Research Article A Reputation-Based Identity Management Model for Cloud Computing

Size: px
Start display at page:

Download "Research Article A Reputation-Based Identity Management Model for Cloud Computing"

Transcription

1 Mathematical Poblems in Engineeing Volume 2015, Aticle ID , 15 pages Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1 Shengli Zhou, 1,2 Zhenji Zhou, 1 Zheng Hong, 1 and Kangyu Huang 1 1 College of Command Infomation System, PLAUST, Nanjing , China 2 Infomation Depatment, Zhejiang Police College, Hangzhou , China Coespondence should be addessed to Shengli Zhou; @qq.com Received 21 Mach 2015; Revised 27 May 2015; Accepted 30 May 2015 Academic Edito: Bao Rong Chang Copyight 2015 Lifa Wu et al. This is an open access aticle distibuted unde the Ceative Commons Attibution License, which pemits unesticted use, distibution, and epoduction in any medium, povided the oiginal wok is popely cited. In the field of cloud computing, most eseach on identity management has concentated on potecting use data. Howeve, uses typically leave a tail when they access cloud sevices, and the esulting use taceability can potentially lead to the leakage of sensitive use infomation. Meanwhile, malicious uses can do ham to cloud povides though the use of pseudonyms. To solve these poblems, we intoduce a eputation mechanism and design a eputation-based identity management model fo cloud computing. In the model, pseudonyms ae geneated based on a eputation signatue so as to guaantee the untaceability of pseudonyms, and a mechanism that calculates use eputation is poposed, which helps cloud sevice povides to identify malicious uses. Analysis veifies that the model can ensue that uses access cloud sevices anonymously and that cloud povides assess the cedibility of uses effectively without violating use pivacy. 1. Intoduction Cloud computing is a computing model fo enabling ubiquitous, convenient, on-demand netwok access to a shaed pool of configuable computing esouces (e.g., netwoks, seves, stoage, applications, and othe sevices) that can be apidly povisioned and eleased with minimal management effot o cloud sevice povide () inteaction [1]. Lage numbes of uses may simultaneously engage in cloud computing sevices, making the multitenant featue an impotant popety of cloud computing accoding to the Cloud Secuity Alliance (CSA) [2]. Howeve, the multitenant popety bings the following new poblems: (i) Pivacy leaks because of extenal use data: in an open envionment, uses must be authenticated to access cloud sevices. If uses employ thei actual names (o fixed usenames) to log in, sensitive infomation such as login names o even long-tem behavio may be evealed by data mining o othe techniques and used illegally by the. (ii) Management poblems caused by an excessive numbeoftenants:topesevepivacy,usesmustemploy diffeent pseudonyms to access each cloud computing session. In this case, it is difficult fo uses to ecall a lagenumbeofpseudonymsandpasswods.meanwhilesingle-usepseudonymsmakenocontibution to the development of a use s eputation. (iii) Secuity theats to the caused by multiple tenants: by accessing cloud sevices, malicious uses maytaketheoppotunitytoattackthethough activities such as stealing data, pefoming vulneability scanning, and launching denial of sevice (DoS) attacks. In paticula, if allowed to log in by a pseudonym, malicious uses can launch whitewash attacks, whee the malicious use can continue to visit the nomally afte an attack o initiate anothe attack by ceating a new pseudonym. Consideing the above poblems, taditional identity management mechanisms that stoe use identities in a database diectly ae no longe applicable [3]. In this pape, we design a new identity management model based on use eputation, which is heein denoted as eputation-based identity management (RIM). The main contibutions of RIM ae listed as follows:

2 2 Mathematical Poblems in Engineeing (i) Anonymous use access: in RIM, we design a method in which each use takes a diffeent pseudonym fo each session when accessing cloud sevices. No link between a use identity and a coesponding pseudonym is povided, and no link is povided between the pseudonyms of a single use. Pseudonym usage does not affect use attestation, and it deceases the input of pivate use infomation, endeing it impossible fo tenants to spy on each othe. (ii) Use attestation: in ou model, uses fistly egiste with an identity povide (IdP), which povides the use with a fomal identity cetificate. The identity cetificate is the basis fo the use to pove thei legitimate status to the. (iii) Reputation attestation: RIM ecods and detemines use eputations as use activities accumulate with access to successive cloud computing sessions and povides poof of the eputation. The poof assues the cedibility of the eputation, ensuing that the eputation indeed belongs to its owne. The poof also guaantees nonepudiation; that is, a use cannot deny the eputation assigned to them. As such, the poof ensues unfogeability. Uses cannot pomote thei eputation without the authoization of the IdP. The intoduction of a eputation does not affect the anonymity of uses. The emainde of this pape is oganized as follows. Section 2 descibes elated wok. Section 3 intoduces the backgound and technology of cloud computing along with identity management. Section 4 intoduces the poposed RIM and descibes its design and ealization. Section 5 analyzes the coectness and secuity of ou model. Finally, the last section concludes the pape and poposes futue wok. 2. Related Wok The focus of identity management fo cloud computing is use pivacy. In [4], the authos poposed an appoach to peseve the pivacy of uses based on zeo-knowledge poof potocols and semantic matching techniques. The appoach also enhanced the inteopeability acoss multiple domains. Although the study ealized the goal of concealing use identities, the could still obtain sensitive infomation though data mining techniques because use identities wee consistent thoughout the entie pocess. In [5], the authos poposed an entity-centic appoach fo identity managementincloudcomputing.theappoachwasbasedon pesonally identifiable infomation (PII) and on anonymous identification to mediate inteactions between uses and cloud sevices. Although the identification was anonymous, the PII eleased pivacy elated infomation. In [6], the authos took advantage of attibute-based encyption and signatue technology to conceal use identities in cloud computing. Howeve, because uses must employ a single unchanging cetificate to obtain authentication fom the, an attacke may ascetain a use s identity easily though the static cetificate. In [7], the authos impoved the appoach poposed in [4], whee the egisty cente was not equied to be online at all times. Howeve, the impoved appoach had the same disadvantages with espect to use pivacy potection as the oiginal appoach. In [8, 9], the authos designed and intoduced a method that integated blind signatue and hash chain techniques to potect use pivacy in cloud computing. Howeve, in evey session, uses employ the same pseudonym to log in, which esults in linkability between diffeent sessions. Although the above studies achieve the goal of use identity concealment, the successive behavios of individual uses can be associated. Thus, though analyzing use behavios, the can potentially compomise use pivacy. In [10], the authos poposed a method fo anonymity using goup digital signatue technology. Because this method intoduced no coelation between use signatues, this method is an impovement ove the afoementioned methods. Howeve, the use of goup digital signatue technology fobids membes fom joining and leaving a goup dynamically, which conflicts with the openness of cloud computing. In this pape, we popose an appoach that achieves use identity anonymity. Moeove, by this appoach, the is unable to link use behavio to use identity. While the anonymity of identity potects use pivacy, it tends to enable attack by malicious uses because the is unable to tace the uses involved in the attack. Theefoe, ou appoach intoduces tust management to addess the shotcomings of identity anonymity. The appoach detemines use eputations and binds the eputation to use identity. The utilizes use eputation to distinguish malicious uses and to educethetheatofattackbymalicioususes[11]. Pevious eputation eseach has focused on pee to pee (P2P) systems, which has been developed into vaious systems, fo example, the EigenTust [12], the PeeTust [13], and the PoweTust [14] systems. Along with the development of electonic business, eputation eseach has had a sevice oiented focus, whee the eputation of sevice povides has been evaluated to potect consumes. In [15, 16], eputation was employed as a means of choosing sevice povides. In cloud computing, most eseach has focused on potecting the, such as what was done in [17, 18]. Howeve, the use of a eputation model to manage uses in cloud computing, such as that employed in this pape, has not been the subject of pevious eseach. In [19], the authos designed an identity management model fo a noncloud computing envionment. The model supposed that uses must be peviously egisteed, which conflicts with the equied openness of cloud computing. In [20, 21], the authos designed a eputationbased identity management model that used online systems fo applications in, fo example, electonic business and foums. The online system must ecognize use identities o unique identifies to accumulate eputation data. Howeve, tacking use identities tends to leak use infomation, which theatens pivacy. This is why these appoaches cannot be applied to cloud computing. Ou poposed RIM intoduces eputation to manage uses and simultaneously potects use pivacy, which has not been investigated by othe eseaches.

3 Mathematical Poblems in Engineeing 3 Use Management sevices Coe sevices SaaS Application 1 Application n Identity management sevice PaaS Data pocess model QoS guaantee Mass data stoage IaaS Data cente devices Netwok esouces Vitualization sevices Compute nodes Secuity assuance. Figue 1: Cloud sevices achitectue. Use pivacy potection equies a use identity to be anonymous such that it cannot be tacked. Howeve, the detemination of eputation must confim use identity and tack use tansaction histoy. Theefoe, eputation management and identity anonymity appea to be contadictoy [22]. In [22], the authos alleviated this contadiction and designed an anonymous eputation system in a P2P envionment using electonic cash technology to povide feedback to uses accoding to behavio. Howeve, accoding to this appoach, theamountoffeedbackoneusegivestoanotheisesticted by the quantity of electonic coins in the fome use s possession. A use with no electonic coins is theefoe baed fom involvement in the tansaction. As such, this method contadicts with the openness of cloud computing. In [23], the authos used blind signatue technology to achieve a eputation-based identity management appoach in the C-S mode. This appoach povides the sevice povide with use eputations while guaanteeing use anonymity. Howeve, unde this appoach, a sevice povide can confim that odes deive fom the same use and accumulate the histoy of use actions, esulting in the potential violation of use pivacy. In [24], authos achieved an anonymous eputation system based on zeo-knowledge authentication and digital signatue technology. Howeve, [4] the sessions between the use and sevice povide unde this appoach ae linkable, enabling sevice povides to violate use pivacy. Fom the above analysis, we can see that these last two examples [25] manage to povide use eputation only by divulging use identity. Ou RIM ovecomes these shotcomings by detemining use eputation while ensuing that use identity and pseudonyms ae unlinkable. 3. Technology Backgound 3.1. Cloud Computing Achitectue. Cloud computing povides thee main sevice delivey models to the public, including the following [2]: (i) Softwae as a Sevice (SaaS): this is a softwae delivey model in which softwae and its associated data ae hosted in the cloud and ae typically accessed by uses using a thin client. (ii) Platfom as a Sevice (PaaS): this is the delivey of a computing platfom and solution stack as a sevice, which povides all the facilities equied to suppot thecompletelifecycleofbuildinganddeliveingweb applications and sevices fom the Intenet. (iii) Infastuctue as a Sevice (IaaS): this delives compute infastuctue (typically a platfom vitualization envionment) as a sevice, along with aw stoage and netwoks. Rathe than puchasing seves, softwae, data-cente space, o netwok equipment, clients puchase the esouces as a fully outsouced sevice. Based on the above appoach, a numbe of simila abstact sevice models have been ecently pomoted, such as Hadwae as a Sevice (HaaS), Data as a Sevice (DaaS), and Communication as a Sevice (CaaS). Cloud computing management sevices ensue the eliability, availability, and secuity of coe sevices. Figue 1 [26, 27]illustatesthebasic sevice achitectue of cloud computing. Cloud identity management takes chage of identity management thoughout the entie cloud sevices stack. Identity management can be divided into thee categoies [28]: isolated use identity model, fedeated use identity model, and centalized use identity model, which ae defined as follows: (i) Isolated use identity model: in this model, the sevice povide acts as both cedential povide and identifie povide to thei clients. A use obtains sepaate unique identifies fom each sevice/identifie povide tansacted with. (ii) Fedeated use identity model: this can be defined as the set of ageements, standads, and technologies that enable a goup of sevice povides to ecognize use identifies and entitlements fom othe sevice povides within a fedeated domain.

4 4 Mathematical Poblems in Engineeing Ced2 Use 1 Use 2. Ced1 Ced1 Ced1 Ced2 Ced2 Common identifie and cedentials povide VM1 SaaS VM1 PaaS IaaS VM... VM2 SaaS PaaS IaaS VM2. Figue 2: Centalized use identity model in cloud computing. (iii) Centalized use identity model: this model employs a single identifie and cedential povide that is used by all sevice povides to povide identifies and cedentials to uses. In the centalized use identity model, the job of identity management has been taken ove by an identity povide fom the sevice povide. This educes the buden of the sevice povide and also educes the numbe of cetificates equied by uses to hold. In addition, the centalized use identity model facilitates the delivey of the identity management sevice fom the to the uses. In an identity povide management domain, uses fist obtain a fomal cetificate and then access cloud sevices in the same domain using this cetificate. This popety makes the centalized use identity model suitable fo cloud computing, and, theefoe, we employ a centalized model in ou design, as shown in Figue Basic Technology. We intoduce identity-based signatue, blind signatue, and zeo-knowledge authentication technology to implement RIM. The identity-based signatue was poposed by Shami [29] in Hee, a use s identity is fist disclosed as a public key and then used to geneate a pivate key. In [29], the authos designed a conceptual model but did not povide fo any eal implementation. Since then, studies of the identitybased signatue have been conducted, but no efficient and povable signatue scheme was concluded until Boneh et al. [30, 31] pomoted an identity-based encyption scheme. Identity-based signatue compises fou stages: setup, pivate key extaction, signatue, and veification. Using an identity as a public key has a natual legitimacy, which can simplify the pocess of key distibution. The concept of blind signatue was suggested by Chaum [32]. The appoach ensues that the signe does not know the specific content of the message and that the message owne can obtain the signatue of the message. Blind signatue consists of thee opeations: blinding, signing, and blindness emoval. Blind signatue has many chaacteistics conducive to potecting use pivacy such as (1) blindness, whee the signe does not know the specific content of the message to be signed and (2) untaceability, whee, if a signatue is leaked, the signe has no idea of when and by whom the message was signed. Zeo-knowledge poof authentication technology efes to a pove s assuance of owneship of some secet infomation, without evealing any useful knowledge about the secet infomation to the veifie. Well-known zeo-knowledge authentication schemes mainly include the Feige-Fiat-Shami [33] scheme, the Guillou-Quisquate [34] scheme, and the Schno [35]scheme. The poposed RIM achieves an identity management modelthatissuitablefocloudcomputingbyemploying methods elated to the above techniques that ae most suitable fo specific application scenaios. In Section 4.3, we give a detailed exposition of ou design. 4. Model Design and Implementation In this section we fistly give some assumptions fo RIM and then explain the detailed implementation of the model Assumptions. We must make some easonable assumptions to ensue pope RIM functionality. Fistly, we assume the existence of an independent abitation agency whose function is simila to a govenmental authoity that can ensue use pivacy while simultaneously poviding a secue souce of anonymous use infomation unde vey specific cicumstances. As such, the agency poposed heein is diffeent fom a tusted thid paty in an odinay sense. The agency need not have a continual online pesence. Moeove, the agency does not collude with othe uses, and use infomation is potected fom malicious uses. Because cloud sevices ae open to the public as a paid sevice, it is necessay to eveal anonymous use infomation when a suffes an attack o has economic disputes with uses. Theefoe, RIM must be able to identify anonymous uses to addess these specific poblems. If a seeks anonymous infomation, it must povide a ange of cetificates and follow pescibed secuity potocols to ensue that the application submitted is legitimate. Anothe impotant assumption is that the communication channel in RIM is secue. SSL and IPSec potocols can be used to ensue the secuity of the channel Model Design. Fou oles ae managed in RIM: Use,, IdP, and deanonymizing authoity (DA), which ae defined as follows: (i) Use: the consume of cloud sevices who equests identity anonymity and benefits fom the sevice. (ii) : the sevice povide who, afte the tansaction between the Use and, povides feedback egading the tansaction. (iii) IdP: the sevice povide who not only povides egistation sevices to the Use but also detemines the Use eputation, which is indicative of the degee

5 Mathematical Poblems in Engineeing 5 U P u (1) Use egiste (3) Identity authentication (4) Sevices access IdP U (8) Reputation update confimation IdP (7) Blind signatue (6) Applying fo eputation update P u (5) Reputation backfeeding (4) Sevices access (2) Pseudonym geneation (a) (b) Figue 3: Schematic of the anonymous access and eputation update pocess. of tust, based on the feedback obtained fom the. The IdP issues the Use eputation cetificate. (iv) DA: an authoity that can eveal Use pseudonyms and povide Use identity-elated infomation to the. RIM has five stages, namely, Envionment Initialization, Use Registation, Identity Authentication, Reputation Computation, and Pseudonym Disclosue. In the Envionment Initialization stage, RIM fist ceates the public paametes of the IdP, DA, and. It then geneates the public and pivate keys used fo signatues. The opeations of key geneation ae as follows: λ is the secuity paamete, PK denotes the public key, and SK denotes the pivate key. The following descibes the pobabilistic polynomial time algoithm: (i) (PK Id s,sk Id s ) SetupIdP Idsign(1 λ ):itisakeygeneation algoithm that takes λ as the input and outputs a pai (PK Id s,sk Id s ) of public and secet keys used by the IdP to sign the identity cetificate. (ii) (PK Id b,sk Id b ) Setup IdP blind(1 λ ):giventhe secuity paamete λ,itceatesapaiofkeys(pk Id b, SK Id b ) whichisusedbytheidptogeneateablind signatue. (iii) (PK,SK ) Setup(1 λ ):itoutputsapai of keys (PK,SK ) which is used by the to ceate a feedback cetificate. (iv) (PK DA,SK DA ) Setup DA(1 λ ):itgivesthedaa pai of keys (PK DA,SK DA ) which is used to encypt and decypt Use identities. Keys (PK Id s,sk Id s ) and (PK Id b,sk Id b ) can be combined into a single pai. Howeve, in such a situation, if the keys ae disclosed, the IdP will collapse. When they ae sepaated, if one pai of keys is compomised, fo example, if theblindsignatuekeyiscompomised,onlythecedibilityof the eputation is affected while the identity cetificate emains valid. Owing to secuity consideations, we maintain these twokeypaisassepaate. The Registation opeation and Veification opeation contained in the Use Registation stage ae defined as follows: (i) Registation: the Use initiates the opeation (C Id, ep, C ep ) Registe(SK Id s,id)to egiste with the IdP. The Use obtains an identity (Id)astheinputand then eceives the identity cetificate C ep,eputation (ep), and eputation cetificate C ep.hee,ep is the initial eputation value fo new uses given by the IdP. (ii) Veification: the opeation 1/ CheckReg(PK Id s, C Id,ep,C ep ) is employed by the Use to authenticate C Id, ep,andc ep. This opeation takes the IdP public key PK Id s as one of the inputs, which will confim the legitimate souce of these cetificates. If veified, 1 will be etuned as the esult; othewise, will be etuned. The fist time a Use entes the cloud sevice system, the Use must egiste with the IdP using thei own identity. The IdP will detemine whethe the identity is edundant o on the blacklist. If the answe is no, the veification is passed. The IdP gives the Use an initial eputation value and issues an identity cetificate and eputation cetificate. The identity that egisteed to the IdP is known to the public. It can be a URL o addess associated with the Use. The public identity caies less pivacy and is easily veified by the IdP. Because of the openness of cloud sevices, the ules fo accessing cloud sevices cannot be ovely stict. In RIM, all uses that meet the basic safety equiements ae allowed access. Afte Registation, the Veification opeation is pefomed to veify theidentitycetificateandtheeputationcetificate.the above pocesses ae illustated in Step 1 of Figue 3(a). AftetheUsehasaecognizablevalididentity,access is ganted to the using the pseudonym geneated accoding to this valid identity, and the will authenticate the pseudonym. The Identity Authentication stage includes the Pseudonym Geneation opeation and Authentication opeation shown in steps 2 and 3 of Figue 3(a), whichae descibed as follows:

6 6 Mathematical Poblems in Engineeing (9) Reputation withdawal IdP IdP (11) Identity mapping U P u Resume (2 8) (10) Anonymity emoval (a) (b) DA Figue 4: Schematic of the standad access pocess and Pseudonym Disclosue. (i) Pseudonym Geneation: taking Id, the Use identity cetificate C Id, and ep as the inputs, the opeation P u Gen pny(id, C Id,ep) outputs the Use pseudonym P u, which is the only identification pesented to the. (ii) Authentication: the opeation 1/ Authenticate(P u,c ep ) is used to authenticate the Use identity though P u by the. This opeationisalsousedtoconfimthecedibilityof the Use eputation. The Pseudonym Geneation opeation encypts Id using the public key povided by the DA. As such, if a dispute aises between the Use and the, RIM would decypt P u with thepivatekeypovidedbythedatoestoetheuseid.the Authentication opeation applies the Σ-potocol to conduct the authentication. Duing the pocess, the can extact P u, C ep,andep but not the Use Id. Afte the tansaction between the Use and the, RIM entes the Reputation Computation stage, whee the Use ep is updated on the basis of feedback povided by the. This stage includes a seies of opeations including the Reputation Backfeeding opeation, Blinding opeation, Applying fo Reputation Update opeation, Blind signing opeation, and Reputation Update Confimation opeation, which ae defined as follows: (i) Reputation Backfeeding: the calls (ep new, C ep new ) Gan(P u ) and povides eputation feedback ep new and its cetificate C ep new accoding to the pefomance of P u.thec ep new guaantees that ep new is fom the. (ii) Blinding: P u andomly selects the blind facto Nonce as the input of the opeation Nonce blind Blind(Nonce) to obtain the blinded value Nonce blind. (iii) Applying fo Reputation Update: given the inputs ep new, C ep new,nonce blind, P u calls 1/ Update(ep new, C ep new,nonce blind) to apply fo eputation updating. The IdP veifies the eputation feedback based on ep new and C ep new. A successful opeation etuns 1; othewise, it etuns. (iv) Blind Signing: the IdP calls C blind Blind sign(nonce blind) to geneate the blind signatue C blind of the value Nonce blind. (v) Reputation Update Confimation: the Use emoves the blindness of C blind and obtains the cetificate C Nonce of Nonce. Then, the Use calls 1/ Confim Update(C Nonce ) to submit the equest fo confiming the update of eputation to the IdP. If the IdP successfully updates the Use ep, it etuns 1; othewise, it etuns. The povides feedback to P u using the Reputation Backfeeding opeation, as illustated by Step 5 in Figue 3(b). The Applying fo Reputation Update Confimation opeation submits the eputation feedback ep new and a blinded andom value Nonce blind to the IdP and expects that the IdP will update ep. This opeation is illustated by Step 6 in Figue 3(b). The IdP veifies the feedback and detemines that it is valid. Howeve, the IdP cannot detemine fo whom the feedback is designated because the IdP cannot tack the feedback to the Use Id. The IdP uses the Blind Signing opeation to sign Nonce blind andgivestheesultc blind back to P u,asillustatedbystep7 in Figue 3(b). Becausethe Use geneates P u diectly, the Use can locate thei own P u. The Use obtains C blind though P u andthenemovesthe blindness of C blind to obtain C Nonce. The Use subsequently calls the Reputation Update Confimation opeation and submits C Nonce to the IdP to confim the updating of ep, which is illustated by Step 8 in Figue 3(b). TheIdPveifies C Nonce,and,ifpassed,thevalueofep is updated. The IdP cannot link Nonce to Nonce Blind, whichiswhytheblind signatue is intoduced. This method ensues that, even in the case of collusion between the IdP and, the IdP cannot obtain the Use Id though P u. The afoementioned pocesses addess the entie pocess of new use access to cloud sevices, including Use Registation, accessing sevices, and eputation update. The Use who is aleady egisteed must fist call the Reputation Withdawal opeation to acquie a value fo ep fom the IdP and then follow all subsequent opeations, as the afoementioned. The Reputation Withdawal opeation is illustated in Figue 4(a), which is descibed as follows:

7 Mathematical Poblems in Engineeing 7 (i) Reputation Withdawal: the Use acquies ep and C ep by the opeation (ep, C ep ) Withdaw(Id) using its own Id. The last stage is the Pseudonym Disclosue stage. If the Usehasdonehamtothe,themustgainaccess to the Use Id. This stage includes the Anonymity Removal opeation and the Identity Mapping opeation, which ae descibed as follows: (i) Anonymity Removal: when the opeation g Id De Anonymity(P u,sk DA ) is called, the DA opens P u using its pivate key SK DA.Theoutputofthis opeation is not the Use Id itself but g Id,whichis geneated by the IdP, whee g is one of the public paametes. (ii) Identity Mapping: IdP calls Id Map(g Id ) to map g Id to the Use Id and then esolves the disputes offline. The submits a malicious behavio epot fo the Use and pseudonym P u to the DA and applies fo opening apseudonym,asillustatedinstep10 in Figue 4(b). The DA uses the Anonymity Removal opeation to open P u and obtains g Id.TheDAsubmitsg Id to the IdP. Then the IdP calls the Identity Mapping opeation and etieves the Use Id,as illustated by Step 11 in Figue 4(b). Theefoe, fo secuity consideations, the DA does not ecove the Id diectly. This isoneofthemethodsthatensueusepivacyandpevent the misuse of a use s identity. The above povides an oveview of RIM. The following povides a concete ealization of ou model RIM Realization. In this section we povide a desciption of the concete ealization of RIM based on Hidden Identity-Based Signatuespoposed by Kiayias and Zhou [36]. Hidden Identity-Based Signatues meet use equiements fo anonymity in a cloud computing envionment, but they do not satisfy the need fo a unique use pseudonym fo each session. We theefoe extended Hidden Identity-Based Signatues by intoducing eputation and blind signatue to fulfill the equiements mentioned above. In RIM, we achieve blind signatue using the Schno scheme [25]. The public paametes discussed peviously [25, 36] ae identical, so the RIM is made moe compehensive by combining the two techniques. In the Envionment Initialization stage, we geneate public paametes p,g,g,g T,e,wheeG and G T ae cyclic goups of pime ode p, g is a geneato fo G and G T, e is a bilinea map, e:g G G T,and G = G T. h is selected fom G\{1}andomly. H is a hash function, H:{0,1}.TheopeationSetup IdP Idsign(1 λ ) andomly selects x, y Z p and computes X = gx, Y = g y,wheethe public and pivate key pais ae given as PK Id s = (X,Y), SK Id s =(x,y). Similaly, the opeation Setup IdP blind(1 λ ) geneates the key pai PK Id b = M, SK Id b = m,whee m Z p and M=g m. Setup (1 λ ) geneates the key pai PK =(I,J), SK = (i, j) fo feedback signatue using the same method descibed above. The key pai geneation of Setup DA(1 λ ) is moe complicated. It andomly selects u, V G, w G\{1} and b, d Z p,esultinginw=ub = V d, which povides the key pai PK DA =(u,v,w), SK DA =(b,d). Afte the keys ae geneated, RIM publishes the public keys andkeepsthepivatekeyssecet. In the Use Registation stage, the IdP povides the Use with the identity cetificate, eputation, and eputation cetificate. We intoduce the technology of shot signatues [37] to issue these cetificates. The IdP andomly selects, q Z p and then issues identity cetificate C Id (g 1/(x+Id+y),)and eputation cetificate C ep (g 1/(x+ep+yq),q),notingthatId and ep denote the identifie and eputation belonging to the Use. Afte that, the IdP gives the Use a tiple C Id,C ep,ep. The Use veifies these cetificates using the IdP public key. When the equation e(g 1/(x+Id+y),Xg Id Y ) = e(g, g) holds, the Use accepts the identity cetificate. In the same way, the Use veifies the eputation cetificate. If the two cetificates ae both valid, the opeation CheckReg(PK Id s,c Id,ep,C ep ) etuns1.ifeithecetificate is invalid, both cetificates ae discaded. The Pseudonym Geneation and Authentication opeations in the Identity Authentication stage ae usually caied out togethe in pactice. In this pape, we extend the method intoduced in [36] to authenticate the Use identity, Use identity cetificate, and the link between the Use identity and identity cetificate. Ou appoach equies veification that the eputation geneated fom the pseudonym belongs totheusewehavejustauthenticated.thespecificpocessis descibed as follows: (i) The Use employs linea encyption [37] to commitid in (U, V, W). It satisfies the constaints U=u k, V=V l, W= w k+l g Id,wheel and k ae andomly selected: K, l. (ii) The Use commits C Id in (S, R); that is, S=g 1 C Id and R=g 2 h 1 Y,whee 1 and 2 ae andomly selected: 1, 2. (iii) The Use authenticates thei identity using the zeoknowledge poof technique [35], as descibed in Figue 5. Finally, if the equation holds, the Use is assued of possessing a legitimate identity, although the would have no knowledge of that identity. (iv) The pocess of authenticating the Use identity cetificate is descibed in Figue 6. Iftheequationshold,the Use is assued of possessing a legitimate identity cetificate, althoughthewouldhavenoknowledgeofthatcetificate. (v) It must also be veified that the identity and the identity cetificates belong to the same Use. The veification pocess is descibed in Figue 7. If the equations ae tue, the identity is bound to the identity cetificate. (vi) Moeove, the legitimacy of the eputation and that the eputation belongs to the Use must also be veified. The eputation is open to the public, so it is authenticated using the IdP public key. When veifying that the eputation belongs to the Use, the Use identity is hidden. To this end, a secet message is selected, and owneship of the eputation cetificate can be veified only if the Use has the secet

8 8 Mathematical Poblems in Engineeing Use K, l U=u k V= l W=w k+l g Id θ Id,θ l,θ k B 1 =u θ k B 2 = θ l B 3 =w (θ k+θ l ) g θ Id ξ Id =θ Id +σ Id ξ k =θ k +σ k ξ l =θ l +σ l Use 1, 2 S=g 1 C Id R=g 2 h 1 Y θ 1,θ 2,θ B 4 =g θ 2 h θ 1Y θ ξ 1 =θ 1 +σ 1 ξ 2 =θ 2 +σ 2 ξ =θ +σ U, V,W Show the pomise B 1, B 2, B 3 Give the challenge σ Show the answe ξ Id, ξ k, ξ l Figue 5 S, R Show the pomise B 4 Give the challenge σ σ B 1 = U σ u ξ k B 2 = V σ v ξ l B 3 = W σ w (ξ k+ξ l ) g ξ Id σ Show the answe ξ 1, ξ 2, ξ B 4 = R σ g ξ 2 h ξ 1Y ξ Figue 6 message, as descibed in Figue 8(a).Linkabilitybetween the eputation cetificate and the Use identity is then veified, as descibed in Figue 8(b).Iftheequationshold,theeputation and eputation cetificate ae concluded to belong to the Use. (vii) Finally, we veify that the encypted identity cetificate is fom the IdP accoding to the encypted identity. We assume that B 11 =e(g,xwr) θ 1 e (S, w) θ k+θ l e(g,w) (θ δ 1 +θ δ2 ) e(s,g) θ 2 e (g, g) θ δ 3 e (S, h) θ 1 e(g,h) θ δ4, ξ=e(g,xwr) ξ 1 e (S, w) (ξ k+ξ l ) e(g,w) (ξ δ 1 +ξ δ2 ) e(s,g) ξ 2 e (g, g) ξ δ 3 e (S, h) ξ 1 e(g,h) ξ δ4 σ e (g, g) (( e (S, XWR) ) ), whee, if B 11 =ξ, the abovementioned conclusion is veified becauseiftheidppivatekeyisinput,weobtaintheoutput e(c Id,Xg Id Y ) = e(g, g). (1) Thus fa, the legitimacy of the Id, C Id, C ep C Id,andC ep has been veified. Moeove, the linkability between the Id and the C Id and C ep has been veified. Though the Id has been encypted, it can be veified that the C Id deives fom the IdP. Togethe with the veification of the legitimacy of the eputation, all of the above compise the opeation Authenticate(P u,c ep ). Because the eputation need not besecet,theeputationcanbeauthenticatedsimplyby inputting the IdP public key. Next, we addess the e(c ep,xg ep Y q ) = e(g, g) opeation Gen pny(id, C Id,ep).Hee,thepseudonymP u is just the andom challenge σ used by the fo authenticating the Use. P u meets cloud computing secuity equiements. The secuity analysis will be conducted in the next section. Ou implementation of the Reputation Computation stage is descibed as follows: (i) Reputation Withdawal: the opeation Withdaw(Id) etuns the eputation cetificate, which is signed by the IdP. The specific implementation of the eputation cetificate is equivalent to that of the identity cetificate. (ii) Reputation Backfeeding: we continue to use the shot signatue [38]tosignthefeedbackgivenbythe; that is, C ep new g 1/(i+ep new+jn),n,wheen is andomly selected: n Z p. (iii) Blinding: this opeation is pefomed by the Use and the IdP. The IdP possesses the key pai (M, m), whee M=g m. The IdP andomly selects b and computes x b = g b.then,p u obtains x b fom theidpandselectsaandomnumbenonce that is to be signed. P u computes x b = g u b M d b x b, e b = H(x b, Nonce),ande b =e b +d b,wheed b,u b.theuseassignse b as the blind signatue of Nonce;thatis,Nonce blind = e b. (iv) Applying fo Reputation Update. The IdP veifies the eputation feedback, which is signed by the. If the equation e(g 1/(i+ep new+jn),ig ep new J n ) = e(g, g) holds, we conclude that the veification has passed. (v) Blind Signing: the IdP computes y b = b +e b mand C blind =y b. This is also the pocess of signing the blind andom numbe Nonce blind. The IdP does not know the plaintext of Nonce thoughout the pocess. (vi) Reputation Update Confimation: the Use emoves the blindness of C blind (i.e., y b )thoughcomputing y b =y b+u b.then,thepai(e b,y b ) is obtained, which is the signatue of Nonce denoted by C blind.finally, the Use calls Confim Update(C Nonce, Nonce) to confim the update of the eputation. The IdP detemines if the equation x b =g y b M e b holds. If so, the IdP then examines the equation e b =H(x b, Nonce). When both equations hold, the IdP concludes that the signatue is valid.

9 Mathematical Poblems in Engineeing 9 Use δ 1 = 1 k, δ 2 = 1 l, δ 3 = 1 2, δ 4 = 2 1, δ 5 = 1 θ δ1,θ δ2,θ δ3,θ δ4,θ δ5 B 5 =U θ 1u θ δ 1 B 6 =V θ 1 θ Show the pomise B δ 2 5, B 6, B 7 B 7 =R θ 1g θ δ 3 h θ δ 4 Y θ δ 5 Give the challenge σ ξ δ1 =θ δ1 +σ δ 1 ξ δ2 =θ δ2 +σ δ 2 ξ δ3 =θ δ3 +σ δ 3 ξ δ4 =θ δ4 +σ δ 4 ξ δ5 =θ δ5 +σ δ 5 Show the answe ξ δ1, ξ δ2, ξ δ3, ξ δ4, ξ δ5 Figue 7 B 5 = U ξ 1u ξ δ 1 B 6 = V ξ 1 ξ δ 2 B 7 = R ξ 1g ξ δ 3 h ξ δ 4 Y ξ δ 5 Use t T=g t Y q θ t,θ q B 8 =g θ t Y θ q ξ t =θ t +σ t ξ q =θ q +σ q T Show the pomise B 8 Give the challenge σ Show the answe ξ t, ξ q (a) B 8 = T σ g ξ t Y ξ q Use λ 1 =tk, λ 2 =tl θ λ1,θ λ2 B 9 =U θ t u θ λ 1 B 10 =V θ t θ λ 2 Show the pomise B 9, B 10 Give the challenge σ ξ λ1 =θ λ1 +σ λ 1 Show the answe ξ λ1, ξ λ2 ξ λ2 =θ λ2 +σ λ 2 B 9 = U ξ t u ξ λ 1 (b) B 10 = V ξ t ξ λ 2 Figue 8 Afte veifying the blind signatue, the IdP pefoms the actual eputation updating opeation. We intoduce the feedback based eputation calculation method [39] toestimate the Use eputation. Hee, thee factos detemine the total value of Use tustwothiness, that is, ep new, ep h, ep u, whee ep new epesents the new eputation feedback the povides afte the tansaction, ep h is the histoy feedback povided by the peviously accessed, and ep u is the oveall eputation the Use had pio to the cuent tansaction. Afte accessing the sevice, the Use eputation is calculated by ep = (W new ep new) + (W h eph) + (W u epu). Toegulatethevalueof the eputation, we let ep new, ep h, ep u be nomalized to values in [0, 1]. W new, W h, W u denote the new feedback weight, the updated histoy feedback weight, and the updated oveall eputation weight pio to the cuent tansaction, espectively. All the weights have values in [0, 1] and satisfy the constaint W new+ W h+wu=1. The details have been descibed in [39]. In the Pseudonym Disclosue stage, the DA and IdP decypt the Use pseudonym and then estoe the Use Id. The details of the two opeations ae as follows: (i) Anonymity Removal: the DA decypts the secet infomation (U, V, W) using the secet key (b, d) in the possession of the DA to estoe g Id ;thatis,g Id = W/(U b V d ). (ii) Identity Mapping: the IdP maps g Id to the Use Id using the intenal mapping table that is built at the beginning. Though the abovementioned opeations, we can delive an identity management sevice. The Use geneates a pseudonym using this sevice and then employs the pseudonym as the identity fo accessing cloud sevices without exposing any eal identity infomation. The Use eputation, within a cetain ange, indicates to what extent the can tust the use, based on the possibility that the Use may cay out malicious activities. 5. Model Analysis In this section, we veify the coectness and povide a detailed secuity analysis of the poposed model.

10 10 Mathematical Poblems in Engineeing 5.1. Coectness of the Model. The coectness of the model includes Use Registation coectness, Reputation Calculation accuacy, Identity Authentication coectness, and Pseudonym Disclosue coectness. Definition 1. Use Registation coectness is descibed as follows. If the identity cetificate and the eputation cetificate can be veified with a pobability of 1, then one concludes that the Use Registation is coect. This is given by the following: P [ (PK Id s, SK Id s ) SetupIdP Idsign (1 λ ) [ (C Id,ep,C ep ) Registe(SK Id s,id) ] [ CheckReg (PK Id s,c Id,ep,C ep )=1 ] =1. Theoem 2. RIM Use Registation is coect. (2a) Poof. Iftheabovepobabilityis1,thentheoutputofeach opeation must be coect, and the identity cetificate and the eputation cetificate can pass the veification using the public keys in the possession of the IdP. The validity of the identity cetificate was veified in [38], and we need only to veify the validity of the eputation cetificate. The following fomula (3) confims that e(g 1/(x+ep+yq),Xg ep Y q ) = e(g, g), veifying the eputation cetificate is valid. Conside e(g 1/(x+ep+yq),Xg ep Y q ) =e(g 1/(x+ep+yq),g x g ep (g y ) q ) =e(g 1/(x+ep+yq),g x+ep+yq ) = e (g, g). Definition 3. Identity Authentication coectness is descibed as follows. The authenticates the Use though the Use pseudonym P u. If all the opeations etun coect outputs with a pobability of 1, we conclude that the Identity Authentication is coect. This is given by the following: (PK Id s,sk Id s ) SetupIdP Idsign (1 λ ) (C Id,ep,C ep ) Registe(SK Id s,id) P CheckReg (PK Id s,c Id,ep,C ep )=1 [ P u Gen Pny (Id, C Id,ep) ] [ Authenticate (P u,c ep )=1 ] =1. Theoem 4. RIM Identity Authentication is coect. (3) (2b) Poof. The must authenticate the Use identity, the validity of the identity cetificate, the linkability of the identity and identity cetificate, the validity of the eputation cetificate, and the linkability of the identity and eputation cetificate. All of the above have been poven in [25] with the exception of the linkability of the Id and eputation cetificate. Theefoe, we only veify hee the linkability of the Id and eputation cetificate. The veification follows the same appoach as that of fomula (3) but is conducted by the.veifying the linkability of the Id and eputation cetificate follows accoding to fomula (4), whichindicates that the Use owns the eputation cetificate, and fomulas (5) and (6), which veify that the Use identity is linked with eputation cetificate. Conside T σ g ξ t Y ξ q =(g t Y q ) σ g (θt+σ t) Y (θ q+σ q) =g tσ Y σq g σt Y σq g θ t Y θ q =g θ t Y θ q =B 8 U ξ t u ξ λ 1 =U (θ t +σ t) u θ λ 1 +σ λ 1 =U θ t u θ λ 1 U σ t u σ tk (4) =U θ t u θ λ 1 U σ t U σ t =U θ t u θ λ 1 =B9 (5) V ξ t V ξ λ 2 =V (θ t +σ t) V θ λ 2 +σ λ 2 =V θ t V θ λ 2 V σ t V σ tl =V θ t V θ λ 2 V σ t V σ t =V θ t V θ λ 2 =B10. The Reputation Computation accuacy involves two aspects: (1) the coectness of the opeations such as eputation acquisition, eputation feedback, and eputation update; and (2) the fact that the eputation evaluation algoithm can accuately calculate the use degee of tustwothiness. The accuacy of the evaluation algoithm has been veified in [39]. Theefoe, in this pape, we only define the coectness of the opeations. Definition 5. Reputation Calculation coectness is descibed as follows. If the eputation-elated opeations etun coect outputs with a pobability of 1, one concludes that the Reputation Calculation is coect. This is given by the following: (PK Id s,sk Id s ) SetupIdP Idsign (1 λ ) (PK Id b,sk Id b ) SetupIdP blind (1 λ ) (PK,SK ) Setup (1 λ ) (ep, C ep ) Withdaw (Id) CheckReg (PK Id s,c Id,ep,C ep )=1 P P u Gen Pny (Id, C Id,ep) Authenticate (P u,c ep )=1 (ep new, C ep new ) Gant (P u ) Nonce blind Blind (Nonce) Update (ep new, C ep new,nonce blind) = 1 [ C blind Bl ind sign (Nonce blind) ] [ Confim Update (C blind )=1 ] =1. (6) (2c)

11 Mathematical Poblems in Engineeing 11 Theoem 6. RIM Reputation Calculation opeations ae coect. Poof. The opeation Withdaw(Id) and the subsequent veification steps of the eputation ae equivalent to the egistation opeations. The veification of the eputation feedback is simila to that given in fomula (3). Becausethe coectness of the egistation opeations has been poven in Theoems 2 and 4, weheepoveonlythecoectness of the blind signatue. Fomula (7) emoves the blindness of the signatue, obtaining the intemediate value x b.ifthe equation e b = H(x b, Nonce) holds, we conclude that the blind signatue is coect. Along with Theoems 2 and 4,the poof veifies the coectness of the eputation opeations. One has g y b M e b =g y b+u b M e b =g b+e b m+u b M e b d b =x b g e b m g u b g m(e b d b ) =x b g e b m g u b g m e b g m( d b) =x b g u b M d b =x b. Definition 7. Pseudonym Disclosue coectness is descibed as follows. The DA decypts the pseudonym to estoe the Use Id with a pobability of 1. This is given by the following: (PK Id s,sk Id s ) SetupIdP Idsign (1 λ ) (PK DA,SK DA ) SetupDA (1 λ ) (ep, C ep ) Withdaw (Id) CheckReg (PK P Id s,c Id,ep,C ep )=1 P u Gen Pny (Id, C Id,ep) Authenticate (P u,c ep )=1 g Id De Anonymity (P [ u,sk DA ) ] [ Id Map (g Id ) ] =1. Theoem 8. RIM Pseudonym Disclosue is coect. (7) (2d) Poof. Opeations conducted pio to the Pseudonym Disclosue pocess have been poven in Theoems 2, 4, and 6. The coectness of decypt (U, V, W) hasbeenpovenin[36]. Finally, the IdP queies the mapping table to obtain the Use Id. Theefoe, we conclude that the Pseudonym Disclosue is coect Secuity of the Model Secuity of Reputation. Befoe discussing the secuity of eputation, we assume that the pivate keys of the IdP,, andusehavenotbeenleaked.ifthepivatekeysweeleaked, therimwouldbeopentothepublic.thedataoftheidp aestoedinacloudenvionment,andthecloudseviceis open to the public. Theefoe, an attacke can obtain an Id and eputation pai, theeby conducting a plaintext attack by analyzing them. In this pape, we will not conside a situation whee an attacke modifies the eputation though the cloud undelying infastuctue, and the attacks ae all chosen as plaintext attacks. Unfogeability of eputation efes to the fact that an unauthoized use has no way of modifying thei own o anothe s eputation value. If the attacke (o Advesay; AdV) wishes to modify a eputation value without pemission, the AdV must foge a eputation cetificate issued by the IdP o a feedback cetificate signed by the. Next, we povide a fomal definition of eputation unfogeability. Definition 9. If a pobabilistic polynomial-time advesay AdV has the advantage AdVantage unf (λ) = P[(PiVK unf (λ) = 1) 1/2], which is negligible in λ, then one concludes that the eputation value is unfogeable. The expeiment PiVK unf (λ) is defined as follows: (i) AdV is given the public paametes p,g,g,g T,e,as descibed in the Envionment Initialization stage. The egiste andom oacle O eg povides AdV with a Use identity, eputation value, and eputation cetificate. The feedback andom oacle O povides AdV with eputation feedback and the feedback cetificate. The pseudonym andom oacle O Id povides AdV with the Use pseudonym P u. (ii) The AdV geneates (Id 0,ep 0 ), (Id 1,ep 1 ) and ((P u ) 0,ep new 0 ), ((P u ) 1,ep new 1 ). (iii) The challenge andomly selects b fom {0, 1}; that is, b {0,1}. Then, the challenge calls (ep b,(c ep ) b ) Withdaw(Id b ) and (ep new b, (C ep new ) b ) Gant((P u ) b ) to acquie the pai (ep b,(c ep ) b ) and (ep new b,(c ep new ) b ). (iv) The AdV gives a guess b,andifb=b,thenoutputis 1; othewise, output is 0. Now, we educe this AdV to an advesay (AdV) b fo the BB signatue. Fistly, (AdV) b initializes a hash table H fo the simulation of the andom oacles O eg and O that ae employed by AdV. IfAdV queies (Id, ep) o (P u,ep new), (AdV) b would esot to H.Ifthequeyhasaleadybeenonthe table, (AdV) b would etun the coesponding value; if not, (AdV) b wouldsamplea(id, ep) o (P u,ep new) and place it in H and etun it in the end. When AdV queies a eputation signatue included in (Id, ep) o (P u,ep new), (AdV) b fowads the quey to BB-signing oacle O BB and etuns the esponse. Afte sufficient queies, AdV challenges the challenge using (Id 0,ep 0 ), (Id 1,ep 1 ),o((p u ) 0,ep new 0 ), ((P u ) 1,ep new 1 ). (AdV) b extacts the pai (ep 0,ep 1 )o (ep new 0,ep new 1 )andchallengesthebb-signingchallenge. The BB-signing challenge picks a numbe b in {0, 1}. (AdV) b then etuns (C ep ) b o (C ep new ) b to AdV. AdV makes aguessofb andgivesittothebb-signingchallengethough (AdV) b.ifb = b, then not only does AdV have the ability to foge a eputation cetificate but also (AdV) b can foge a

12 12 Mathematical Poblems in Engineeing BB signatue. Accoding to the above mentioned method, we educe AdV to (AdV) b, and we conclude that if the BB signatue is secue, then the eputation cetificate cannot be foged. Veifiable Reputation means that the eputation indeed belongs to the authenticated use. If the advesay can foge a pseudonym and the pseudonym can pass veification by the while the DA cannot open the pseudonym o only open it as an unegisteed identity, then we conclude that the advesay is successful. This popety is guaanteed by Hidden Identity-Based (HIB) Signatues [25]. Definition 10. If a pobabilistic polynomial-time advesay AdV has the advantage AdVantage Ve (λ) = P[(PiVK Ve (λ) = 1) 1/2], which is negligible in λ, then one concludes that the eputation value is veifiable. The expeiment PiVK Ve (λ) is defined as follows: (i) The egiste andom oacle O eg povides AdV with a Use identity, eputation value, and eputation cetificate, and the pseudonym andom oacle O Id povides AdV with a Use pseudonym P u. AdV obtains the public paametes p,g,g,g T,e as descibed in the Envionment Initialization stage. (ii) AdV geneates the pai (Id 0,(C Id ) 0,ep 0 ) and (Id 1,(C Id ) 1,ep 1 ) and then gives it to the challenge. (iii) The challenge andomly selects b fom {0, 1}; that is, b {0,1}. Then, he calls (P u ) b Gen Pny(Id b,(c Id ) b,ep b ) to acquie the pseudonym (P u ) b. (iv) AdV gives a guess of b, and if b = b, 1 Authenticate((P u ) b,(c ep ) b ) and De Anonymity((P u ) b,sk DA ) hold, and then output is 1; othewise, output is 0. Now, we assume that an advesay (AdV) H is against the HIB signatue. Using thee andom oacles, namely, the egistation andom oacle RegOacle(Id), the Use identity andom oacle CouptOacle(Id), andthesignatueoacle SignOacle(Id, cet id,m), (AdV) H acquies the Use identity, identity cetificate, and the signatue of a message signed by the Use. Moeove, these thee andom oacles can simulate O eg and O Id.In[36], the andom oacle CouptOAOacle() was used fo disclosing a pseudonym to pefom a ciphe text attack. Howeve, in this pape, we assume that the DA is tustwothy. Theefoe, we simulate only a plaintext attack. If AdV can disclose a pseudonym, then (AdV) H must be able to beak the HIB signatue. Now, we begin the pocess of educing AdV to (AdV) H. (AdV) H emoves the pat elevant to eputation fom (Id 0,(C Id ) 0,ep 0 ) and (Id 1,(C Id ) 1,ep 1 ) povided by AdV andthenpoceedswiththehibsignatue pocess. Duing the authentication pocess, we maintain a constant challenge facto σ. The eputation was included when σ was geneated. By analyzing the Σ-potocol, we know that σ is andomly selected, so its value does not affect the final esult of authentication. Finally, (AdV) H takes σ as a pseudonym (P u ) b and etuns it to AdV. (P u ) b contains the infomation egading a Use identity. AdV gives a guess of b, and if AdV can successfully foge a pseudonym, then (AdV) H can cack the HIB signatue with the same pobability. Nonepudiation means that, unde any cicumstances, the Use must admit that the eputation that has been submitted belongs only to the Use, and, theefoe, egadless of how low the eputation value, the Use can neve deny owneship. If the advesay has the ability to foge a pseudonym and thedaopensittofindthatitcoespondstoalegitimate egisteed use identity, then we conclude that the advesay is successful. Definition 11. If a pobabilistic polynomial-time advesay AdV has the advantage AdVantage ne (λ) = P[(PiVK ne (λ) = 1) 1/2], which is negligible in λ, then one concludes that the eputation value has the popety of Nonepudiation. The expeiment PiVK ne (λ) is defined as follows: (i) AdV is given the public paametes p,g,g,g T,e as descibed in the Envionment Initialization stage. The egiste andom oacle O eg povides AdV with a Use identity, eputation value, and eputation cetificate. The pseudonym andom oacle O Id povides AdV with a Use pseudonym P u. (ii) AdV geneates (Id 0,(C Id ) 0,ep 0 ) and (Id 1,(C Id ) 1, ep 1 ) andthengivesittothechallenge. (iii) The challenge andomly selects b fom {0, 1}; that is, b {0,1}. Then, the challenge calls (P u ) b Gen Pny(Id b,(c Id ) b,ep b ) to acquie the pseudonym (P u ) b. (iv) AdV gives a guess b, and if b = b, 1 Authenticate((P u ) b,(c ep ) b ) and 1 De Anonymity((P u ) b,sk DA ) ae tue, and then output is 1; othewise, output is 0. The method that educes AdV to an advesay fo the HIB signatue is equivalent to the method used in the analysis of Veifiable Reputation. We theefoe omit the educing pocess Secue Anonymity. In addition to the afoementioned eputation secuity, it is necessay to conside the secuity of anonymity. To this end, we assume that the IdP is not safe;namely,itspivatekeyscanbeleaked.also,weassume that the IdP and can collude togethe to compomise anonymity. These assumptions comply with the actual situation, fo the IdP and may belong to the same institution. Howeve, in the Reputation Calculation pocess, we assume that pivate keys in the possession of the IdP cannot be leaked totheusebutcanbeleakedtothebecauseeputation is used to constain the Use, and the IdP and Use ae antithetical. Anonymity secuity includes the unlinkability not only between pseudonyms (denoted as P u -unlinkability) but also between a pseudonym and a Use Id (denoted as Id-P u - unlinkability). P u -unlinkability includes the unlinkability betweenthepseudonymsofthesameuseandtheunlinkability between the pseudonyms of diffeent uses.

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run End-to-End Qo Mapping and Aggegation fo electing Cloud evices Raed Kaim, Chen Ding, Ali Mii Depatment of Compute cience Ryeson Univesity, Toonto, Canada 2kaim@yeson.ca, cding@scs.yeson.ca, ali.mii@yeson.ca

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

CANCER, HEART ATTACK OR STROKE CLAIM FORM

CANCER, HEART ATTACK OR STROKE CLAIM FORM CANCER, HEART ATTACK OR STROKE CLAIM FORM Please ead the impotant infomation below: We suggest you make photocopies of any infomation sent fo you own ecods. Please be sue you policy numbe(s) is/ae witten

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Referral service and customer incentive in online retail supply Chain

Referral service and customer incentive in online retail supply Chain Refeal sevice and custome incentive in online etail supply Chain Y. G. Chen 1, W. Y. Zhang, S. Q. Yang 3, Z. J. Wang 4 and S. F. Chen 5 1,,3,4 School of Infomation Zhejiang Univesity of Finance and Economics

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

Improving Network Security Via Cyber-Insurance A Market Analysis

Improving Network Security Via Cyber-Insurance A Market Analysis 1 Impoving Netwok Secuity Via Cybe-Insuance A Maket Analysis RANJAN PAL, LEANA GOLUBCHIK, KONSTANTINOS PSOUNIS Univesity of Southen Califonia PAN HUI Hong Kong Univesity of Science and Technology Recent

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

DOCTORATE DEGREE PROGRAMS

DOCTORATE DEGREE PROGRAMS DOCTORATE DEGREE PROGRAMS Application Fo Admission 2015-2016 5700 College Road, Lisle, Illinois 60532 Enollment Cente Phone: (630) 829-6300 Outside Illinois: (888) 829-6363 FAX: (630) 829-6301 Email: admissions@ben.edu

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

On the Security of A Provably Secure Certificate Based Ring Signature Without Pairing

On the Security of A Provably Secure Certificate Based Ring Signature Without Pairing Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP.129-134, Ma. 2015 129 On the Secuity of A Povably Secue Cetificate Based Ring Signatue Without Paiing Ji Geng 1, Hu Xiong 1,2, Fagen Li 1, and Zhiguang

More information

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION Application Fom SECTION 1 COMPANY DETAILS New Company Yes No Company Name Tading As Pevious Company Name Email Addess Contact Numbe Tel Cell Fax Registeed Numbe Natue of Business Yea of Incopoation Yea

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency

More information

College of Engineering Bachelor of Computer Science

College of Engineering Bachelor of Computer Science 2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date

More information

LTI, SAML, and Federated ID - Oh My!

LTI, SAML, and Federated ID - Oh My! LTI, SAML, and Fedeated ID - Oh My! Chales Seveance, Ph.D. Stephen P Vickes IMS Global Leaning Consotium http://www.imsglobal.og/ Poblem Statement We need a way to align IMS Leaning Tools Inteopeability

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

DOCTORAL DEGREE PROGRAM

DOCTORAL DEGREE PROGRAM DOCTORAL DEGREE PROGRAM Application Fo Admission National Mose Cente fo Adult Leaning Cental Illinois: Benedictine Univesity at Spingfield 1500 Noth 5th Steet, Spingfield, IL 62702 Phone: (217) 718-5002

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary PCE SEMINIUM Z PODSTW ELEKTOTECHNIKI I TEOII OBWODÓW 8 - TH SEMIN ON FUNDMENTLS OF ELECTOTECHNICS ND CICUIT THEOY ZDENĚK BIOLEK SPŠE OŽNO P.., CZECH EPUBLIC DLIBO BIOLEK MILITY CDEMY, BNO, CZECH EPUBLIC

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Managing Card Compromises from the Issuer s Perspective

Managing Card Compromises from the Issuer s Perspective Managing Cad Compomises fom the Issue s Pespective Industy insides shae tips fo effectively managing mass compomises Numbe 60 June 2012 Lage-scale payment cad compomises and account data beaches continue

More information

A formalism of ontology to support a software maintenance knowledge-based system

A formalism of ontology to support a software maintenance knowledge-based system A fomalism of ontology to suppot a softwae maintenance knowledge-based system Alain Apil 1, Jean-Mac Deshanais 1, and Reine Dumke 2 1 École de Technologie Supéieue, 1100 Note-Dame West, Monteal, Canada

More information

Confirmation of Booking

Confirmation of Booking The Pesentes Rebecca Mogan Rebecca is a Taxation Consultant with the NTAA and has ove 15 yeas tax expeience. Rebecca holds a Bachelo of Ats and Law and a Mastes of Taxation. Rebecca has pesented a numbe

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

Attacking an obfuscated cipher by injecting faults

Attacking an obfuscated cipher by injecting faults Attacking an obfuscated ciphe by injecting faults Matthias Jacob mjacob@cs.pinceton.edu Dan Boneh dabo@cs.stanfod.edu Edwad Felten felten@cs.pinceton.edu Abstact We study the stength of cetain obfuscation

More information

How to Encrypt Properly with RSA

How to Encrypt Properly with RSA RSA Laboatoies CyptoBytes. Volume 5, No. 1 Winte/Sping 2002, pages 9 19. ow to Encypt Popely with RSA David Pointcheval Dépt d Infomatique, ENS CNRS, 45 ue d Ulm, 75230 Pais Cedex 05, Fance E-mail: David.Pointcheval@ens.f

More information

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifies: m SSN, name, Passpot # Intenet hosts, outes: m IP addess (32 bit) - used fo addessing datagams (in IPv4) m name, e.g., gaia.cs.umass.edu - used by humans

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

Unveiling the MPLS Structure on Internet Topology

Unveiling the MPLS Structure on Internet Topology Unveiling the MPLS Stuctue on Intenet Topology Gabiel Davila Revelo, Mauicio Andeson Ricci, Benoit Donnet, José Ignacio Alvaez-Hamelin INTECIN, Facultad de Ingenieía, Univesidad de Buenos Aies Agentina

More information

Integrating Net2 with an intruder alarm system

Integrating Net2 with an intruder alarm system Net AN035 Integating Net with an intude alam system Oveview Net can monito whethe the intude alam is set o uet If the alam is set, Net will limit access to valid uses who ae also authoised to uet the alam

More information

Development of Mathematical Model for Market-Oriented Cloud Computing

Development of Mathematical Model for Market-Oriented Cloud Computing Intenational Jounal of Compute Applications (0975 8887) Volume 9 No.11, Novembe 2010 Development of Mathematical Model fo Maket-Oiented Cloud Computing K.Mukhejee Depatment of Compute Science & Engineeing.

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS Highe Education Cente fo Alcohol and Othe Dug Abuse and Violence Pevention Education Development Cente, Inc. 55 Chapel Steet Newton, MA 02458-1060 COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

More information

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis Available online at www.sciencediect.com Pocedia Engineeing 41 (2012 ) 1360 1366 Intenational Symposium on Robotics and Intelligent Sensos 2012 (IRIS 2012) Modal Chaacteistics study of CEM-1 Single-Laye

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information