• Title/Summary/Keyword: A key technique

Search Result 1,745, Processing Time 0.033 seconds

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing

  • Zhang, Yinghui;Chen, Xiaofeng;Li, Jin;Li, Hui;Li, Fenghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4028-4049
    • /
    • 2014
  • Attribute-based encryption (ABE) is a promising cryptographic primitive for implementing fine-grained data sharing in cloud computing. However, before ABE can be widely deployed in practical cloud storage systems, a challenging issue with regard to attributes and user revocation has to be addressed. To our knowledge, most of the existing ABE schemes fail to support flexible and direct revocation owing to the burdensome update of attribute secret keys and all the ciphertexts. Aiming at tackling the challenge above, we formalize the notion of ciphertext-policy ABE supporting flexible and direct revocation (FDR-CP-ABE), and present a concrete construction. The proposed scheme supports direct attribute and user revocation. To achieve this goal, we introduce an auxiliary function to determine the ciphertexts involved in revocation events, and then only update these involved ciphertexts by adopting the technique of broadcast encryption. Furthermore, our construction is proven secure in the standard model. Theoretical analysis and experimental results indicate that FDR-CP-ABE outperforms the previous revocation-related methods.

A Fragile Watermarking Scheme Using a Arithmetic Coding (산술부호화를 이용한 연성 워터마킹 기법)

  • Piao, Cheng-Ri;Paek, Seung-Eun;Han, Seung-Soo
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.49-55
    • /
    • 2006
  • In this paper, a new fragile watermarking algorithm for digital image is presented, which makes resolving the security and forgery problem of the digital image to be possible. The most suitable watermarking method that verifies the authentication and integrity of the digital image is the Wong's method, which invokes the hash function (MD5). The algorithm is safe because this method uses the hash function of the cryptology. The operations such as modulus, complement, shift, bitwise exclusive-or, bitwise inclusive-or are necessary for calculating the value of hash function. But, in this paper, an Arithmetic encoding method that only includes the multiplication operation is adopted. This technique prints out accumulative probability interval, which is obtained by multiplying the input symbol probability interval. In this paper, the initial probability interval is determined according to the value of the key, and the input sequence of the symbols is adjusted according to the key value so that the accumulative probability interval will depend on the key value. The integrity of the algorithm has been verified by experiment. The PSNR is above the 51.13db and the verifying time is $1/3{\sim}1/4$ of the verifying time of using the hash function (MD5), so, it can be used in the real-time system.

  • PDF

Probabilistic Assessment of Voltage Stability Margin in Presence of Wind Speed Correlation

  • Li, Hongxin;Cai, DeFu;Li, Yinhong
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.719-728
    • /
    • 2013
  • Probabilistic assessment of voltage stability margin (VSM) with existence of correlated wind speeds is investigated. Nataf transformation is adopted to establish wind speed correlation (WSC) model. Based on the saddle-node bifurcation transversality condition equations and Monte Carlo simulation technique, probability distribution of VSM is determined. With correlation coefficients range low to high value, the effect of WSC on VSM is studied. In addition, two risk indexes are proposed and the possible threat caused by WSC is evaluated from the viewpoint of risk analysis. Experimental results show that the presence of correlated wind speeds is harmful to safe and stable operation of a power system as far as voltage stability is concerned. The achievement of this paper gives a detailed elaboration about the influence of WSC on voltage stability and provides a potentially effective analytical tool for modern power system with large-scale wind power sources integration.

Labeling Big Spatial Data: A Case Study of New York Taxi Limousine Dataset

  • AlBatati, Fawaz;Alarabi, Louai
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.207-212
    • /
    • 2021
  • Clustering Unlabeled Spatial-datasets to convert them to Labeled Spatial-datasets is a challenging task specially for geographical information systems. In this research study we investigated the NYC Taxi Limousine Commission dataset and discover that all of the spatial-temporal trajectory are unlabeled Spatial-datasets, which is in this case it is not suitable for any data mining tasks, such as classification and regression. Therefore, it is necessary to convert unlabeled Spatial-datasets into labeled Spatial-datasets. In this research study we are going to use the Clustering Technique to do this task for all the Trajectory datasets. A key difficulty for applying machine learning classification algorithms for many applications is that they require a lot of labeled datasets. Labeling a Big-data in many cases is a costly process. In this paper, we show the effectiveness of utilizing a Clustering Technique for labeling spatial data that leads to a high-accuracy classifier.

A Design of Sybil Attack detection technique using ID-based certificate on Sensor network (센서 네트워크에서 ID기반 인증서를 이용한 Sybil 공격 탐지 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.467-470
    • /
    • 2012
  • This paper proposes a technique of sybil attack detection using an ID-based certificate on sensor network. First, it can solve the broadcast storm problem happening when keys are distributed to sensor nodes. Second, it prevents the replay attack by periodically generating and changing the keys of sensor nodes with Key-chain technique. Third, it authenticates sensor node's ID using hash function. So, it maximizes sensor node's memory usage, reduces communication overhead. Finally it detects Sybil attack through ID-based certificate. Therefore, the proposed technique of Sybil attack detection using ID-based certificate consider simultaneously energy efficiency and stability on sensor network environment, and can trust the provided information through sensor network.

  • PDF

Heterogeneity-aware Energy-efficient Clustering (HEC) Technique for WSNs

  • Sharma, Sukhwinder;Bansal, Rakesh Kumar;Bansal, Savina
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1866-1888
    • /
    • 2017
  • Efficient energy consumption in WSN is one of the key design issues for improving network stability period. In this paper, we propose a new Heterogeneity-aware Energy-efficient Clustering (HEC) technique which considers two types of heterogeneity - network lifetime and of sensor nodes. Selection of cluster head nodes is done based on the three network lifetime phases: only advanced nodes are allowed to become cluster heads in the initial phase; in the second active phase all nodes are allowed to participate in cluster head selection process with equal probability, and in the last dying out phase, clustering is relaxed by allowing direct transmission. Simulation-based performance analysis of the proposed technique as compared to other relevant techniques shows that HEC achieves longer stable region, improved throughput, and better energy dissipation owing to judicious consumption of additional energy of advanced nodes. On an average, the improvement observed for stability period over LEACH, SEP, FAIR and HEC- with SEP protocols is around 65%, 30%, 15% and 17% respectively. Further, the scalability of proposed technique is tested by varying the field size and number of sensing nodes. The results obtained are found to be quite optimistic. The impact of energy heterogeneity has also been assessed and it is found to improve the stability period though only upto a certain extent.

Moving Object Extraction Based on Block Motion Vectors (블록 움직임벡터 기반의 움직임 객체 추출)

  • Kim Dong-Wook;Kim Ho-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1373-1379
    • /
    • 2006
  • Moving object extraction is one of key research topics for various video services. In this study, a new moving object extraction algorithm is introduced to extract objects using block motion vectors in video data. To do this, 1) a maximum a posteriori probability and Gibbs random field are used to obtain real block motion vectors,2) a 2-D histogram technique is used to determine a global motion, 3) additionally, a block segmentation is fellowed. In the computer simulation results, the proposed technique shows a good performance.

Time-Discretization of Nonlinear Systems with Time Delayed Output via Taylor Series

  • Yuanliang Zhang;Chong Kil-To
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.7
    • /
    • pp.950-960
    • /
    • 2006
  • An output time delay always exists in practical systems. Analysis of the delay phenomenon in a continuous-time domain is sophisticated. It is appropriate to obtain its corresponding discrete-time model for implementation via a digital computer. A new method for the discretization of nonlinear systems using Taylor series expansion and the zero-order hold assumption is proposed in this paper. This method is applied to the sampled-data representation of a nonlinear system with a constant output time-delay. In particular, the effect of the time-discretization method on key properties of nonlinear control systems, such as equilibrium properties and asymptotic stability, is examined. In addition, 'hybrid' discretization schemes resulting from a combination of the 'scaling and squaring' technique with the Taylor method are also proposed, especially under conditions of very low sampling rates. A performance of the proposed method is evaluated using two nonlinear systems with time-delay output.

AUTOMATIC DETECTION AND EXTRACTION ALGORITHM OF INTER-GRANULAR BRIGHT POINTS

  • Feng, Song;Ji, Kai-Fan;Deng, Hui;Wang, Feng;Fu, Xiao-Dong
    • Journal of The Korean Astronomical Society
    • /
    • v.45 no.6
    • /
    • pp.167-173
    • /
    • 2012
  • Inter-granular Bright Points (igBPs) are small-scale objects in the Solar photosphere which can be seen within dark inter-granular lanes. We present a new algorithm to automatically detect and extract igBPs. Laplacian and Morphological Dilation (LMD) technique is employed by the algorithm. It involves three basic processing steps: (1) obtaining candidate "seed" regions by Laplacian; (2) determining the boundary and size of igBPs by morphological dilation; (3) discarding brighter granules by a probability criterion. For validating our algorithm, we used the observed samples of the Dutch Open Telescope (DOT), collected on April 12, 2007. They contain 180 high-resolution images, and each has a $85{\times}68\;arcsec^2$ field of view (FOV). Two important results are obtained: first, the identified rate of igBPs reaches 95% and is higher than previous results; second, the diameter distribution is $220{\pm}25km$, which is fully consistent with previously published data. We conclude that the presented algorithm can detect and extract igBPs automatically and effectively.

Analysis of the mechanical properties and failure modes of rock masses with nonpersistent joint networks

  • Wu, Yongning;Zhao, Yang;Tang, Peng;Wang, Wenhai;Jiang, Lishuai
    • Geomechanics and Engineering
    • /
    • v.30 no.3
    • /
    • pp.281-291
    • /
    • 2022
  • Complex rock masses include various joint planes, bedding planes and other weak structural planes. The existence of these structural planes affects the mechanical properties, deformation rules and failure modes of jointed rock masses. To study the influence of the parameters of a nonpersistent joint network on the mechanical properties and failure modes of jointed rock masses, synthetic rock mass (SRM) technology based on discrete elements is introduced. The results show that as the size of the joints in the rock mass increases, the compressive strength and the discreteness of the rock mass first increase and then decrease. Among them, the joints that are characterized by "small but many" joints and "large and clustered" joints have the most significant impact on the strength of the rock mass. With the increase in joint density in the rock mass, the compressive strength of rock mass decreases monotonically, but the rate of decrease gradually decreases. With the increase in the joint dip angle in rock mass, the strength of the rock mass first decreases and then increases, forming a U-shaped change rule. In the analysis of the failure mode and deformation of a jointed rock mass, the type of plastic zone formed after rock mass failure is closely related to the macroscopic displacement deformation of the rock mass and the parameters of the joints, which generally shows that the location and density of the joints greatly affect the failure mode and displacement degree of the jointed rock mass. The instability mechanism of jointed surrounding rock is revealed.