Article
Computer Science, Information Systems
Peng Jiang, Baoqi Qiu, Liehuang Zhu, Keke Gai
Summary: The integration of Internet of Things (IoT) with cloud computing has led to significant developments in encrypted data retrieval, particularly through the use of searchable encryption technology such as Public-key encryption with keyword search (PEKS). This work introduces SearchBC, a blockchain-based PEKS framework designed to ensure private, reliable, and fair encrypted search over the asymmetric setting. SearchBC guarantees fair and reliable search operations while maintaining keyword privacy, offering a feasible solution with reasonable communication and computation costs.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Rajesh Gupta, Dakshita Reebadiya, Sudeep Tanwar, Neeraj Kumar, Mohsen Guizani
Summary: This study introduces a blockchain-based edge intelligence system to address data security, privacy, latency, and efficiency issues in edge computing. The system uses public and private blockchains to ensure data security and communication privacy while presenting a use case scenario in the COVID-19 pandemic.
Article
Computer Science, Information Systems
Myeonghyun Kim, Joonyoung Lee, Kisung Park, Yohan Park, Kil Houm Park, Youngho Park
Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.
Article
Engineering, Electrical & Electronic
Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das, Sourav Saha, Pascal Lorenz, YoungHo Park
Summary: In the Internet of Vehicles (IoV), the blockchain-assisted certificateless key agreement protocol Block-CLAP provides superior security and lower communication and computational overheads compared to existing competing authentication schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Engineering, Electrical & Electronic
Xinghua Li, Jiao Liu, Mohammad S. Obaidat, P. Vijayakumar, Qi Jiang, Ruhul Amin
Summary: The paper introduces an unlinkable authenticated key agreement with collusion resistance for VANETs, which enhances security and efficiency by generating multiple hidden identities and shared tickets by a trusted authority for vehicles and RSUs to conduct anonymous authentication.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Engineering, Multidisciplinary
Pronaya Bhattacharya, Sudeep Tanwar, Umesh Bodkhe, Sudhanshu Tyagi, Neeraj Kumar
Summary: Electronic Health Records (EHRs) are managed and shared using blockchain technology, addressing privacy and security concerns, while also utilizing deep learning techniques for disease prediction.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Article
Computer Science, Information Systems
Tong Chen, Lei Zhang, Kim-Kwang Raymond Choo, Rui Zhang, Xinyu Meng
Summary: The deployment of fog computing can reduce overheads at cloud servers and improve user experience, but it also requires attention to security implications. This study introduces a novel fog system and proposes a blockchain-based group key management scheme to address secure key establishment and resource authentication. Simulation findings and secure analysis demonstrate the effectiveness of the proposed system.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Mingping Qi, Jianhua Chen
Summary: This article presents a new efficient anonymous one-way AKE protocol, which has strong anonymity and security properties guarantee, and efficiency advantages. The protocol is formally proved secure in the random oracle model under the Gap-DH and XCR signature security assumptions.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Jing Chen, Zeyi Zhan, Kun He, Ruiying Du, Donghui Wang, Fei Liu
Summary: This article presents an efficient privacy-preserving cross-domain authentication scheme, called XAuth, which is integrated with existing PKI and CT systems, and is characterized by rapid responsiveness and anonymous authentication.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Automation & Control Systems
Xiaoding Wang, Sahil Garg, Hui Lin, Md. Jalil Piran, Jia Hu, M. Shamim Hossain
Summary: The article proposes a novel authentication mechanism ATLB based on transfer learning and blockchain, which trains user authentication models in specific regions and transfers them for quick authentication in other areas to address data security and privacy challenges in Industrial Internet of Things.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Samiulla Itoo, Akber Ali Khan, Vinod Kumar, Ahmed Alkhayyat, Musheer Ahmad, Jangirala Srinivas
Summary: In the traditional medical healthcare system, sharing patient data is challenging. Blockchain technology and cloud computing can address this issue and provide better privacy and security.
Article
Automation & Control Systems
B. D. Deebak, Fida Hussain Memon, Kapal Dev, Sunder Ali Khowaja, Weizheng Wang, Nawab Muhammad Faseeh Qureshi
Summary: This article proposes a trust-aware blockchain-based seamless authentication with privacy-preserving (TAB-SAPP) method to address the issues of privacy, security, and packet delivery in IoT applications. By utilizing identity management and a novel data traffic pattern, this method can expand user connectivity and improve communication metrics.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Automation & Control Systems
Lei Xu, Ting Bao, Liehuang Zhu
Summary: This article explores the differentially private data publishing problem and proposes two blockchain-based data publishing protocols for histogram publishing and anonymized data publishing, aiming to achieve fair and auditable data sharing through the blockchain acting as a reliable intermediary.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Lianhai Wang, Debiao He
Summary: Internet of Vehicles (IoV) is an emerging technology for transportation systems, but security and privacy remain key concerns. Existing solutions have vulnerabilities, so designing secure and efficient solutions is still challenging. This article analyzes the weaknesses of a proposed authentication protocol and presents an improved protocol called SeMAV, which uses passwords and smart cards for enhanced security and provides security proofs against common attacks.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Zhigang Yang, Ruyan Wang, Honggang Wang, Dapeng Wu
Summary: This article proposes a cloud edge-client collaborative trajectory privacy protection system to address the privacy risks and shortcomings of existing solutions in centralized location-based services (LBS). By migrating LBS from the cloud to the network edge and implementing anonymous authentication, dummy location, and privacy risk evaluation mechanisms, the system effectively protects trajectory privacy while maintaining service and data availability, leading to significant improvements compared to current LBS systems.
Article
Computer Science, Information Systems
Chuan Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Kai Ding, Ximeng Liu, Xiaojiang Du, Mohsen Guizani
Summary: This article presents a trust-based and privacy-preserving platoon recommendation scheme called TPPR, which enables potential user vehicles to avoid selecting malicious head vehicles and protects vehicle privacy. By utilizing truth discovery and authentication protocols, the security of the vehicle platoon system is improved.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Information Systems
Chang Xu, Ningning Wang, Liehuang Zhu, Chuan Zhang, Kashif Sharif, Huishu Wu
Summary: The integration of body sensors, cloud computing, and mobile communication technologies has greatly enhanced the development and accessibility of e-healthcare systems. The authors propose two reliable and privacy-preserving schemes for top-k disease matching, and simulations and security analyses demonstrate the effectiveness and privacy-preservation properties of these schemes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Chang Xu, Guoxie Jin, Liehuang Zhu, Chuan Zhang, Yu Jia
Summary: This paper proposes a non-interactive privacy-preserving deep learning scheme called EPDL, which allows efficient training of deep learning models while protecting the privacy of image data by utilizing the additive homomorphic properties of a cryptographic system.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Liehuang Zhu, Chuan Zhang, Chang Xu, Wei Wang, Xiaojiang Du, Mohsen Guizani, Kashif Sharif
Summary: This article introduces an efficient and privacy-preserving disease prediction scheme using randomizable signature and matrices encryption technique. It outperforms the existing solution in terms of data privacy and user identity protection.
Article
Computer Science, Information Systems
Chuan Zhang, Liehuang Zhu, Chang Xu, Jianbing Ni, Cheng Huang, Xuemin Shen
Summary: This paper proposes location privacy-preserving task recommendation schemes in mobile crowdsensing, without the need for a trusted database owner. The schemes, named PPTR-L and PPTR-F, achieve linear and faster-than-linear search complexity respectively, while ensuring the confidentiality of workers' locations and data requesters' queries.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Theory & Methods
Chang Xu, Yu Jia, Liehuang Zhu, Chuan Zhang, Guoxie Jin, Kashif Sharif
Summary: This study proposes a novel federated learning method called TDFL, which uses truth discovery to defend against multiple poisoning attacks. The method is designed to address different attack scenarios and achieves strong robustness without relying on additional datasets.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2022)
Article
Engineering, Electrical & Electronic
Can Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Rongxing Lu, Yupeng Chen
Summary: The vehicle supply chain industry is rapidly developing with the popularization of electric vehicles. Counterfeit products pose significant challenges and risks to the industry. In this paper, a reliable and privacy-preserving blockchain-based solution called APPB is proposed to address these issues.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Computer Science, Hardware & Architecture
Can Zhang, Liehuang Zhu, Chang Xu, Zijian Zhang, Rongxing Lu
Summary: Blockchain-based covert communication has opened up a new research direction, providing reliable and undetectable storage methods. However, existing solutions using pre-negotiated and fixed addresses as static labels increase the risk of channel exposure and lack support for large covert message transmission. This paper presents an effective solution with dynamic labels and a message segmentation mechanism, achieving efficient extraction of covert messages and secure transmission of large covert messages.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Chang Xu, Run Yin, Liehuang Zhu, Can Zhang, Kashif Sharif
Summary: The increase in popularity and usage of the Internet of Things (IoT) applications, along with big data, has highlighted the importance of time-series data aggregation. However, existing privacy-preserving solutions face challenges in fault tolerance and establishment of trusted authorities. This paper proposes a privacy-preserving time-series data aggregation scheme without trusted authorities, showcasing its reliability and scalability.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2023)
Article
Mathematics
Dong Han, Zhen Li, Mengyu Wang, Chang Xu, Kashif Sharif
Summary: This paper presents a concrete GSH protocol with Multiple Groups, which provides affiliation-hiding and detectability while achieving Perfect Forward Secrecy. Only legitimate members can prove their affiliations without revealing specific group identities.
Article
Engineering, Electrical & Electronic
Liehuang Zhu, Md Monjurul Karim, Kashif Sharif, Chang Xu, Fan Li
Summary: This article proposes a UAV-assisted multi-layer IC-SDN solution to address content distribution challenges in UAV-assisted networks. It introduces distributed controllers placed hierarchically in the edge and cloud tiers and formulates the traffic optimization problem using a queueing allocation model. The proposed solution maximizes throughput and minimizes computational latency, delay, and packet loss, as shown through simulation and numerical evaluation.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Hardware & Architecture
Chang Xu, Yayun Si, Liehuang Zhu, Chuan Zhang, Kashif Sharif, Huishu Wu
Summary: This paper investigates the problem of dynamic data transaction in crowdsensing. The contribution of new data to the collector is modeled using the Shapley value, and a contextual bandit model is used to determine the transaction price. Simulation experiments demonstrate the effectiveness of the proposed scheme.
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING
(2022)
Proceedings Paper
Computer Science, Software Engineering
Chang Xu, Hongzhou Rao, Liehuang Zhu, Chuan Zhang, Kashif Sharif
Summary: This paper proposes a novel scheme named V-EPTD that not only protects privacy information but also verifies the computing in truth discovery. The experimentation and analysis show that V-EPTD has good performances for users, verifiers, and the server, both in communication overhead and computation overhead.
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III
(2022)
Proceedings Paper
Computer Science, Information Systems
Yujia Tang, Chang Xu, Can Zhang, Yan Wu, Liehuang Zhu
Summary: Tornado Cash, a popular non-custodial coin mixer on Ethereum, is used to protect the privacy of addresses. However, it has privacy leakage risks due to inappropriate transaction behaviors. This paper analyzes the privacy issues of Tornado Cash and proposes clustering rules to reduce the size of users' anonymity set.
CYBER SECURITY, CNCERT 2021
(2022)