Learn More
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the(More)
Insider threat has become the main vector of data leakage. Existing research on it mainly focuses on sensing and detection without defense capabilities. Meanwhile, traditional technologies for data leakage prevention rely on the terminal or boundary control which is difficult for data leakage in distributed environment. This paper presents an active data(More)
Cloud storage is used wildly as online data storing and sharing paradigm today. And customers are willing to protect their data by cryptographic access control mechanisms. The cipher text policy attribute based encryption (CP-ABE) algorithm is a promising technique for building cryptographic access control systems. Using CP-ABE schemes, customers can share(More)
Nowadays, more and more customers begin to use the cryptographic cloud storage for protecting their data security. But the re-encryption caused by revocation is a sure performance killer in such a cryptographic access control system. We propose a novel scheme to reduce the consumption of the re-encryption process. This scheme is built on a series of(More)
It is important to verify web service composition to enhance the service security and to guarantee the system quality. In order to ensure the exact running of the web service composition, we put forward a verification method associating formalization and run-time monitor. On the base of real time data in dynamic monitoring, though the mapping to Petri net(More)
Ensuring data reliability and continuity has played an important role for ensuring the information system still working normally when suffering from attack or other abnormal events. The existing data protection technologies are difficult to meet the fine-grained and precise data protection requirements on the widely used Windows platform. Inspiring from the(More)
Cloud computing bring a tremendous complexity to information security. Many researches have been done to establish and maintain the trust relationship in cloud. Remote attestation is one of the most important feature of trusted computing. But conventional ways of remote attestation can only attest to the presence of a particular binary. They cannot measure(More)
Continuous Data Protection (CDP) technology is a good schema for ensuring the continuity and survival capability of the service applications. However, the existing continuous data protection technology is difficult to meet the requirements, which means more fine-grained, closely associated with the upper applications and efficient failure recovery(More)
Current social networks are widespread used all over the world. And many users pay more and more attentions on how to protect their privacy in social networks. Traditional social networks based on client/server architecture cannot protect users' private information because the operator is untrusted. We propose a P2P architecture for social networking,(More)