Geng Zheng | Tsinghua University (original) (raw)

Geng Zheng

Uploads

Papers by Geng Zheng

Research paper thumbnail of Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System

2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017

Data outsourcing in cloud is emerging as a successful paradigm that benefits organizations and en... more Data outsourcing in cloud is emerging as a successful paradigm that benefits organizations and enterprises with high-performance, low-cost, scalable data storage and sharing services. However, this paradigm also brings forth new challenges for data confidentiality because the outsourced are not under the physic control of the data owners. The existing schemes to achieve the security and usability goal usually apply encryption to the data before outsourcing them to the storage service providers (SSP), and disclose the decryption keys only to authorized user. They cannot ensure the security of data while operating data in cloud where the third-party servicers are usually semi-trustworthy, and need lots of time to deal with the data. We construct a privacy data management system appending hierarchical access control called HAC-DMS, which can not only assure security but also save plenty of time when updating data in cloud.

Research paper thumbnail of True random number generator based on ring oscillator PUF circuit

Microprocessors and Microsystems, 2017

In this paper we propose the method of generating true random numbers utilizing the circuit prima... more In this paper we propose the method of generating true random numbers utilizing the circuit primarily designed as Physically Unclonable Function (PUF) based on ring oscillators. The goal is to show that it is possible to design the universal crypto system, that can be used for various applications-the PUF can be utilized for asymmetric cryptography and generating asymmetric keys, True Random Number Generator (TRNG) for symmetric cryptography (generating session and ephemeral keys), nonces and salts. In the paper the results of evaluation of such a circuit utilized for TRNG purpose are presented.

Research paper thumbnail of Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System

2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017

Data outsourcing in cloud is emerging as a successful paradigm that benefits organizations and en... more Data outsourcing in cloud is emerging as a successful paradigm that benefits organizations and enterprises with high-performance, low-cost, scalable data storage and sharing services. However, this paradigm also brings forth new challenges for data confidentiality because the outsourced are not under the physic control of the data owners. The existing schemes to achieve the security and usability goal usually apply encryption to the data before outsourcing them to the storage service providers (SSP), and disclose the decryption keys only to authorized user. They cannot ensure the security of data while operating data in cloud where the third-party servicers are usually semi-trustworthy, and need lots of time to deal with the data. We construct a privacy data management system appending hierarchical access control called HAC-DMS, which can not only assure security but also save plenty of time when updating data in cloud.

Research paper thumbnail of True random number generator based on ring oscillator PUF circuit

Microprocessors and Microsystems, 2017

In this paper we propose the method of generating true random numbers utilizing the circuit prima... more In this paper we propose the method of generating true random numbers utilizing the circuit primarily designed as Physically Unclonable Function (PUF) based on ring oscillators. The goal is to show that it is possible to design the universal crypto system, that can be used for various applications-the PUF can be utilized for asymmetric cryptography and generating asymmetric keys, True Random Number Generator (TRNG) for symmetric cryptography (generating session and ephemeral keys), nonces and salts. In the paper the results of evaluation of such a circuit utilized for TRNG purpose are presented.

Log In