Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To re...The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To reduce the authentication costs associated with communication,computation and energy,this paper proposes a simple and low-cost re-authentication protocol that does not compromise the provided security services.The proposed protocol uses as the re-authentication parameter a Master Session Key(MSK)that has already been computed in the initial authentication,and does not require the full initial authentication to be repeated.Moreover,the proposed protocol does not modify the 3GPP infrastructure,and is easily applied to the HeNB system.Finally,the security of the proposed protocol is verified by Automated Validation of Internet Security Protocols and Applications(AVISPA)and Burrows-Abadi-Needham(BAN)Logic;detailed evaluations of performance are also given.The analysis results illustrate that the proposed protocol can achieve at least 50%cost reduction in communication and 58%cost reduction in energy.The computational cost is also reduced by half compared with the initial authentication.展开更多
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
基金supported by the China Scholarship Councilthe National Natural Science Foundation of China under Grants No. 60772136, No. 61102056+1 种基金the Fundamental Research Funds for the Central Universities under Grant No. JY10000901025the project supported by Natural Science Basic Research Plan in Shaanxi Province of China under Grant No. 2011JQ8042
文摘The 3rd Generation Partnership Project(3GPP)defined a new architecture,called Home eNode B(HeNB).The 3GPP has also presented a protocol for communications between HeNB and core networks for mutual authentication.To reduce the authentication costs associated with communication,computation and energy,this paper proposes a simple and low-cost re-authentication protocol that does not compromise the provided security services.The proposed protocol uses as the re-authentication parameter a Master Session Key(MSK)that has already been computed in the initial authentication,and does not require the full initial authentication to be repeated.Moreover,the proposed protocol does not modify the 3GPP infrastructure,and is easily applied to the HeNB system.Finally,the security of the proposed protocol is verified by Automated Validation of Internet Security Protocols and Applications(AVISPA)and Burrows-Abadi-Needham(BAN)Logic;detailed evaluations of performance are also given.The analysis results illustrate that the proposed protocol can achieve at least 50%cost reduction in communication and 58%cost reduction in energy.The computational cost is also reduced by half compared with the initial authentication.