Search For:

Displaying 1-27 out of 27 total
Secure Web Referral Services for Mobile Cloud Computing
Found in: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE)
By Le Xu,Li Li,Vijayakrishnan Nagarajan,Dijiang Huang,Wei-Tek Tsai
Issue Date:March 2013
pp. 584-593
Security has become a major concern for mobile devices when mobile users browsing malicious websites. Existed security solutions may rely on human factors to achieve a good result against phishing websites and SSL Strip-based Man-In-The-Middle (MITM) attac...
 
Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Tianyi Xing,Hongbin Liang,Dijiang Huang,Lin X. Cai
Issue Date:June 2012
pp. 1446-1453
With Internet environment is getting optimized and users preferring mobile communications, Cloud Service Providers (CSP) aim to provide services to users depending on their geographic locations with higher service availability and faster access speed. Mobi...
 
Gradual Identity Exposure Using Attribute-Based Encryption
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By Dijiang Huang, Zhibin Zhou, Zhu Yan
Issue Date:August 2010
pp. 881-888
No summary available.
 
Email-based Social Network Trust
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By Dijiang Huang, Vetri Arasan
Issue Date:August 2010
pp. 363-370
No summary available.
 
A Distributed ePedigree Architecture
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Dijiang Huang, Mayank Verma, Archana Ramachandran, Zhibin Zhou
Issue Date:March 2007
pp. 220-230
Current ePedigree creation and discovery services rely on a centralized framework, i.e., EPCglobal network. The centralized system has several restrictions to prevent it from being widely adopted. For example, it is un-scalable when ePedigree service reque...
 
STARS: A Statistical Traffic Pattern Discovery System for MANETs
Found in: IEEE Transactions on Dependable and Secure Computing
By Yang Qin,Dijiang Huang,Bing Li
Issue Date:March 2014
pp. 181-192
Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic ...
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Found in: IEEE Transactions on Dependable and Secure Computing
By Chun-Jen Chung,Pankaj Khatkar,Tianyi Xing,Jeongkeun Lee,Dijiang Huang
Issue Date:July 2013
pp. 198-211
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scal...
 
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yang Qin,Dijiang Huang,Xinwen Zhang
Issue Date:June 2012
pp. 1438-1445
Establishing reliable routing among highly mobile vehicles is a challenging problem in vehicular networks. Towards this issue, we present VehiCloud, a novel cloud computing architecture that leverages emerging cloud computing technologies to deal with unre...
 
Secure web referral service
Found in: Information Networking, International Conference on
By Vijayakrishnan Nagarajan,Dijiang Huang
Issue Date:February 2012
pp. 53-58
Security has become a major concern while browsing as the number of malicious sites keeps increasing with the cost for hosting a site decreasing. Though most of the web servers use Secure Socket Layer (SSL) over HTTP (Hyper Text Transfer Protocol) to ensur...
 
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Dijiang Huang, Xinwen Zhang, Myong Kang, Jim Luo
Issue Date:June 2010
pp. 27-34
Cloud services can greatly enhance the computing capability of mobile devices. Mobile users can rely on the cloud to perform computationally intensive operations such as searching, data mining, and multimedia processing. In this paper, we propose a new mob...
 
A Byzantine Resilient Multi-Path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks
Found in: Parallel and Distributed Processing Symposium, International
By Dijiang Huang, Deep Medhi
Issue Date:April 2005
pp. 240b
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Random key predistribution and pairwise key establishment schemes have been proposed for key m...
 
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services
Found in: IEEE Transactions on Services Computing
By Yan Zhu,Dijiang Huang,Changjyun Hu,Xin Wang
Issue Date:February 2015
pp. 1
This paper addresses how to construct an RBAC-compatible attribute-based data access control for cloud storage service to provide a user-friendly and easy-to-manage secure Attribute-Based Access Control (ABAC) mechanism. Similar to role hierarchies in RBAC...
 
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
Found in: IEEE Transactions on Computers
By Zhibin Zhou,Dijiang Huang,Zhijie Wang
Issue Date:November 2013
pp. 1
Ciphertext Policy Attribute Based Encryption (CP-ABE) enforces expressive data access policies and each policy consists of a number of attributes. Most existing CP-ABE schemes incur very large ciphertext size, which increases linearly with respect to the n...
 
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
Found in: IEEE Transactions on Computers
By Zhibin Zhou,Dijiang Huang,Zhijie Wang
Issue Date:November 2013
pp. 1
Ciphertext Policy Attribute Based Encryption (CP-ABE) enforces expressive data access policies and each policy consists of a number of attributes. Most existing CP-ABE schemes incur very large ciphertext size, which increases linearly with respect to the n...
 
MCC-OSGi: An OSGi-based mobile cloud service model
Found in: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)
By Fatiha Houacine,Samia Bouzefrane,Li Li,Dijiang Huang
Issue Date:March 2013
pp. 1-8
In this article, a new mobile Cloud service model is presented. It offers a dynamic and efficient remote access to information services and resources for mobile devices. Mobile Cloud computing has been evolved as a distributed service model, where individu...
   
Cheater Detection in Vehicular Networks
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Dijiang Huang,Sean A. Williams,Swaroop Shere
Issue Date:June 2012
pp. 193-200
In this paper, we focus on congestion cheaters in vehicular networks who report non-existing high-way congestion information. In this solution, we require each vehicle to only detect its local highway traffic pattern to detect congestion and then identify ...
 
Enabling secure location-based services in mobile cloud computing
Found in: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing (MCC '13)
By Changjun Hu, Di Ma, Dijiang Huang, Yan Zhu
Issue Date:August 2013
pp. 27-32
The increasing spread of location-based services (LBSs) has led to a renewed research interest in the security of services. To ensure the credibility and availability of LBSs, there is a pressing requirement for addressing access control, authentication an...
     
V-lab: a cloud-based virtual laboratory platform for hands-on networking courses
Found in: Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education (ITiCSE '12)
By Dijiang Huang, Le Xu, Wei-Tek Tsai
Issue Date:July 2012
pp. 256-261
For computer-network education, hands-on laboratories are essential in addition to lectures. Existing laboratory solutions are usually expensive to build, configure and maintain, while still lacking reusability, flexibility and scalability. This paper pres...
     
On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Dijiang Huang, Zhibin Zhou
Issue Date:October 2010
pp. 753-755
Existing CP-ABE schemes incur very large ciphertext size, which increases linearly with respect to the number of attributes in the access policy. Large ciphertext prevents CP-ABE from being adopted in the communication constrained environments. In this pap...
     
Dynamic highway congestion detection and prediction based on shock waves
Found in: Proceedings of the seventh ACM international workshop on VehiculAr InterNETworking (VANET '10)
By Dijiang Huang, Soyoung Ahn, Swaroop Shere
Issue Date:September 2010
pp. 11-20
Existing highway traffic monitoring system requires to deploy a large number of sensors and video cameras to detect traffic congestions, which is costly and prone to errors and failures [1]. In this paper, we present a distributed traffic detection and pre...
     
SAT: situation-aware trust architecture for vehicular networks
Found in: Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture (MobiArch '08)
By Dijiang Huang, Mario Gerla, Xiaoyan Hong, Zhen Cao
Issue Date:August 2008
pp. 5-6
Establishing trust in vehicular networks is a critical but also difficult task. In this position paper, we present a new trust architecture and model - Situation-Aware Trust (SAT) - to address several important trust issues in vehicular networks that we be...
     
Privacy preservation services: challenges and solutions
Found in: Proceedings of the 2008 ACM symposium on Applied computing (SAC '08)
By Dijiang Huang, Mayank Verma, Vinayak Kandiah
Issue Date:March 2008
pp. 28-34
The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to deploy new and secure services on the Internet. Hence, a new Internet architectu...
     
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach
Found in: ACM Transactions on Sensor Networks (TOSN)
By Deep Medhi, Dijiang Huang
Issue Date:August 2007
pp. 16-es
Existing pairwise key establishment schemes for large-scale sensor networks are vulnerable to various passive or active attacks. We classify attacks as selective node capture attacks, node fabrication attacks, and insider attacks. In order to improve the s...
     
New architecture for intra-domain network security issues
Found in: Communications of the ACM
By Amit Sinha, Cory Beard, Deep Medhi, Dijiang Huang, Lein Harn, Marc J. Schniederjans, Qing Cao
Issue Date:November 2006
pp. 64-72
Developing an effective platform for deterring network attacks.
     
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
Found in: Proceedings of the 5th ACM workshop on Wireless security (WiSe '06)
By Dijiang Huang
Issue Date:September 2006
pp. 65-74
Measuring communication anonymity (e.g., unlinkability) of wireless ad hoc networks is a critical but still unsolved problem. In order to solve this problem, we propose a two-step unlinkability measuring approach: (a) statistical traffic analysis-based evi...
     
Location-aware key management scheme for wireless sensor networks
Found in: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04)
By Deep Medhi, Dijiang Huang, Lein Harn, Manish Mehta
Issue Date:October 2004
pp. 29-42
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several pairwise key schemes have been proposed for large distributed sensor network...
     
A key-chain-based keying scheme for many-to-many secure group communication
Found in: ACM Transactions on Information and System Security (TISSEC)
By Deep Medhi, Dijiang Huang
Issue Date:January 2004
pp. 523-552
We propose a novel secure group keying scheme using hash chain for many-to-many secure group communication. This scheme requires a key predistribution center to generate multiple hash chains and allocates exactly one hash value from each chain to a group m...
     
 1