• Title/Summary/Keyword: batch verification

Search Result 53, Processing Time 0.031 seconds

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

Metered Signatures: How to Restrict the Signing Capability

  • Kim, Woo-Hwan;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of Communications and Networks
    • /
    • v.12 no.3
    • /
    • pp.201-208
    • /
    • 2010
  • We propose a new notion of metered signatures. Metered signature is an extension of k-times signatures in which a signer can generate only k signatures. However, the restriction of metered signatures can be more elaborate: It can be used k-times every day or to preserve the order of signed messages in some applications. Any violation of this regulation reveals a secret key or the signature on a predetermined message. The applications includes proxy signatures, limited free downloads, and the rating web site. We give two instances of metered signatures: One is based on the computational Diffie-Hellman problem (CDHP) using a bilinear map and the other is based on the RSA problem. In both schemes, the signature and certificate size and the verification cost are constant with respect to k. Further, we show that the proposed metered signatures admit batch verification of many signatures almost at one verification cost with small security loss.

Efficient and Secure Signature Scheme applicable to Secure multi-party Computation

  • Myoungin Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.77-84
    • /
    • 2023
  • This research originated from the need to enhance the security of secure multiparty computation by ensuring that participants involved in multiparty computations provide truthful inputs that have not been manipulated. While malicious participants can be involved, which goes beyond the traditional security models, malicious behaviors through input manipulation often occur in real-world scenarios, leading to privacy infringements or situations where the accuracy of multiparty computation results cannot be guaranteed. Therefore, in this study, we propose a signature scheme applicable to secure multiparty technologies, combining it with secret sharing to strengthen the accuracy of inputs using authentication techniques. We also investigate methods to enhance the efficiency of authentication through the use of batch authentication techniques. To this end, a scheme capable of input certification was designed by applying a commitment scheme and zero-knowledge proof of knowledge to the CL signature scheme, which is a lightweight signature scheme, and batch verification was applied to improve efficiency during authentication.

Rescheduling algorithms considering unit failure on the batch process management (회분공정의 장치 고장을 고려한 동적생산계획 기법)

  • Ko, Dae-Ho;Moon, Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1028-1031
    • /
    • 1996
  • Dynamic scheduling is very important in constructing CIM and improving productivity of chemical processing systems. Computation at the scheduling level requires mostly a long time to generate an optimal schedule, so it is difficult to immediately respond to actual process events in real-time. To solve these problems, we developed dynamic scheduling algorithms such as DSMM(Dynamic Shift Modification Method), PUOM(Parallel Unit Operation Method) and UVVM(Unit Validity Verification Method). Their main functions are to minimize the effects of unexpected disturbances such as process time variations and unit failure, to predict a makespan of the updated dynamic schedule and to modify schedule desirably in real-time responding to process time variations. As a result, the algorithms generate a new pertinent schedule in real-time which is close to the original schedule but provides an efficient way of responding to the variation of process environment. Examples in a shampoo production batch process illustrate the efficiency of the algorithms.

  • PDF

Verification of Enhanced Phosphate Removal Capability in Pure Cultures of Acinetobacter calcoaceticus under Anaerobic/Aerobic Conditions in an SBR

  • Kim, Hyung-Jin;Krishna R. Pagilla
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.7 no.6
    • /
    • pp.335-339
    • /
    • 2002
  • Laboratory experiments were conducted using pure cultures of Acinetobacter under an-aerobic/aerobic cyclic conditions to explain the release and uptake of soluble phosphate in an activated sludge process showing enhanced biological phosphate removal (EBPR). Under anaerobic/aerobic cyclic conditions in a Sequencing Batch Reactor (SBR), COD uptake concurrent with soluble phosphate release by Acinetobacter was not significant during the anaerobic periods, indicating that EBPR would not be established in pure cultures. However Acinetobacter cells accumulated higher phosphate content (5.2%) in SBR than that obtained (4.3%) from batch experiments. These results suggest that Acinetobacter sp. may not follow the proposed pattern of behavior of poly-P bacteria in EBPR activated sludge Plants.

Development of a Batch-mode-based Comparison System for 3D Piping CAD Models of Offshore Plants (Aveva Marine과 SmartMarine 3D간의 해양 플랜트 3D 배관 CAD 모델의 배치모드 기반 비교 시스템 개발)

  • Lee, Jaesun;Kim, Byung Chul;Cheon, Sanguk;Cho, Mincheol;Lee, Gwang;Mun, Duhwan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.1
    • /
    • pp.78-89
    • /
    • 2016
  • When a plant owner requests plant 3D CAD models in the format that a shipbuilding company does not use, the shipyard manually re-models plant 3D CAD models according to the owner's requirement. Therefore, it is important to develop a technology to compare the re-modeled plant 3D CAD models with original ones and to quantitatively evaluate similarity between two models. In the previous study, we developed a graphic user interface (GUI)-based comparison system where a user evaluates similarity between original and re-modeled plant 3D CAD models for piping design at the level of unit. However, an offshore plant consists of thousands of units and thus a system which compares several plant 3D CAD models at unit-level without human intervention is necessary. For this, we developed a new batch model comparison system which automatically evaluates similarity of several unit-level plant 3D CAD models using an extensible markup language (XML) file storing file location and name data about a set of plant 3D CAD models. This paper suggests system configuration of a batch-mode-based comparison system and discusses its core functions. For the verification of the developed system, comparison experiments for offshore plant 3D piping CAD models using the system were performed. From the experiments, we confirmed that similarities for several plant 3D CAD models at unit-level were evaluated without human intervention.

Ice Hockey Research Data Platform from Official Records Data and Verification

  • Jin, Seung-kyo;Jang, Ji-hyun;Kim, Hye-young;Kim, Sun-tae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2019
  • In this study, a database was established by analyzing the record data research produced in ice hockey sports. The deployed data verification with Ice hockey reference service was demonstrated with ice hockey officials and players. This research utilized the data stored in the KNSU Datanest data repository and developed PDF parsers for batch processing of records. Among the types of records, the game summary, team roster, team statistics, and player statistics files were collected, and tables were extracted from the records. PDF records were converted to text in CSV format which are converted to DataFrame and loaded into the database. Out of the total 22 types of records, 4 types were constructed with OO data parsed as element values. Data verification has found no problems with the quality of the data deployed, showing a high satisfaction with providing 66 factors against the 30 factors provided by the service previously used.

An Anonymous Authentication in the Hierarchy for VANET (VANET 환경을 위한 계층적 구조의 익명 인증 기술)

  • Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.563-577
    • /
    • 2018
  • In order to support secure communication in VANET(Vehicular Ad hoc Network), messages exchanged between vehicles or between vehicle and infrastructure must be authenticated. In this paper, we propose a hierarchical anonymous authentication system for VANET. The proposed system model reduces the overhead of PKG, which is a problem of previous system, by generating private keys hierarchically, thereby enhancing practicality. We also propose a two-level hierarchical identity-based signature(TLHIBS) scheme without pairings so that improve efficiency. The proposed scheme protects the privacy of the vehicle by satisfying conditional privacy and supports batch verification so that efficiently verifies multiple signatures. Finally, The security of the proposed scheme is proved in the random oracle model by reducing the discrete logarithm problem(DLP) whereas the security proof of the previous ID-based signatures for VANET was incomplete.

Workload Analysis of Discrete-Time BMAP/G/1 queue under D-policy (D-정책과 집단도착을 갖는 이산시간 MAP/G/1 대기행렬시스템의 일량 분석)

  • Lee, Se Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.1-12
    • /
    • 2016
  • In this paper, we consider a general discrete-time queueing system with D-BMAP(discrete-time batch Markovian arrival process) and D-policy. An idle single server becomes busy when the total service times of waiting customer group exceeds the predetermined workload threshold D. Once the server starts busy period, the server provides service until there is no customer in the system. The steady-state workload distribution is derived in the form of generating function. Mean workload is derived as a performance measure. Simulation is also performed for the purpose of verification and a simple numerical example is shown.

Waiting Time Analysis of Discrete-Time BMAP/G/1 Queue Under D-policy (D-정책을 갖는 이산시간 BMAP/G/1 대기행렬의 대기시간 분석)

  • Lee, Se Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.1
    • /
    • pp.53-63
    • /
    • 2018
  • In this paper, we analyze the waiting time of a queueing system with D-BMAP (discrete-time batch Markovian arrival process) and D-policy. Customer group or packets arrives at the system according to discrete-time Markovian arrival process, and an idle single server becomes busy when the total service time of waiting customer group exceeds the predetermined workload threshold D. Once the server starts busy period, the server provides service until there is no customer in the system. The steady-state waiting time distribution is derived in the form of a generating function. Mean waiting time is derived as a performance measure. Simulation is also performed for the purpose of verification and validation. Two simple numerical examples are shown.