Search For:

Displaying 1-30 out of 30 total
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Found in: IEEE Transactions on Parallel and Distributed Systems
By Ning Cao,Cong Wang,Ming Li,Kui Ren,Wenjing Lou
Issue Date:January 2014
pp. 222-233
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data hav...
 
Optimized User Revocation for Group Signature Based Privacy-Aware PKI
Found in: Distributed Computing Systems Workshops, International Conference on
By Wei Ren, Kui Ren, Wenjing Lou
Issue Date:June 2008
pp. 388-393
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is important for many applications. The applicability of privacy-aware PKI highly relies on the performance of user revocation. The requireme...
 
Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications
Found in: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)
By Wen Ming Liu,Lingyu Wang,Kui Ren,Mourad Debbabi
Issue Date:December 2013
pp. 679-686
While enjoying the convenience of Software as a Service (SaaS), users are also at an increased risk of privacy breaches. Recent studies show that a Web-based application may be inherently vulnerable to side-channel attacks which exploit unique packet sizes...
 
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Found in: IEEE Transactions on Parallel and Distributed Systems
By Cong Wang,Kui Ren,Jia Wang,Qian Wang
Issue Date:June 2013
pp. 1172-1181
Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern....
 
Privacy-Preserving Public Auditing for Secure Cloud Storage
Found in: IEEE Transactions on Computers
By Cong Wang,Sherman S.M. Chow,Qian Wang,Kui Ren,Wenjing Lou
Issue Date:February 2013
pp. 362-375
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that...
 
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Found in: IEEE Transactions on Parallel and Distributed Systems
By Ming Li,Shucheng Yu,Yao Zheng,Kui Ren,Wenjing Lou
Issue Date:January 2013
pp. 131-143
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health informatio...
 
Quantitative Analysis of Load Redistribution Attacks in Power Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yanling Yuan,Zuyi Li,Kui Ren
Issue Date:September 2012
pp. 1731-1738
Cyber security is becoming an area of growing concern in the electric power industry with the development of smart grid. False data injection attack, which is against state estimation through SCADA network, has recently attracted wide research interests. T...
 
Security Challenges for the Public Cloud
Found in: IEEE Internet Computing
By Kui Ren,Cong Wang,Qian Wang
Issue Date:January 2012
pp. 69-73
Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and m...
 
Distributed Privacy-Preserving Access Control in Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Rui Zhang,Yanchao Zhang,Kui Ren
Issue Date:August 2012
pp. 1427-1438
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On th...
 
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Found in: IEEE Transactions on Parallel and Distributed Systems
By Cong Wang,Ning Cao,Kui Ren,Wenjing Lou
Issue Date:August 2012
pp. 1467-1479
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a ve...
 
Anti-jamming communication in cognitive radio networks with unknown channel statistics
Found in: Network Protocols, IEEE International Conference on
By Qian Wang,Kui Ren,Peng Ning
Issue Date:October 2011
pp. 393-402
Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs). For achieving optimized spectrum usage, existing solutions model the spectrum sensing and access problem as a partially observed Mark...
 
Towards Secure and Effective Utilization over Encrypted Cloud Data
Found in: Distributed Computing Systems Workshops, International Conference on
By Cong Wang, Qian Wang, Kui Ren
Issue Date:June 2011
pp. 282-286
Cloud computing enables an economic paradigm of data service outsourcing, where individuals and enterprise customers can avoid committing large capital outlays in the purchase and management of both software and hardware and the operational overhead therei...
 
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
Found in: Distributed Computing Systems, International Conference on
By Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou
Issue Date:June 2011
pp. 393-402
In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. For the consideration of user...
 
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations
Found in: Distributed Computing Systems, International Conference on
By Cong Wang, Kui Ren, Jia Wang, Karthik Mahendra Raje Urs
Issue Date:June 2011
pp. 549-558
Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern....
 
Toward Secure and Dependable Storage Services in Cloud Computing
Found in: IEEE Transactions on Services Computing
By Cong Wang,Qian Wang,Kui Ren,Ning Cao,Wenjing Lou
Issue Date:January 2012
pp. 220-232
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physic...
 
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Found in: IEEE Transactions on Parallel and Distributed Systems
By Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li
Issue Date:May 2011
pp. 847-859
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Thi...
 
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shucheng Yu, Kui Ren, Wenjing Lou
Issue Date:April 2011
pp. 673-686
Distributed sensor data storage and retrieval have gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more robust and fault-tolerant wireless sensor network (WSN), such architecture als...
 
Secure Ranked Keyword Search over Encrypted Cloud Data
Found in: Distributed Computing Systems, International Conference on
By Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
Issue Date:June 2010
pp. 253-262
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective data utilization a very challeng...
 
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang
Issue Date:February 2010
pp. 203-215
Recently, multihop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan scale. Security and privacy issues are of most concern in pushing the success of...
 
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Bo Zhu, Kui Ren, Lingyu Wang
Issue Date:June 2008
pp. 358-363
In this paper, we propose the first protocol that can achieve anonymous misbehavior detection in mobile ad hoc networks. On the one hand, our protocol can provide anonymity for the witness who reports observed misbehavior. Together with a distributed trust...
 
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
Found in: Distributed Computing Systems, International Conference on
By Kui Ren, Wenjing Lou
Issue Date:June 2008
pp. 286-294
Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan scale. Security and privacy issues are of most concern in pushing the success o...
 
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Kui Ren, Wenjing Lou, Yanchao Zhang
Issue Date:May 2008
pp. 585-598
Providing desirable data security, i.e., confidentiality, authenticity and availability, in wireless sensor networks (WSNs) is challenging, as WSNs usually consist of a large number of resource constraint sensor nodes, deployed in unattended/hostile enviro...
 
A Proactive Data Security Framework for Mission-Critical Sensor Networks
Found in: MILCOM
By Kui Ren, Wenjing Lou, Patrick Moran
Issue Date:October 2006
pp. 1-7
The resource-constrained sensors in mission-critical applications are subject to both random failures and intentional compromise, which poses severe security threats in wireless sensor networks (WSNs). The different types of security threats have been iden...
 
Energy-Efficient Geographic Routing in Environmentally Powered Wireless Sensor Networks
Found in: MILCOM
By Kai Zeng, Wenjing Lou, Kui Ren, Patrick Moran
Issue Date:October 2006
pp. 1-7
Current and potential applications of wireless sensor networks (WSNs) include military sensing, physical security, traffic surveillance, and environment monitoring, etc. Due to the fact that WSNs are composed of a large number of low-cost but energy constr...
 
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications
Found in: IEEE Transactions on Dependable and Secure Computing
By WenMing Liu,Lingyu Wang,Pengsu Cheng,Kui Ren,Shunzhi Zhu,Mourad Debbabi
Issue Date:February 2014
pp. 1
Web-based applications are gaining popularity as they require less client-side resources, and are easier to deliver and maintain. On the other hand, Web applications also pose new security and privacy challenges. In particular, recent research revealed tha...
 
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets
Found in: IEEE Transactions on Parallel and Distributed Systems
By Huajie Shao,Lei Rao,Zhi Wang,Zhibo Wang,Xue Liu,Kui Ren
Issue Date:November 2013
pp. 1
Along with the rapid increasing energy consumption, the energy cost of Internet data centers (IDCs) has been skyrocketing. A novel scheme of geographical load balancing was proposed to reduce electricity bills for service providers. However, one important ...
 
Attribute based data sharing with attribute revocation
Found in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
By Cong Wang, Kui Ren, Shucheng Yu, Wenjing Lou
Issue Date:April 2010
pp. 261-270
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with access structures on attrib...
     
Attribute-based signature and its applications
Found in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
By Dongqing Xie, Jin Li, Kui Ren, Man Ho Au, Willy Susilo
Issue Date:April 2010
pp. 60-69
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to the identity of the individual who signed a message, but a claim regarding t...
     
Anonymous user communication for privacy protection in wireless metropolitan mesh networks
Found in: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09)
By Bart Preneel, Bo Zhu, Kui Ren, Ming Gu, Zhiguo Wan
Issue Date:March 2009
pp. 48-54
Wireless mesh network (WMN) provides a low-cost, convenient solution to the last-mile network connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are not applicable in WMNs anymore...
     
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Found in: Proceedings of the first ACM conference on Wireless network security (WiSec '08)
By Bart Preneel, Kui Ren, Zhiguo Wan
Issue Date:March 2008
pp. 1-1
Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless network...
     
 1