords in Multi-User Setting

    Lei Li1, Chungen Xu1, *, Xiaoling Yu1, Bennian Dou1, Cong Zuo2

    Journal of Cyber Security, Vol.2, No.1, pp. 9-23, 2020, DOI:10.32604/jcs.2020.06313

    Abstract Searchable encryption technology makes it convenient to search encrypted data with keywords for people. A data owner shared his data with other users on the cloud server. For security, it is necessary for him to build a fine-grained and flexible access control mechanism. The main idea of this paper is to let the owner classify his data and then authorizes others according to categories. The cloud server maintains a permission matrix, which will be used to verify whether a trapdoor is valid or not. In this way we can achieve access control and narrow the search range at the same… More >

  • Open Access

    ARTICLE

    The Development of Proxy Re-Encryption

    Yepeng Liu1, 2, Yongjun Ren1, 2, *, Qirun Wang3, Jinyue Xia4

    Journal of Cyber Security, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jcs.2020.05878

    Abstract With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of… More >

  • Open Access

    ARTICLE

    Review of Access Control Model

    Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

    Journal of Cyber Security, Vol.1, No.1, pp. 43-50, 2019, DOI:10.32604/jcs.2019.06070

    Abstract Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed. More >

  • Open Access

    ARTICLE

    A Block Compressed Sensing for Images Selective Encryption in Cloud

    Xingting Liu1, Jianming Zhang2,*, Xudong Li2, Siwang Zhou1, Siyuan Zhou2, Hye-JinKim3

    Journal of Cyber Security, Vol.1, No.1, pp. 29-41, 2019, DOI:10.32604/jcs.2019.06013

    Abstract The theory of compressed sensing (CS) has been proposed to reduce the processing time and accelerate the scanning process. In this paper, the image recovery task is considered to outsource to the cloud server for its abundant computing and storage resources. However, the cloud server is untrusted then may pose a considerable amount of concern for potential privacy leakage. How to protect data privacy and simultaneously maintain management of the image remains challenging. Motivated by the above challenge, we propose an image encryption algorithm based on chaotic system, CS and image saliency. In our scheme, we outsource the image CS… More >

  • Open Access

    ARTICLE

    Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data

    Guangyong Yang1,*, Mengke Yang2,*, Shafaq Salam3, Jianqiu Zeng4

    Journal of Cyber Security, Vol.1, No.1, pp. 19-28, 2019, DOI:10.32604/jcs.2019.05947

    Abstract Big data is becoming increasingly important because of the enormous information generation and storage in recent years. It has become a challenge to the data mining technique and management. Based on the characteristics of geometric explosion of information in the era of big data, this paper studies the possible approaches to balance the maximum value and privacy of information, and disposes the Nine-Cells information matrix, hierarchical classification. Furthermore, the paper uses the rough sets theory to proceed from the two dimensions of value and privacy, establishes information classification method, puts forward the countermeasures for information security. Taking spam messages for… More >

  • Open Access

    ARTICLE

    Secure Model of Medical Data Sharing for Complex Scenarios

    Wei She1, Yue Hu2, Zhao Tian1, Guoning Liu3, Bo Wang4, Wei Liu1, 2, *

    Journal of Cyber Security, Vol.1, No.1, pp. 11-17, 2019, DOI:10.32604/jcs.2019.05856

    Abstract In order to secure the massive heterogeneous medical data for the complex scenarios and improve the information sharing efficiency in healthcare system, a distributed medical data ledger model (DMDL) is proposed in this paper. This DMDL model has adopted the blockchain technology including the function decoupling, the distributed consensus, smart contract as well as multi-channel communication structure of consortium blockchain. The DMDL model not only has high adaptability, but also meets the requirements of the medical treatment processes which generally involve multi-entities, highly private information and secure transaction. The steps for processing the medical data are also introduced. Additionally, the… More >

Displaying 61-70 on page 7 of 71. Per Page