Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multip...Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multiple variants of a single software in parallel and then checking their behaviors’consistency.However,it is complex to upgrade current Software as a Service(SaaS)applications to adapt N-variant system architecture.Challenges arise from the inability of tenants to adjust the application architecture in the cloud environment,and the difficulty for cloud service providers to implement N-variant systems using existing API gateways.This paper proposes SecIngress,an API gateway framework,to overcome the challenge that it is hard in the cloud environment to upgrade the applications based on N-variants system.We design a two-stage timeout processing method to lessen the service latency and an Analytic Hierarchy Process Voting under the Metadata mechanism(AHPVM)to enhance voting accuracy.We implement a prototype in a testbed environment and analyze the security and performance metrics before and after deploying the prototype to show the effectiveness of SecIngress.The results reveal that SecIngress enhances the reliability of cloud applications with acceptable performance degradation.展开更多
This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic comp...This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic complex ecosystem security pattern,and then analyzed the spatial characteristics of ecological security changes and discusses reasons for these changes.The results show that the landscape pattern changed dramatically from natural landscape to a mixture of natural landscape and artificial landscape from 1983 to 2018 due to the intensification of human activities.At present,the ecological security status of the protected areas is not optimistic.From the perspective of the survival status of red-crowned cranes,the protected areas are suitable.However,due to the increase of human activities and policy adjustments,the habitat of red-crowned cranes is fragmented.The red-crowned crane currently gathers in localized areas such as the core area and the buffer zone.We should pay more attention to management,policy development and the environmental awareness of local residents.At the same time,it is necessary to reduce the intensity of human activities within the reserve.展开更多
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ...Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.展开更多
基金the Foundation of the National Natural Science Foundation of China(62072467)the Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61521003)the Foundation of the National Natural Science Foundation of China(62002383).
文摘Based on the diversified technology and the cross-validation mechanism,the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multiple variants of a single software in parallel and then checking their behaviors’consistency.However,it is complex to upgrade current Software as a Service(SaaS)applications to adapt N-variant system architecture.Challenges arise from the inability of tenants to adjust the application architecture in the cloud environment,and the difficulty for cloud service providers to implement N-variant systems using existing API gateways.This paper proposes SecIngress,an API gateway framework,to overcome the challenge that it is hard in the cloud environment to upgrade the applications based on N-variants system.We design a two-stage timeout processing method to lessen the service latency and an Analytic Hierarchy Process Voting under the Metadata mechanism(AHPVM)to enhance voting accuracy.We implement a prototype in a testbed environment and analyze the security and performance metrics before and after deploying the prototype to show the effectiveness of SecIngress.The results reveal that SecIngress enhances the reliability of cloud applications with acceptable performance degradation.
基金The Fund for Building World-class Universities(disciplines)of Renmin University of China(2019)
文摘This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic complex ecosystem security pattern,and then analyzed the spatial characteristics of ecological security changes and discusses reasons for these changes.The results show that the landscape pattern changed dramatically from natural landscape to a mixture of natural landscape and artificial landscape from 1983 to 2018 due to the intensification of human activities.At present,the ecological security status of the protected areas is not optimistic.From the perspective of the survival status of red-crowned cranes,the protected areas are suitable.However,due to the increase of human activities and policy adjustments,the habitat of red-crowned cranes is fragmented.The red-crowned crane currently gathers in localized areas such as the core area and the buffer zone.We should pay more attention to management,policy development and the environmental awareness of local residents.At the same time,it is necessary to reduce the intensity of human activities within the reserve.
基金supported by the National Development and Reform Commission under Project"A Cloud-based service for monitoring security threats in mobile Internet"and"A monitoring platform for web safe browsing"supported by the National Science Foundation of USA under Grant Nos.NSF-IIS-0900970and NSFCNS-0831360
文摘Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys.