Loading...

Table of Content

    10 February 2017, Volume 17 Issue 2 Previous Issue    Next Issue

    Orginal Article
    For Selected: Toggle Thumbnails
    Orginal Article
    Survey of Security Research in Mobile Payment System
    Yonglei LIU, Zhigang JIN, Tianying GAO
    2017, 17 (2):  1-5.  doi: 10.3969/j.issn.1671-1122.2017.02.001
    Abstract ( 751 )   HTML ( 21 )   PDF (1093KB) ( 1256 )  

    With the development of Internet, especially communication technology, smart phones and Web2.0, the increasing popularity of mobile E-commerce appears. However, the natures of multiple network interfaces in smart mobile devices and design flaws of mobile payment protocols and mechanisms make security issues become more serious. The mobile payment system network architecture which comprises contactless layer, control layer, network layer, and application layer is analyzed. And the basic process of mobile payment is put forward. And then, the existing network system security issues of each layer are analyzed, including contactless layer security, control layer security, network layer security, and application layer security. The mobile payment protocols and their improvements are analyzed and summarized. The security assessment methods are also analyzed, compared and summarized. Moreover, A new secure mobile payment system network architecture is given. Finally, the summary of the existing security research is processed,And the future research direction is put forward.

    Figures and Tables | References | Related Articles | Metrics
    A Survey on Data Mining Privacy Protection Algorithms
    Yuejian FANG, Jinzhong ZHU, Wen ZHOU, Tongliang LI
    2017, 17 (2):  6-11.  doi: 10.3969/j.issn.1671-1122.2017.02.002
    Abstract ( 897 )   HTML ( 28 )   PDF (1018KB) ( 1142 )  

    Nowadays the increasing of massive data in various fields has promoted the development of data mining, but the storage and mining of user data brings about threat of privacy leakage, so the user privacy needs to be protected in data mining process. Research on privacy protection data mining algorithms has become an important research area. This article introduces three main privacy protection data mining algorithms, which are perturbation algorithm, k-anonymity algorithm and association rules hiding algorithm. The perturbation algorithms include randomization protection algorithm and multiplicative perturbation algorithm. The two main techniques for k-anonymity are generalization and suppression. The usual association rules hiding algorithms include heuristic algorithm, boundary-based algorithm and precise algorithm. This article introduces and summarizes the new research works for these algorithms, and describes the research trends for privacy protection data mining algorithms.

    References | Related Articles | Metrics
    Research on User Customized Topic Web Crawler for Specialized Information Acquiration Technology
    Limin XUE, Qi WU, Jun LI
    2017, 17 (2):  12-21.  doi: 10.3969/j.issn.1671-1122.2017.02.003
    Abstract ( 676 )   HTML ( 1 )   PDF (1918KB) ( 195 )  

    Stepping into the era of big data, the Internet has become an important battle field for every walk of life to collect intelligence. Facing the explosive growth of network information resources, how to screen out the required information quickly and efficiently is a practical problem to solve. It is very important to construct an information screening mechanism between the mass data and intelligence personnel to meet the needs of specific tasks, which can greatly improve the efficiency. In order to improve the accuracy of the information collected, this paper conducts the research on the user customized topic Web crawler technology for information acquisition. In order to solve the difficult problem of information screening in the large data age, the user’s interest preference is integrated into the crawling process of the topic Web crawler, and the information screening is effectively improved. Experimental results show that the method can improve the precision.

    Figures and Tables | References | Related Articles | Metrics
    A Code Protection Model Based on Instruction Virtualization
    Chunlai DU, Dandan KONG, Jingzhong WANG, Xingbang TAN
    2017, 17 (2):  22-28.  doi: 10.3969/j.issn.1671-1122.2017.02.004
    Abstract ( 600 )   HTML ( 1 )   PDF (1363KB) ( 365 )  

    Currently, software cracking and piracy not only brings great hidden troubles for user's safety, but also brings huge losses for software developers. In order to resist the reverse engineering to analyze and crack the software and increase the difficulty of attackers’ reverse analysis to the codes, an effective method to protect the code instructions is needed. Instruction virtualization technology achieves the purpose of software protection by using custom virtual instruction set to replace the native instruction set. According to the present software protection problems, this paper puts forward a code protection model based on the instruction virtualization, using custom virtual instruction set to replace the protected native instructions, reconstructing virtual environment to implement the original key codes by interpretation, and stripping out the explicit association between native instructions and context. Experimental tests show that the model can effectively resist the reverse analysis and achieve the purpose of protecting the software codes.

    Figures and Tables | References | Related Articles | Metrics
    Research on Hierarchical Model for Defective Mobile Intelligent Teminal Forensic Technology
    Qingyi TIAN, Hong GUO
    2017, 17 (2):  29-34.  doi: 10.3969/j.issn.1671-1122.2017.02.005
    Abstract ( 508 )   HTML ( 1 )   PDF (1518KB) ( 294 )  

    In actual combat, mobile Intelligent Terminal forensics environment is becoming increasingly complex. On the one hand, the technical conditions of the mobile intelligent terminal itself and the suspect's destruction of the material collection have an impact on the forensic technology and results. On the other hand, the mobile intelligent terminal forensics technology has also been rapid development, There are different technical approaches have different applicable conditions and risks, resulting in It is difficult to choose the best way of obtaining evidence in the limited resources of laboratory personnel, equipment and so on. This paper is abstracted by factors related to selection of techniques, and the effect of each factor according to the actual practice of giving weight, establish evaluation model, which can realize automatic scoring of samples into the laboratory and indicates that the optional technical way, effectively improve the reaction ability of actual combat forensics laboratory.

    Figures and Tables | References | Related Articles | Metrics
    A Framework for Building Microservices-based Desktop Cloud
    Hui ZHANG, Wei WANG, Dong GUO
    2017, 17 (2):  35-42.  doi: 10.3969/j.issn.1671-1122.2017.02.006
    Abstract ( 520 )   HTML ( 1 )   PDF (1707KB) ( 298 )  

    As the development of cloud computing, container technology, microservices, software modality changes from local computing to computing on the cloud and rendering remotely. This paper proposes a framework for microservices based desktop cloud computing. The framework contains microservices based cloud-end computing model and muti-channel remote rendering model. The microservices based cloud-end computing model describing how to make services and the muti-channel remote rendering model describing data transmission. Compared with the traditional desktop cloud based on virtualization, this framework can simplify the steps of using desktop cloud, increase the usage of computing resource, make experiences of install-and-play come true and then enhance user experiences. Finally, this paper uses the technology of Docker and WebRTC realize a typical container based desktop cloud system which is called CloudwareHub, and the experiments verify the efficiency and the practicability of this framework.

    Figures and Tables | References | Related Articles | Metrics
    Research on An Efficient Ranked Keywords Searchable Encryption System
    Nan ZHANG, Lanxiang CHEN
    2017, 17 (2):  43-50.  doi: 10.3969/j.issn.1671-1122.2017.02.007
    Abstract ( 630 )   HTML ( 4 )   PDF (1557KB) ( 480 )  

    In the research of ciphertext search, to get high query precision and to support ranking, this paper proposes a searchable encryption scheme based on BM25L model, and implements a ciphertext full text retrieval system Bluce by combining the scheme with the Lucene system. The Bluce optimizes ranking results by improving the scoring mechanism of BM25L model and encrypts plaintext index of Lucene to get ciphertext index, thus realizing an efficient ranked keywords searchable encryption system. In the Bluce, the data and the index are encrypted by AES, which is very secure. Experiment results show that the search results have high correlation with keywords, and the system improves the efficiency and precision of the ciphertext retrieval while ensuring the security of ciphertext retrieval.

    Figures and Tables | References | Related Articles | Metrics
    Research on Users Associated Technology across Social Network
    Liang LUO, Wenxian WANG, Jie ZHONG, Haizhou WANG
    2017, 17 (2):  51-58.  doi: 10.3969/j.issn.1671-1122.2017.02.008
    Abstract ( 516 )   HTML ( 1 )   PDF (1722KB) ( 334 )  

    With the massive popularity of social networks in recent years, social network has played a very important role in people’s daily lives. It has a lot of users, but few of them needs real name authentication, which malicious users can freely spread rumors and bad information to the public and bring challenges to Internet regulations. Therefore, associating entity users across different social networks, establish the network identification can help identify and supervise the users. The paper’s main research work are as follows. Firstly we designed a system to collect QZone and Weibo’s user’s information. Secondly we analyze the data we collect from the internet which contains 5,440,000 users of Weibo and 24,590,000 users of QZone. Then we proposed a model of users associated across social network. This model is based on logic regression model which is used to classify the users, at the same time, according to the principle of SimRank algorithm, the SNC algorithm is proposed to eliminate the noise and improve the accuracy of the model. Finally we use the model on the dataset we collected. The experimental result shows that the model can filter out pairs of users that associated strongly, the accuracy of the model has improved and the model can associate users of different social networks after pruning.

    Figures and Tables | References | Related Articles | Metrics
    A Design of Linux Virtual Server Cluster Based on Smart Card Authentication
    Changhui SUN, Lingchen ZHANG, Neng GAO
    2017, 17 (2):  59-65.  doi: 10.3969/j.issn.1671-1122.2017.02.009
    Abstract ( 526 )   HTML ( 1 )   PDF (1337KB) ( 213 )  

    This paper analyses existed implementations of Load Balancing through Linux Virtual server, and put forward to design an authentication-based cluster building method based on Linux virtual server. In the existing methods of load balancing based on LVS, it is necessary to configure the IP and port numbers corresponding to the specific services in the scripts. In addition, the information needed for the services running on each real server should be configured on the real server. In this paper, a real server is used to obtain a copy of the secret information on the load scheduler by using the authentic server. In addition, the load scheduler can automatically generate the configuration file to solve the cumbersome configuration. In this way, The problem which Sensitive information have multiple copies will be solvedand then to build a highly available cluster system.

    Figures and Tables | References | Related Articles | Metrics
    Application of Channel State Information in Action Recognition and Outlier Analysis
    Yihong ZHU, Jiacheng LI
    2017, 17 (2):  66-72.  doi: 10.3969/j.issn.1671-1122.2017.02.010
    Abstract ( 426 )   HTML ( 2 )   PDF (1564KB) ( 982 )  

    With the deepening of WiFi signal research, it is found that the collection of channel state information is the basis of using WiFi to detect human action. In this paper, the definition and expression of the channel state information are given. Then, the channel state information is compared with the traditional signal strength indicator. It is found that the channel state information is more suitable for fine-grained action recognition. The paper describes working mechanism of the channel state information to be obtainedwith the common commercial WiFi transceiver and analyzes the meaning of the various parameters contained in the channel state information packet.The paper also states the method of using the channel state information in the time domain. Through mathematical modeling, the channel state information is effectively utilized and the accuracy of recognition of human motion is improved. According to the outlier problem in the experiment, the paper analyzes the cause of the outlier, gives an algorithm to identify and eliminate the outlier.

    Figures and Tables | References | Related Articles | Metrics
    Research on Security Assessment Index and Its Application for Shipboard Network Based on DDS
    Qingliang ZHANG, Yuanqing QIN
    2017, 17 (2):  73-78.  doi: 10.3969/j.issn.1671-1122.2017.02.011
    Abstract ( 687 )   HTML ( 8 )   PDF (1784KB) ( 483 )  

    Data Distribution Service (DDS) is widely used in shipboard system, and security of network becomes particularly important in modern naval warfare. However, there are few researches on security assessment for shipboard network based on DDS up to now. Based on modeling for the architecture of DDS and shipboard network based on DDS, this paper analyzes the security assessment factors of DDS’s QoS configuration, DDS’s domain division, shipboard network structure and shipboard network control, and establishes a set of security assessment index system for shipboard network based on DDS. Meanwhile, an example of security assessment is given for the index system by an assessment method based on Fuzzy Analytic Hierarchy Process (FAHP). The assessment result proves the feasibility of index system and assessment method.

    Figures and Tables | References | Related Articles | Metrics
    Research on the Network Security Strategy of the Unified Access Platform of Radio & TV Whole-station Network
    Jingjing CAI, Xiaomin QIAN
    2017, 17 (2):  79-84.  doi: 10.3969/j.issn.1671-1122.2017.02.012
    Abstract ( 548 )   HTML ( 2 )   PDF (1201KB) ( 177 )  

    With the rapid development of network technology and its application, a new media platform and broadcast center, as an unified access platform of whole-station network to connect television program and broadcast network. Multi-platform integration brings efficiency and convenience, but also introduces new security threats such as Web Trojan, data theft, business attack and intranet intrusion, etc. Therefore, the confidentiality, integrity and availability of information in the process of data collecting, transmitting, processing and storing have become the urgent problems to be solved. In this paper, the security management status and security risks of the unified access platform for broadcasting and TV stations are analyzed. The main causes of the risks, such as hardware and software problems, design problems, and management problems, are presented. Based on the existing risks and conventional information security policies, the basic security strategies for the unified access platform are proposed. Based on the proposed basic security policies, the specific implementation methods about physical security, network and boundary security, system and application security, data security, audit security and management security are also constructed.

    Figures and Tables | References | Related Articles | Metrics