Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack
TANG Xin, ZHOU Linna
Journal of Computer Applications    2020, 40 (4): 1085-1090.   DOI: 10.11772/j.issn.1001-9081.2019081468
Abstract533)      PDF (901KB)(305)       Save
Appending chunk attack is an important attack to threaten the security of cross-user deduplication for cloud data,which works by appending a random number of non-duplicate chunks to the file to be detected,making it impossible for cloud service providers to determine the true existence of the file. Therefore,the existence privacy of cloud data cannot be protected by general ways of response obfuscation methods. To deal with this problem,a new response obfuscation based secure deduplication method with resistance against appending chunk attack was proposed. By calculating the number of appending chunks,counting the number of non-duplicate chunks and comparing these two to determine the minimum number of redundant chunks involved in the response,so as to achieve the obfuscation. As a result,the existence of the checking file was not able to be judged by the attacker according to the response with little extra communication overhead. Security analysis and experimental results show that,compared with the state-of-the-art in this field,the proposed method achieves higher level of security with smaller amount of overhead required,or improves security significantly with comparable or slightly increased overhead.
Reference | Related Articles | Metrics
Secure performance analysis based on opportunity relaying transmission scheme
ZHANG Yongjian, HE Yucheng, ZHOU Lin
Journal of Computer Applications    2018, 38 (10): 2908-2912.   DOI: 10.11772/j.issn.1001-9081.2018030665
Abstract423)      PDF (835KB)(291)       Save
To solve the problem of information being intercepted by illegal users during wireless communication, a secure transmission strategy based on optimal relay selection was proposed. Firstly, the pre-designed artificial noise and useful information were integrated at the source node, and the best relay selection algorithm was used to select the best relay to forward the received information. Secondly, the secrecy capacity, outage probability and interpret probability of the system were derived. Finally, the optimal number of relays were determined by the comprehensive performance of security and reliability. Theoretical analysis and experimental simulation results show that compared with the traditional system model without artificial noise, the performance of the proposed system can be significantly improved by adding relay nodes.
Reference | Related Articles | Metrics
Novel channel-adaptive coded cooperation scheme
QIAO Ying, HE Yucheng, ZHOU Lin
Journal of Computer Applications    2015, 35 (5): 1218-1223.   DOI: 10.11772/j.issn.1001-9081.2015.05.1218
Abstract363)      PDF (871KB)(571)       Save

To overcome the severe performance loss of conventional coded cooperation schemes under dynamic channel conditions in mobility scenarios, a novel adaptive coded cooperation scheme was proposed by using rate-compatible Low-Density Parity Check (LDPC) codes in combination with a Hybrid Automatic Repeat reQuest (HARQ) protocol. It was assumed that channel state information changed during each transmission. By automatic retransmission of unequal length incremental redundancy, the equivalent code rates at the cooperative and destination nodes could be nonlinearly adjusted with channel conditions. The expressions for outage probability and throughput were derived for evaluating the system performance of the proposed scheme, and theoretical analysis and simulation results were presented. These results show that, compared with conventional schemes and equal-length retransmission schemes, the proposed scheme with properly designed compatible rates can effectively reduce the system outage probability, increase the throughput, and improve the transmission reliability of cooperative communications in mobility scenarios.

Reference | Related Articles | Metrics
Sheep body size measurement based on computer vision
JIANG Jie ZHOU Lina LI Gang
Journal of Computer Applications    2014, 34 (3): 846-850.   DOI: 10.11772/j.issn.1001-9081.2014.03.0846
Abstract721)      PDF (964KB)(495)       Save

Body size parameters are important indicators to evaluate the growth status of sheep. How to achieve the measurement with non-stress instrument is an urgent and important problem that needs to be resolved in the breeding process of sheep. This paper introduced corresponding machine vision methods to measure the parameters. Sheep body in complex environment was detected by gray-based background subtraction method and chromaticity invariance principle. By virtue of grid method, the contour envelope of sheep body was extracted. After analyzing the contour sequence with D-P algorithm and Helen-Qin Jiushao formula, the point with maximum curvature in the contour was acquired. The point was chosen as the measurement point at the hip of sheep. Based on the above information, the other three measurment points were attained using four-point method and combing the spatial resolution, the body size parameters of sheep body were acquired. And the contactless measurement was achieved. The experimental results show that, the proposed method can effectively extract sheep body in complex environment; the measurement point at hip of sheep can be stably determined and the height of sheep can be stably attained. Due to the complexity of the ambient light, there still exits some problems when determining the shoulder points.

Related Articles | Metrics