Cryptographic Methods for Securing the YML Framework

被引:0
|
作者
Lv, Xin [1 ,2 ]
Petiton, Serge G. [1 ]
Shang, Ling [3 ]
Wang, Zhijian [2 ]
Xu, Feng [2 ]
机构
[1] Univ Sci & Technol Lille, LIFL, MAP Team, Villeneuve Dascq, France
[2] Hohai Univ, Coll Comp & Informat, Nanjing, Jiangsu, Peoples R China
[3] North China Univ Water Conservancy & Elect Power, Sch Informat Engn, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
front end; data repository; key-splitting; lightweight authentication; threshold algorithm; half-ciphertext;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
YML framework is a well-adapted advanced tool to support designing and executing portable parallel applications over large scale peer to peer and grid middlewares. We believe that it is necessary to consider the crucial security concerns for the improvement and extension of the framework. In this paper, two security mechanisms were introduced for the first time. To ensure the computing resources being utilized properly and legitimately, a lightweight authentication protocol was proposed, enabling the user to log in YML with 2 XOR and 1 HASH operation, meanwhile, a splitting way was adopted to distribute the secret key, making only the application requester can obtain the result. To safeguard the process of data exchanging, an efficient threshold encryption scheme was proposed. By generating a set of matched pieces of key, the data can be transformed into efficiently-recoverable half-ciphertext, which is able to transfer in public channel securely. Furthermore, dynamical addition of peers is supported in the scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] CRYPTOGRAPHIC CLOUD STORAGE WITH PUBLIC VERIFIABILITY: ENSURING DATA SECURITY OF THE YML FRAMEWORK
    Lv, Xin
    Xu, Feng
    Petiton, Serge G.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 111 - 121
  • [2] Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework
    Swati, Jadhav
    Nitin, Pise
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2024, 24 (02) : 16 - 31
  • [3] A Bio-cryptographic framework for securing mobile devices content
    Velciu, Marius-Alexandru
    Patriciu, Victor-Valeriu
    Bica, Ion
    [J]. 2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 37 - 41
  • [4] Compiling and securing cryptographic protocols
    Chevalier, Yannick
    Rusinowitch, Michael
    [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (03) : 116 - 122
  • [5] Securing Cryptographic Keys in the Cloud: A Survey
    AlBelooshi, Bushra
    Damiani, Ernesto
    Salah, Khaled
    Martin, Thomas
    [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
  • [6] A Novel Lightweight Authentication Protocol for YML Framework
    Lv, Xin
    Chen, Hao
    Xu, Feng
    Mao, Yingchi
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 645 - 648
  • [7] PixelVault: Using GPUs for Securing Cryptographic Operations
    Vasiliadis, Giorgos
    Athanasopoulos, Elias
    Polychronakis, Michalis
    Ioannidis, Sotiris
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1131 - 1142
  • [8] Securing Cryptographic Keys in the IaaS Cloud Model
    AlBelooshi, B.
    Salah, K.
    Martin, T.
    Damiani, E.
    [J]. 2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 397 - 401
  • [9] Securing Optical Networks by Modern Cryptographic Techniques
    Cho, Joo Yeon
    [J]. SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 120 - 133
  • [10] Securing Images through Cipher Design for Cryptographic Applications
    Prabha, Punya, V
    Nandeesh, M. D.
    Tejaswini, S.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 119 - 125