Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 9845426, 8 pages
https://doi.org/10.1155/2018/9845426
Research Article

Cloud Based Data Protection in Anonymously Controlled SDN

1Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China
2State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
3Department of Engineering Science, National Cheng Kung University, Tainan, Taiwan

Correspondence should be addressed to Chin-Feng Lai; gro.eeei@nofnic

Received 28 July 2017; Accepted 3 January 2018; Published 29 January 2018

Academic Editor: Iván García-Magariño

Copyright © 2018 Jian Shen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Cui, J. Song, M. Li, Q. Ren, Y. Zhang, and X. Cai, “SDN-based Big Data Caching in ISP Networks,” IEEE Transactions on Big Data, 2017. View at Publisher · View at Google Scholar
  2. J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloud-assisted urban data sharing framework for ubiquitous-cities,” Pervasive and Mobile Computing, 2017. View at Publisher · View at Google Scholar
  3. N. Feamster, J. Rexford, and E. Zegura, “The road to SDN: an intellectual history of programmable networks,” Computer Communication Review, vol. 44, no. 2, pp. 87–98, 2014. View at Publisher · View at Google Scholar
  4. P. Li, J. Li, Z. Huang, C.-Z. Gao, W.-B. Chen, and K. Chen, “Privacy-preserving outsourced classification in cloud computing,” Cluster Computing, pp. 1–10, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud data,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2401–2415, 2017. View at Publisher · View at Google Scholar
  6. J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute-based data sharing for resource-limited users in cloud computing,” Computers and Security, 2017. View at Publisher · View at Google Scholar
  7. P. Xiao, W. Qu, H. Qi, Z. Li, and Y. Xu, “The SDN controller placement problem for WAN,” IEEE International Conference on Communications in China, pp. 220–224, 2015. View at Google Scholar
  8. Z. Hu, M. Wang, X. Yan, Y. Yin, and Z. Luo, “A comprehensive security architecture for SDN,” in Proceedings of the 2015 18th International Conference on Intelligence in Next Generation Networks, ICIN 2015, pp. 30–37, IEEE, Paris, France, February 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. C.-F. Lai, M. Chen, J.-S. Pan, C.-H. Youn, and H.-C. Chao, “A collaborative computing framework of cloud network and WBSN applied to fall detection and 3-D motion reconstruction,” IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, pp. 457–466, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Tomovic, N. Prasad, and I. Radusinovic, “SDN control framework for QoS provisioning,” IEEE Telecommunications Forum Telfor, pp. 111–114, 2015. View at Google Scholar
  11. J. Shen, S. Chang, J. Shen, Q. Liu, and X. Sun, “A lightweight multi-layer authentication protocol for wireless body area networks,” Future Generation Computer Systems, 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. L. Cui, F. R. Yu, and Q. Yan, “When big data meets software-defined networking: SDN for big data and big data for SDN,” IEEE Network, vol. 30, no. 1, pp. 58–65, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. F. Zhang, R. Safavi-Naini, and W. Susilo, “An efficient signature scheme from bilinear pairings and its applications,” Lecture Notes in Computer Science, vol. 2947, no. 39, pp. 277–290, 2004. View at Google Scholar
  14. H. Lung, Y. Chuang, and C. Kuo, “A novel remote user authentication scheme from bilinear pairings via internet,” Wireless Personal Communications, vol. 83, no. 1, pp. 163–174, 2015. View at Google Scholar
  15. X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, “Verifiable computation over large database with incremental updates,” Institute of Electrical and Electronics Engineers. Transactions on Computers, vol. 65, no. 10, pp. 3184–3195, 2016. View at Google Scholar · View at MathSciNet
  16. J. Shen, S. Moh, and I. Chung, “Identity-Based key agreement protocol employing a symmetric balanced incomplete block design,” Journal of Communications and Networks, vol. 14, no. 6, pp. 682–691, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Herranz and G. Sáez, “Forking lemmas for ring signature schemes,” Journal of Management Studies, vol. 2904, no. 2, pp. 266–279, 2003. View at Google Scholar
  18. G. Han, L. Liu, S. Chan, R. Yu, and Y. Yang, “HySense: a hybrid mobile crowd sensing framework for sensing opportunities compensation under dynamic coverage constraint,” IEEE Communications Magazine, vol. 55, no. 3, pp. 93–99, 2017. View at Publisher · View at Google Scholar
  19. F. Zhang and K. Kim, “ID-based blind signature and ring signature from pairings,” Asiacrpt Lncs, vol. 2501, pp. 533–547, 2002. View at Google Scholar
  20. J. Herranz and G. Sáez, “New Identity-Based Ring Signature Schemes,” in Information and Communications Security, vol. 3269 of Lecture Notes in Computer Science, pp. 27–39, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004. View at Publisher · View at Google Scholar
  21. S. S. Chow, S. Yiu, and L. C. Hui, “Efficient Identity Based Ring Signature,” International Conference on Applied Cryptography and Network Security, vol. 3531, pp. 499–512, 2005. View at Publisher · View at Google Scholar
  22. G. Jia, G. Han, J. Jiang, and L. Liu, “Dynamic adaptive replacement policy in shared last-level cache of DRAM/PCM hybrid memory for big data storage,” IEEE Transactions on Industrial Informatics, vol. 13, no. 4, pp. 1951–1960, 2017. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu, and X. Sun, “Enhanced secure sensor association and key management in wireless body area networks,” Journal of Communications and Networks, vol. 17, no. 5, pp. 453–462, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. D. Boneh, “BLS Short Digital Signatures,” Encyclopedia of Cryptography and Security, pp. 49-50, 2011. View at Google Scholar
  25. J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block design-based key agreement for group data sharing in cloud computing,” IEEE Transactions on Dependable and Secure Computing, vol. PP, no. 99, 2017. View at Publisher · View at Google Scholar
  26. G. Wei, F. Li, and B. Xu, “An abuse-free optimistic fair exchange protocol based on BLS signature,” in Proceedings of the 2008 International Conference on Computational Intelligence and Security, CIS 2008, pp. 278–282, Suzhou, China, December 2008. View at Scopus
  27. G. Han, W. Que, G. Jia, and W. Zhang, “Resource-utilization-aware energy efficient server consolidation algorithm for green computing in IIOT,” Journal of Network and Computer Applications, 2017. View at Publisher · View at Google Scholar · View at Scopus
  28. T. Ma, Y. Zhang, J. Cao et al., “KDVEM: a k-degree anonymity with vertex and edge modification algorithm,” Computing, vol. 97, no. 12, pp. 1165–1184, 2015. View at Publisher · View at Google Scholar · View at Scopus
  29. L. I. Xin, H. Y. Liu, M. A. Hui-Ran, and X. G. Cheng, “Group signature scheme based on BLS short signature,” Journal of Qingdao University, 2011. View at Google Scholar
  30. J. Zhang, Y. He, and X. Li, “Cryptanalysis and improvement of two verifiable sing signature schemes,” Computer Engineering and Applications, vol. 52, no. 8, pp. 115–119, 2016. View at Google Scholar
  31. X. Li, X. Liang, K. Liu, and S. Pan, “Analysis and improvement of verifiable ring signature schemes,” Journal of Computer Applications, vol. 32, no. 12, pp. 3466–3469, 2012. View at Google Scholar