Cloud storage system provides facilitative file storage and sharing services for distributed clients. To address integrity, controllable outsourcing, and origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing outsourced data. First, our IBDO scheme allows a user to authorize dedicated […]
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving
Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to cloud server. The main reason is that database is hosted and processed in cloud server, which is […]
Privacy-Preserving Image Denoising From External Cloud Databases
Along with the rapid advancement of digital image processing technology, image denoising remains a fundamental task, which aims to recover the original image from its noisy observation. With the explosive growth of images on the Internet, one recent trend is to seek high quality similar patches at cloud image databases and harness rich redundancy therein […]
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems
This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are generally small and the resulting images are, therefore, limited in size. […]
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Multi-user broadcast authentication is an important security service in wireless sensor networks (WSNs), as it allows a large number of mobile users of the WSNs to join in and broadcast messages to WSNs dynamically and authentically. To reduce communication cost due to the transmission of public-key certificates, broadcast authentication schemes based on identity (ID)- based […]
GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs
Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and enhance the driving conditions, are exposed to several kinds of attacks such as Denial of Service (DoS) attacks which affect the availability of the underlying services for legitimate users. We focus especially on the greedy behavior which has been extensively addressed […]
Two-Sided Matching Based Cooperative Spectrum Sharing
Dynamic spectrum access (DSA) can effectively improve the spectrum efficiency and alleviate the spectrumscarcity, by allowing unlicensed secondary users (SUs) to access the licensed spectrumof primary users (PUs) opportunistically. Cooperative spectrum sharing is a new promising paradigm to provide necessary incentives for both PUs and SUs in dynamic spectrum access. The key idea is that […]
Optimal Sleep-Wake Scheduling for Energy Harvesting Smart Mobile Devices
In this paper, we develop optimal sleep/wake scheduling algorithms for smart mobile devices that are powered by batteries and are capable of harvesting energy from the environment. Using a novel combination of the two-timescale Lyapunov optimization approach and weight perturbation, we first design the Optimal Sleep/wake scheduling Algorithm (OSA), which does not require any knowledge […]
Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink
We study data gathering problem in Rechargeable Sensor Networks (RSNs) with a mobile sink, where rechargeable sensors are deployed into a region of interest to monitor the environment and a mobile sink travels along a pre-defined path to collect data from sensors periodically. In such RSNs, the optimal data gathering is challenging because the required […]
Cost-Effective Mapping between Wireless Body Area Networks and Cloud Service Providers Based on Multi-Stage Bargaining
This paper presents a bargaining-based resource allocation and price agreement in an environment of cloud-assisted Wireless Body Area Networks (WBANs). The challenge is to finalize a price agreement between the Cloud Service Providers (CSPs) and the WBANs, followed by a cost-effective mapping among them. Existing solutions primarily focus on profits of the CSPs, while guaranteeing […]
- 1
- 2
- 3
- …
- 5
- Next Page »