xiaochao wang - Academia.edu (original) (raw)
Papers by xiaochao wang
Cancer Immunology Research
T cell–mediated immunotherapy represents a promising strategy for cancer treatment; however, it h... more T cell–mediated immunotherapy represents a promising strategy for cancer treatment; however, it has achieved satisfactory clinical responses in only a limited population. Thus, a broader view of the T-cell immune response is required. The Ras/MAPK pathway operates in many important signaling cascades and regulates multiple cellular activities, including T-cell development, proliferation and function. Herein, we found that the typical membrane-bound complement regulatory protein CD59 is located intracellularly in T cells and that the intracellular form is increased in the T cells of cancer patients. When intracellular CD59 is abundant, it facilitates Ras transport to the inner plasma membrane via direct interaction; in contrast, when CD59 is insufficient or deficient, Ras is arrested in the Golgi, thus enhancing Ras/MAPK signaling and T-cell activation, proliferation and function. mCd59ab deficiency almost completely abolished tumor growth and metastasis in tumor-bearing mice, in whi...
The Visual Computer
A novel robust zero-watermarking algorithm for medical images is presented in this paper. The mul... more A novel robust zero-watermarking algorithm for medical images is presented in this paper. The multi-scale decomposition of bi-dimensional empirical mode decomposition (BEMD) has exhibited many attractive properties that enable the proposed algorithm to robustly detect the tampering regions and protect the copyright of medical images simultaneously. Given a medical image, we first decompose a medical image adaptively into a finite number of intrinsic mode functions (IMFs) and a residue, by taking a full advantage of BEMD. The first IMF starts with the finest scale retaining fragile information and is best suitable for tampering detection, while the residue includes robust information at the coarser scale and is applied to the protection of intellectual property rights of medical images. Next, the feature matrices are extracted from the first IMF and the residue via singular value decomposition, which achieves robust performance subject to most attacks. For a given watermark image, it is encrypted by Arnold transform to enhance the security of the watermark. Then, the feature images are constructed by performing the exclusive-or operation between the encrypted watermark image and the extracted feature matrices. Finally, the feature images are securely stored in the copyright authentication database to be further used for copyright authentication and tampering detection. A large number of experimental results and comparisons with existing watermarking algorithms confirm that the newly proposed watermarking algorithm not only has strong ability on tampering detection, but also has better performance in combating various attacks, including cropping, Gaussian noise, median filtering, image enhancement attacks, etc. The newly developed algorithm also shows great promise in processing natural images.
Wireless Communications and Mobile Computing
Ensuring the integrity of remote data is the prerequisite for implementing cloud-edge computing. ... more Ensuring the integrity of remote data is the prerequisite for implementing cloud-edge computing. Traditional data integrity verification schemes make users spend a lot of time regularly checking their data, which is not suitable for large-scale IoT (Internet of Things) data. On the other hand, the introduction of a third-party auditor (TPA) may bring about greater privacy and security issues. We use blockchain to address the problem of TPA. However, implementing dynamic integrity verification with blockchain is a bigger challenge due to the low throughput and poor scalability of blockchain. More importantly, whether there is a security problem with blockchain-based integrity verification is not yet known. In this paper, we propose a scalable blockchain-based integrity verification scheme that implements fully dynamic operations and blockless verification. The scheme builds scalable homomorphic verification tags based on ZSS (Zhang-Safavi-Susilo) short signatures. We exploit smart co...
The Visual Computer, 2021
Journal of Physics: Conference Series, 2022
Under the development trend of power industry with energy Internet as the core, with the update o... more Under the development trend of power industry with energy Internet as the core, with the update of information technologies such as intelligent devices, mobile communication technology and cloud computing, the application of Internet of things (IOT) in power industry has developed from the concept of specific link service to the application of large-scale market. The core of the next power Internet of things construction is to build an open IOT management platform to realize the ubiquitous access of massive devices, the deep sharing of cross-professional data, business integration, and the provision of precise user services. Based on this, an industrial alliance will be formed and a power industry ecosystem with power grid enterprises as the core will be established. At present, the application of power Internet of things in China is still in the primary stage of research and application. The research on what the IOT management platform should manage and the interaction technology b...
Journal of Physics: Conference Series, 2022
Power Internet of Things [1] is the application of Internet of Things in smart grid. By effective... more Power Internet of Things [1] is the application of Internet of Things in smart grid. By effectively integrating power system and communication infrastructure resources, the information level of power system and the utilization rate of existing resources are improved. Thus, important technical support is provided for power grid generation, transmission, transformation, distribution and electricity consumption. The Power Internet of Things contains a large number of terminal equipment, which involves the data interaction frequency of 100 million levels per second. Therefore, how to avoid the access of invalid data is an important topic in the construction process of power Internet of Things. In response to the detection requirements of abnormal devices, this paper, based on existing Intelligent IoT System architecture, designs a real-time detection framework that integrates a two-level control mechanism, which is universal, extensible, and supports multiple protocols, using the data i...
Applied Sciences, 2022
The group velocity dispersion (GVD) occurring in the front end of high-power lasers is one of the... more The group velocity dispersion (GVD) occurring in the front end of high-power lasers is one of the primary factors leading to the conversion of frequency modulation (FM) to amplitude modulation (AM). In this paper, we propose a modified, active, closed-loop feedback compensation device for GVD-induced FM–AM conversion, using a two-dimensional, electric, adjustable mirror mount and parallel grating pair to improve the long-term stability, efficiency of adjustment, and accuracy of compensation. Experimental results of a 12 h FM–AM depth test revealed that the depth varied between 2.28% and 5.22%. Moreover, we formulated a mathematical relationship between the dispersion parameters and temperature in optical fibers to analyze the intrinsic effect of temperature on FM–AM. The related simulation and experimental results consistently validated the quantitative relationship between the temperature and FM–AM depth.
Optics Communications, 2021
SIAM Journal on Imaging Sciences, 2022
High Power Laser Science and Engineering, 2021
Based on the pulse-shaping unit in the front end of high-power laser facilities, we propose a new... more Based on the pulse-shaping unit in the front end of high-power laser facilities, we propose a new hybrid scheme in a closed-loop control system including wavelet threshold denoising for pretreatment and a first derivative adaptive smoothing filter for smooth pulse recovery, so as to effectively restrain the influence of electrical noise and FM-to-AM modulation in the time–power curve, and enhance the calibration accuracy of the pulse shape in the feedback control system. The related simulation and experiment results show that the proposed scheme can obtain a better shaping effect on the high-contrast temporal shape in comparison with the cumulative average algorithm and orthogonal matching pursuit algorithm combined with a traditional smoothing filter. The implementation of the hybrid scheme mechanism increased the signal-to-noise ratio of the laser pulse from about 11 dB to 30 dB, and the filtered pulse is smooth without modulation, with smoothness of about 98.8%.
Journal of food biochemistry, 2021
Actinidia arguta pollen owns abundant nutrients, such as vitamins, polyphenols, etc., however, li... more Actinidia arguta pollen owns abundant nutrients, such as vitamins, polyphenols, etc., however, little research on its antioxidant ability and biological function was conducted. In this study, we observed A. arguta pollen spore structure by SEM (Scanning electron microscope), analyzed the phenolic composition of A. arguta pollen extract (AAPE) obtained by four extraction methods (A: ultrasound-assisted extraction with water, B: heat reflux extraction with water, C: ultrasound-assisted extraction with ethanol, and D: heat reflux extraction with ethanol). Total phenolic content, total flavonoid content, antioxidant activities (ferric reducing/antioxidant power [FRAP], chelating activity, and DPPH⋅ scavenging activity) were also determined. Finally, we investigated its protective effect on DNA and lymphocytes damage response to oxidative stress. The results showed that the morphology of A. arguta pollen was similar to other pollen of the genus A. Lindl., but differs from them slightly i...
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
A distributed storage system (DSS) has the ad-vantages of low price and high throughput, but it a... more A distributed storage system (DSS) has the ad-vantages of low price and high throughput, but it also raises serious data confidentiality and privacy issues. Fine-grained access control (AC) is important for further applications. Although attribute-based encryption (ABE) schemes can achieve fine-grained AC, almost all schemes distribute a private key to a visitor by a private key generator that may leak data. Besides, attribute revocation functions of the ABE scheme will lead to collusion attacks. Blockchain-based ABE schemes rarely consider ciphertext-based search and attribute revocation functions which lead to a large communication overhead. In this paper, we propose a secure ABE scheme in which a data owner is the only person who has the right to distribute keys. Then we combine blockchain with the proposed ABE scheme to realize fine-grained AC over a distributed storage system, which supports the attribute change function and resists collusive attacks. In addition, we build a series of smart contracts to ensure the fairness of trade between the data owner and visitor. The auxiliary information of data stored on the blockchain can realize ciphertext-based search. Finally, we prove the scheme resists collusion attacks under the computational Diffie-Hellman assumption (CDH) and conduct multiple experiments based on Ethernet test Network. The experimental results demonstrate our scheme has the running time of algorithms reached a millisecond-level and the ET H cost is acceptable.
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
Integrity verification of cloud data is of great importance for secure and effective cloud storag... more Integrity verification of cloud data is of great importance for secure and effective cloud storage since attackers can change the data even though it is encrypted. Traditional integrity verification schemes only let the client know the integrity status of the remote data. When the data is corrupted, the system cannot hold the server accountable. Besides, almost all existing schemes assume that the users are credible. Instead, especially in a dynamic operation environment, users can deny their behaviors, and let the server bear the penalty of data loss. To address the issues above, we propose an accountable dynamic storage integrity verification (ADS-IV) scheme which provides means to detect or eliminate misbehavior of all participants. In the meanwhile, we modify the Invertible Bloom Filter (IBF) to recover the corrupted data and use the Mahalanobis distance to calculate the degree of damage. We prove that our scheme is secure under Computational Diffie-Hellman (CDH) assumption and Discrete Logarithm (DL) assumption and that the audit process is privacy-preserving. The experimental results demonstrate that the computational complexity of the audit is constant; the storage overhead is O(sqrtn)O(\sqrt n )O(sqrtn), which is only 1/400 of the size of the original data; and the whole communication overhead is O(1).As a result, the proposed scheme is not only suitable for large-scale cloud data storage systems, but also for systems with sensitive data, such as banking systems, medical systems, and so on.
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
Cloud storage saves a lot of storage overheads for users to manage data. However, it also brings ... more Cloud storage saves a lot of storage overheads for users to manage data. However, it also brings data integrity challenges. Relying only on message authentication codes (MAC) and hash functions introduces serious communication overheads. Existing integrity verification schemes usually rely on third-party auditors (TPAs) to reduce users’ audit burden. However, malicious TPAs not only extract raw data from repeated audit processes but also collude with a cloud server to launch collusive attacks. Recently, some integrity verification schemes based on blockchain are presented to solve challenges of raw data extraction and collusive attacks. These schemes cannot realize large-scale data processing on a blockchain as well as dynamic data operations. To address the above issues, we propose a blockchain-based cloud data integrity verification scheme (BCD-IV) that removes TPAs by using chain-code that solves collusive attacks. Furthermore, we construct a new homomorphic verification tag (HVT) based on the signature proposed by Zhang, Safavi, and Susilo (ZSS), which supports blockless verification. The proposed scheme realizes full dynamic operations with auxiliary information that stores on a blockchain. Mathematical analysis shows that our scheme has lower complexity in terms of communication and computation overhead, which are both O(c). Finally, we conduct experiments on Hyperledger Fabric V2.2 to demonstrate that the computation efficiency of audit is the highest compared to the state-of-the-art and the storage overhead is negligible.
2021 IEEE 4th International Conference on Electronics Technology (ICET), 2021
This paper studies the physical layer security problem in the downlink two-tier femtocell network... more This paper studies the physical layer security problem in the downlink two-tier femtocell network system, where an eavesdropper wiretaps the legitimate macrocell users. In this system, femtocell base stations (FBSs) can reduce the performance of eavesdropper through cochannel interference, which in turn improves the secure transmission rate of the entire system. The power allocation problem of the FBSs and macro base station (MBS) has an important influence on the cochannel interference and system performance in femtocell networks. In this paper, the power allocation problem is modeled as an optimization problem. We aim to maximize the secrecy rate and reduce energy consumption. Based on this, a joint subchannel and power allocation algorithm is proposed. Simulation results show that the proposed algorithm can effectively improve the network transmission performance and reduce the energy consumption, compared with existing algorithms.
The Visual Computer, 2020
In this paper, a robust and blind image watermarking algorithm via circular embedding and bidimen... more In this paper, a robust and blind image watermarking algorithm via circular embedding and bidimensional empirical mode decomposition (BEMD) is developed. First, the watermark image is scrambled by Arnold transform to increase the security of the algorithm. Second, the Hilbert curve is adopted to reduce the scrambled 2D watermark image to one-dimensional watermark signal. Third, the host image is decomposed by BEMD to obtain the multi-scale representation in the forms of intrinsic mode functions (IMFs) and a residue. Then, the extreme points of the IMFs are extracted as the embedding locations. Finally, the one-dimensional watermark signal is repeatedly and cyclically embedded in the extreme locations of the first IMF according to the texture masking characteristics of the human visual system, which greatly improves the ability of our algorithm against various attacks. The final watermarked image is reconstructed by combining the modified first IMF and the residual. The watermark can be successfully extracted without resorting to the original host image. Furthermore, image correction can be applied before image watermarking extraction if there are geometric attacks in watermarked image. A large number of experimental results and thorough evaluations confirm that our method can obtain higher imperceptibility and robustness under different types of attacks, and achieve better performance than the current state-of-the-art watermarking algorithms, especially in large-scale cropping attack, JPEG compression, Gaussian noise, sharpening, Gamma correction, scaling, histogram equalization, and rotation attacks. Keywords Image watermarking • Circular embedding • BEMD • Arnold transform • Hilbert curve B Jianping Hu
Cancer Immunology Research
T cell–mediated immunotherapy represents a promising strategy for cancer treatment; however, it h... more T cell–mediated immunotherapy represents a promising strategy for cancer treatment; however, it has achieved satisfactory clinical responses in only a limited population. Thus, a broader view of the T-cell immune response is required. The Ras/MAPK pathway operates in many important signaling cascades and regulates multiple cellular activities, including T-cell development, proliferation and function. Herein, we found that the typical membrane-bound complement regulatory protein CD59 is located intracellularly in T cells and that the intracellular form is increased in the T cells of cancer patients. When intracellular CD59 is abundant, it facilitates Ras transport to the inner plasma membrane via direct interaction; in contrast, when CD59 is insufficient or deficient, Ras is arrested in the Golgi, thus enhancing Ras/MAPK signaling and T-cell activation, proliferation and function. mCd59ab deficiency almost completely abolished tumor growth and metastasis in tumor-bearing mice, in whi...
The Visual Computer
A novel robust zero-watermarking algorithm for medical images is presented in this paper. The mul... more A novel robust zero-watermarking algorithm for medical images is presented in this paper. The multi-scale decomposition of bi-dimensional empirical mode decomposition (BEMD) has exhibited many attractive properties that enable the proposed algorithm to robustly detect the tampering regions and protect the copyright of medical images simultaneously. Given a medical image, we first decompose a medical image adaptively into a finite number of intrinsic mode functions (IMFs) and a residue, by taking a full advantage of BEMD. The first IMF starts with the finest scale retaining fragile information and is best suitable for tampering detection, while the residue includes robust information at the coarser scale and is applied to the protection of intellectual property rights of medical images. Next, the feature matrices are extracted from the first IMF and the residue via singular value decomposition, which achieves robust performance subject to most attacks. For a given watermark image, it is encrypted by Arnold transform to enhance the security of the watermark. Then, the feature images are constructed by performing the exclusive-or operation between the encrypted watermark image and the extracted feature matrices. Finally, the feature images are securely stored in the copyright authentication database to be further used for copyright authentication and tampering detection. A large number of experimental results and comparisons with existing watermarking algorithms confirm that the newly proposed watermarking algorithm not only has strong ability on tampering detection, but also has better performance in combating various attacks, including cropping, Gaussian noise, median filtering, image enhancement attacks, etc. The newly developed algorithm also shows great promise in processing natural images.
Wireless Communications and Mobile Computing
Ensuring the integrity of remote data is the prerequisite for implementing cloud-edge computing. ... more Ensuring the integrity of remote data is the prerequisite for implementing cloud-edge computing. Traditional data integrity verification schemes make users spend a lot of time regularly checking their data, which is not suitable for large-scale IoT (Internet of Things) data. On the other hand, the introduction of a third-party auditor (TPA) may bring about greater privacy and security issues. We use blockchain to address the problem of TPA. However, implementing dynamic integrity verification with blockchain is a bigger challenge due to the low throughput and poor scalability of blockchain. More importantly, whether there is a security problem with blockchain-based integrity verification is not yet known. In this paper, we propose a scalable blockchain-based integrity verification scheme that implements fully dynamic operations and blockless verification. The scheme builds scalable homomorphic verification tags based on ZSS (Zhang-Safavi-Susilo) short signatures. We exploit smart co...
The Visual Computer, 2021
Journal of Physics: Conference Series, 2022
Under the development trend of power industry with energy Internet as the core, with the update o... more Under the development trend of power industry with energy Internet as the core, with the update of information technologies such as intelligent devices, mobile communication technology and cloud computing, the application of Internet of things (IOT) in power industry has developed from the concept of specific link service to the application of large-scale market. The core of the next power Internet of things construction is to build an open IOT management platform to realize the ubiquitous access of massive devices, the deep sharing of cross-professional data, business integration, and the provision of precise user services. Based on this, an industrial alliance will be formed and a power industry ecosystem with power grid enterprises as the core will be established. At present, the application of power Internet of things in China is still in the primary stage of research and application. The research on what the IOT management platform should manage and the interaction technology b...
Journal of Physics: Conference Series, 2022
Power Internet of Things [1] is the application of Internet of Things in smart grid. By effective... more Power Internet of Things [1] is the application of Internet of Things in smart grid. By effectively integrating power system and communication infrastructure resources, the information level of power system and the utilization rate of existing resources are improved. Thus, important technical support is provided for power grid generation, transmission, transformation, distribution and electricity consumption. The Power Internet of Things contains a large number of terminal equipment, which involves the data interaction frequency of 100 million levels per second. Therefore, how to avoid the access of invalid data is an important topic in the construction process of power Internet of Things. In response to the detection requirements of abnormal devices, this paper, based on existing Intelligent IoT System architecture, designs a real-time detection framework that integrates a two-level control mechanism, which is universal, extensible, and supports multiple protocols, using the data i...
Applied Sciences, 2022
The group velocity dispersion (GVD) occurring in the front end of high-power lasers is one of the... more The group velocity dispersion (GVD) occurring in the front end of high-power lasers is one of the primary factors leading to the conversion of frequency modulation (FM) to amplitude modulation (AM). In this paper, we propose a modified, active, closed-loop feedback compensation device for GVD-induced FM–AM conversion, using a two-dimensional, electric, adjustable mirror mount and parallel grating pair to improve the long-term stability, efficiency of adjustment, and accuracy of compensation. Experimental results of a 12 h FM–AM depth test revealed that the depth varied between 2.28% and 5.22%. Moreover, we formulated a mathematical relationship between the dispersion parameters and temperature in optical fibers to analyze the intrinsic effect of temperature on FM–AM. The related simulation and experimental results consistently validated the quantitative relationship between the temperature and FM–AM depth.
Optics Communications, 2021
SIAM Journal on Imaging Sciences, 2022
High Power Laser Science and Engineering, 2021
Based on the pulse-shaping unit in the front end of high-power laser facilities, we propose a new... more Based on the pulse-shaping unit in the front end of high-power laser facilities, we propose a new hybrid scheme in a closed-loop control system including wavelet threshold denoising for pretreatment and a first derivative adaptive smoothing filter for smooth pulse recovery, so as to effectively restrain the influence of electrical noise and FM-to-AM modulation in the time–power curve, and enhance the calibration accuracy of the pulse shape in the feedback control system. The related simulation and experiment results show that the proposed scheme can obtain a better shaping effect on the high-contrast temporal shape in comparison with the cumulative average algorithm and orthogonal matching pursuit algorithm combined with a traditional smoothing filter. The implementation of the hybrid scheme mechanism increased the signal-to-noise ratio of the laser pulse from about 11 dB to 30 dB, and the filtered pulse is smooth without modulation, with smoothness of about 98.8%.
Journal of food biochemistry, 2021
Actinidia arguta pollen owns abundant nutrients, such as vitamins, polyphenols, etc., however, li... more Actinidia arguta pollen owns abundant nutrients, such as vitamins, polyphenols, etc., however, little research on its antioxidant ability and biological function was conducted. In this study, we observed A. arguta pollen spore structure by SEM (Scanning electron microscope), analyzed the phenolic composition of A. arguta pollen extract (AAPE) obtained by four extraction methods (A: ultrasound-assisted extraction with water, B: heat reflux extraction with water, C: ultrasound-assisted extraction with ethanol, and D: heat reflux extraction with ethanol). Total phenolic content, total flavonoid content, antioxidant activities (ferric reducing/antioxidant power [FRAP], chelating activity, and DPPH⋅ scavenging activity) were also determined. Finally, we investigated its protective effect on DNA and lymphocytes damage response to oxidative stress. The results showed that the morphology of A. arguta pollen was similar to other pollen of the genus A. Lindl., but differs from them slightly i...
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
A distributed storage system (DSS) has the ad-vantages of low price and high throughput, but it a... more A distributed storage system (DSS) has the ad-vantages of low price and high throughput, but it also raises serious data confidentiality and privacy issues. Fine-grained access control (AC) is important for further applications. Although attribute-based encryption (ABE) schemes can achieve fine-grained AC, almost all schemes distribute a private key to a visitor by a private key generator that may leak data. Besides, attribute revocation functions of the ABE scheme will lead to collusion attacks. Blockchain-based ABE schemes rarely consider ciphertext-based search and attribute revocation functions which lead to a large communication overhead. In this paper, we propose a secure ABE scheme in which a data owner is the only person who has the right to distribute keys. Then we combine blockchain with the proposed ABE scheme to realize fine-grained AC over a distributed storage system, which supports the attribute change function and resists collusive attacks. In addition, we build a series of smart contracts to ensure the fairness of trade between the data owner and visitor. The auxiliary information of data stored on the blockchain can realize ciphertext-based search. Finally, we prove the scheme resists collusion attacks under the computational Diffie-Hellman assumption (CDH) and conduct multiple experiments based on Ethernet test Network. The experimental results demonstrate our scheme has the running time of algorithms reached a millisecond-level and the ET H cost is acceptable.
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
Integrity verification of cloud data is of great importance for secure and effective cloud storag... more Integrity verification of cloud data is of great importance for secure and effective cloud storage since attackers can change the data even though it is encrypted. Traditional integrity verification schemes only let the client know the integrity status of the remote data. When the data is corrupted, the system cannot hold the server accountable. Besides, almost all existing schemes assume that the users are credible. Instead, especially in a dynamic operation environment, users can deny their behaviors, and let the server bear the penalty of data loss. To address the issues above, we propose an accountable dynamic storage integrity verification (ADS-IV) scheme which provides means to detect or eliminate misbehavior of all participants. In the meanwhile, we modify the Invertible Bloom Filter (IBF) to recover the corrupted data and use the Mahalanobis distance to calculate the degree of damage. We prove that our scheme is secure under Computational Diffie-Hellman (CDH) assumption and Discrete Logarithm (DL) assumption and that the audit process is privacy-preserving. The experimental results demonstrate that the computational complexity of the audit is constant; the storage overhead is O(sqrtn)O(\sqrt n )O(sqrtn), which is only 1/400 of the size of the original data; and the whole communication overhead is O(1).As a result, the proposed scheme is not only suitable for large-scale cloud data storage systems, but also for systems with sensitive data, such as banking systems, medical systems, and so on.
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
Cloud storage saves a lot of storage overheads for users to manage data. However, it also brings ... more Cloud storage saves a lot of storage overheads for users to manage data. However, it also brings data integrity challenges. Relying only on message authentication codes (MAC) and hash functions introduces serious communication overheads. Existing integrity verification schemes usually rely on third-party auditors (TPAs) to reduce users’ audit burden. However, malicious TPAs not only extract raw data from repeated audit processes but also collude with a cloud server to launch collusive attacks. Recently, some integrity verification schemes based on blockchain are presented to solve challenges of raw data extraction and collusive attacks. These schemes cannot realize large-scale data processing on a blockchain as well as dynamic data operations. To address the above issues, we propose a blockchain-based cloud data integrity verification scheme (BCD-IV) that removes TPAs by using chain-code that solves collusive attacks. Furthermore, we construct a new homomorphic verification tag (HVT) based on the signature proposed by Zhang, Safavi, and Susilo (ZSS), which supports blockless verification. The proposed scheme realizes full dynamic operations with auxiliary information that stores on a blockchain. Mathematical analysis shows that our scheme has lower complexity in terms of communication and computation overhead, which are both O(c). Finally, we conduct experiments on Hyperledger Fabric V2.2 to demonstrate that the computation efficiency of audit is the highest compared to the state-of-the-art and the storage overhead is negligible.
2021 IEEE 4th International Conference on Electronics Technology (ICET), 2021
This paper studies the physical layer security problem in the downlink two-tier femtocell network... more This paper studies the physical layer security problem in the downlink two-tier femtocell network system, where an eavesdropper wiretaps the legitimate macrocell users. In this system, femtocell base stations (FBSs) can reduce the performance of eavesdropper through cochannel interference, which in turn improves the secure transmission rate of the entire system. The power allocation problem of the FBSs and macro base station (MBS) has an important influence on the cochannel interference and system performance in femtocell networks. In this paper, the power allocation problem is modeled as an optimization problem. We aim to maximize the secrecy rate and reduce energy consumption. Based on this, a joint subchannel and power allocation algorithm is proposed. Simulation results show that the proposed algorithm can effectively improve the network transmission performance and reduce the energy consumption, compared with existing algorithms.
The Visual Computer, 2020
In this paper, a robust and blind image watermarking algorithm via circular embedding and bidimen... more In this paper, a robust and blind image watermarking algorithm via circular embedding and bidimensional empirical mode decomposition (BEMD) is developed. First, the watermark image is scrambled by Arnold transform to increase the security of the algorithm. Second, the Hilbert curve is adopted to reduce the scrambled 2D watermark image to one-dimensional watermark signal. Third, the host image is decomposed by BEMD to obtain the multi-scale representation in the forms of intrinsic mode functions (IMFs) and a residue. Then, the extreme points of the IMFs are extracted as the embedding locations. Finally, the one-dimensional watermark signal is repeatedly and cyclically embedded in the extreme locations of the first IMF according to the texture masking characteristics of the human visual system, which greatly improves the ability of our algorithm against various attacks. The final watermarked image is reconstructed by combining the modified first IMF and the residual. The watermark can be successfully extracted without resorting to the original host image. Furthermore, image correction can be applied before image watermarking extraction if there are geometric attacks in watermarked image. A large number of experimental results and thorough evaluations confirm that our method can obtain higher imperceptibility and robustness under different types of attacks, and achieve better performance than the current state-of-the-art watermarking algorithms, especially in large-scale cropping attack, JPEG compression, Gaussian noise, sharpening, Gamma correction, scaling, histogram equalization, and rotation attacks. Keywords Image watermarking • Circular embedding • BEMD • Arnold transform • Hilbert curve B Jianping Hu