About the editors |
|
xiii | |
Preface |
|
xv | |
|
1 Privacy preserving in big data |
|
|
1 | (26) |
|
|
|
|
1 | (6) |
|
1.1.1 Tabular data attack |
|
|
1 | (2) |
|
|
3 | (2) |
|
1.1.3 Location privacy attack |
|
|
5 | (1) |
|
1.1.4 Attacks for other applications |
|
|
6 | (1) |
|
|
7 | (7) |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.2.3 Differential privacy |
|
|
9 | (4) |
|
|
13 | (1) |
|
|
14 | (5) |
|
|
14 | (2) |
|
|
16 | (2) |
|
1.3.3 Indistinguishability |
|
|
18 | (1) |
|
|
19 | (8) |
|
|
19 | (8) |
|
2 Privacy-preserving analysis for big data using cryptographic tools |
|
|
27 | (20) |
|
|
2.1 Privacy-preserving data analysis |
|
|
28 | (2) |
|
2.1.1 Security model of privacy-preserving data analysis |
|
|
28 | (2) |
|
2.2 Encryption schemes with special properties |
|
|
30 | (4) |
|
2.2.1 Deterministic encryption and keyword search |
|
|
30 | (1) |
|
2.2.2 Order preserving encryption and range query |
|
|
31 | (1) |
|
2.2.3 Scalar-product-preserving encryption and nearest neighbor query |
|
|
32 | (1) |
|
2.2.4 Searchable symmetric encryption |
|
|
33 | (1) |
|
2.3 Schemes based on secure computation |
|
|
34 | (5) |
|
|
34 | (1) |
|
2.3.2 Scalability of secure computation |
|
|
35 | (1) |
|
2.3.3 Secure computation on top of ORAM |
|
|
36 | (3) |
|
2.4 Features of reviewed solutions |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (6) |
|
|
42 | (5) |
|
3 Big data security in Internet of Things |
|
|
47 | (20) |
|
|
|
|
|
47 | (9) |
|
3.1.1 Wireless sensor network |
|
|
49 | (1) |
|
|
50 | (3) |
|
|
53 | (3) |
|
|
56 | (6) |
|
|
58 | (1) |
|
|
59 | (1) |
|
3.2.3 Monitoring and auditing |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (5) |
|
|
63 | (4) |
|
4 A watermark-based in situ access-control model for image big data |
|
|
67 | (22) |
|
|
|
|
|
|
67 | (1) |
|
|
68 | (2) |
|
|
70 | (2) |
|
|
72 | (4) |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (6) |
|
|
76 | (1) |
|
4.5.2 Hierarchical key-role-area access-control model |
|
|
76 | (3) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (2) |
|
4.6 Security and performance analysis |
|
|
82 | (1) |
|
|
82 | (1) |
|
4.6.2 Performance analysis |
|
|
83 | (1) |
|
|
83 | (6) |
|
|
84 | (1) |
|
|
85 | (4) |
|
5 Blockchain-based security and access control for BIM big data |
|
|
89 | (32) |
|
|
|
|
|
5.1 bcBIM: a blockchain-based big data model for BIM modification audit and provenance in mobile cloud |
|
|
89 | (16) |
|
|
89 | (1) |
|
|
90 | (2) |
|
5.1.3 Problem formulation |
|
|
92 | (3) |
|
|
95 | (5) |
|
5.1.5 Example---public blockchain bcBIM |
|
|
100 | (1) |
|
5.1.6 Example---private blockchain bcBIM |
|
|
100 | (2) |
|
5.1.7 Security analysis and performance analysis |
|
|
102 | (2) |
|
|
104 | (1) |
|
5.2 CaACBIM: a context-aware access control model for BIM |
|
|
105 | (16) |
|
|
105 | (1) |
|
|
106 | (1) |
|
5.2.3 Problem formulation |
|
|
107 | (1) |
|
|
108 | (6) |
|
5.2.5 Security and performance analysis |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Data availability statement |
|
|
116 | (1) |
|
|
116 | (5) |
|
6 Security of marine-information system |
|
|
121 | (14) |
|
|
|
6.1 Background and significance of marine information security |
|
|
121 | (1) |
|
6.2 The characteristics and design objective of marine-information system |
|
|
122 | (1) |
|
6.3 Marine information security risk analysis |
|
|
123 | (1) |
|
6.4 Analysis on marine-information system security demand |
|
|
124 | (1) |
|
6.4.1 Wireless network communication security |
|
|
124 | (1) |
|
6.4.2 Marine data security |
|
|
125 | (1) |
|
6.4.3 Marine-information-sharing security |
|
|
125 | (1) |
|
6.4.4 Marine-information-systematization security |
|
|
125 | (1) |
|
6.5 Marine information security system |
|
|
125 | (2) |
|
6.5.1 Marine communication and network security |
|
|
126 | (1) |
|
6.5.2 Marine system computing environment security |
|
|
126 | (1) |
|
6.5.3 Big marine data and application security |
|
|
126 | (1) |
|
6.5.4 Marine-information-sharing security |
|
|
127 | (1) |
|
6.5.5 Marine security monitoring and forewarning mechanism |
|
|
127 | (1) |
|
6.5.6 Marine security infrastructure |
|
|
127 | (1) |
|
6.6 Key security theory and technology |
|
|
127 | (6) |
|
6.6.1 Password and security protocol |
|
|
128 | (3) |
|
6.6.2 Intrusion detection |
|
|
131 | (1) |
|
6.6.3 Data backup and recovery technology |
|
|
132 | (1) |
|
6.7 Marine information security development trend and discussion |
|
|
133 | (2) |
|
|
134 | (1) |
|
7 A layered security architecture based on cyber kill chain against advanced persistent threats |
|
|
135 | (22) |
|
|
|
|
|
|
|
|
135 | (1) |
|
7.2 Driven defensive model (course of actions) |
|
|
136 | (3) |
|
|
139 | (5) |
|
7.3.1 Mitigation for each phase of CKC model |
|
|
139 | (5) |
|
7.4 Mapping 7D, CKC and APT actors activities |
|
|
144 | (7) |
|
|
151 | (6) |
|
|
151 | (6) |
|
8 Privacy-aware digital forensics |
|
|
157 | (40) |
|
|
|
|
|
157 | (2) |
|
|
159 | (7) |
|
8.2.1 Evolution of digital forensics |
|
|
160 | (2) |
|
8.2.2 Digital forensics rules |
|
|
162 | (2) |
|
8.2.3 Digital forensics challenges |
|
|
164 | (2) |
|
|
166 | (6) |
|
8.3.1 Evolution of digital privacy |
|
|
166 | (1) |
|
|
167 | (4) |
|
8.3.3 Privacy challenges in digital forensics |
|
|
171 | (1) |
|
8.4 Law, privacy and digital forensics |
|
|
172 | (2) |
|
8.5 Privacy-aware computer forensics |
|
|
174 | (5) |
|
|
174 | (3) |
|
|
177 | (2) |
|
8.6 Privacy-aware network forensics |
|
|
179 | (6) |
|
|
180 | (2) |
|
|
182 | (2) |
|
8.6.3 Browser and applications |
|
|
184 | (1) |
|
8.7 Beyond computer and network forensics |
|
|
185 | (3) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
8.8 Conclusions and final remarks |
|
|
188 | (9) |
|
|
190 | (7) |
|
9 A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges |
|
|
197 | (16) |
|
|
|
197 | (2) |
|
9.2 Basic concepts and models for trust, trustworthiness and trustworthy computing |
|
|
199 | (7) |
|
9.2.1 Characteristics of trust, trustworthiness and trustworthy computing |
|
|
201 | (1) |
|
9.2.2 Trust, trustworthy and trustworthiness modelling |
|
|
202 | (4) |
|
9.3 Trustworthy evaluation and prediction |
|
|
206 | (1) |
|
|
207 | (1) |
|
9.4.1 Trust-free vs. trust building |
|
|
207 | (1) |
|
9.4.2 Blockchain as a factor of trust |
|
|
208 | (1) |
|
9.5 Conclusions and future research |
|
|
208 | (5) |
|
|
209 | (4) |
|
10 Software-defined mobile networks security |
|
|
213 | (26) |
|
|
|
10.1 The evolution of software-defined mobile network |
|
|
213 | (1) |
|
|
214 | (5) |
|
10.2.1 Network function virtualization |
|
|
215 | (3) |
|
|
218 | (1) |
|
10.3 SDMN security issues |
|
|
219 | (4) |
|
10.3.1 SDN original security issues |
|
|
219 | (2) |
|
10.3.2 Special security issues in SDMN |
|
|
221 | (2) |
|
10.4 SDMN security measures |
|
|
223 | (8) |
|
|
225 | (2) |
|
10.4.2 Control plane attack |
|
|
227 | (1) |
|
10.4.3 Application plane attack |
|
|
228 | (1) |
|
10.4.4 Attack at the communication protocols |
|
|
228 | (1) |
|
10.4.5 Category and analysis of STRIDE |
|
|
229 | (1) |
|
10.4.6 SDMN security challenges |
|
|
230 | (1) |
|
|
231 | (8) |
|
|
231 | (8) |
|
11 Dynamic public opinion evolvement modeling and supervision in social networks |
|
|
239 | (24) |
|
|
|
|
239 | (2) |
|
11.1.1 No combined analysis model for public opinion in social networks |
|
|
240 | (1) |
|
11.1.2 Dynamic challenge for public opinion sampling and inspection |
|
|
240 | (1) |
|
11.1.3 Time efficiency for public opinion supervision |
|
|
241 | (1) |
|
|
241 | (2) |
|
11.2.1 Evolvement based on topo discovery and graph structure change |
|
|
241 | (1) |
|
11.2.2 Evolvement based on influence analysis |
|
|
242 | (1) |
|
11.2.3 Evolvement based on sentiment an(LNLP |
|
|
242 | (1) |
|
11.3 Dynamic public opinion evolvement modeling |
|
|
243 | (7) |
|
11.3.1 System model and definitions |
|
|
243 | (5) |
|
11.3.2 Conditional optimization problems in dynamic public opinion evolvement |
|
|
248 | (2) |
|
11.4 Evolvement of public opinion and supervision |
|
|
250 | (2) |
|
11.4.1 Preparation algorithms |
|
|
250 | (1) |
|
11.4.2 Evolvement and supervision algorithms |
|
|
250 | (2) |
|
|
252 | (7) |
|
11.5.1 Datasets and environment |
|
|
252 | (2) |
|
11.5.2 Parameters (μ, λ, ε(t)) |
|
|
254 | (2) |
|
11.5.3 OC--SA optimization performance in TTSN evolvement effectiveness |
|
|
256 | (3) |
|
|
259 | (4) |
|
|
260 | (1) |
|
|
260 | (3) |
|
12 Privacy verification of PhotoDNA based on machine learning |
|
|
263 | (18) |
|
|
|
|
|
263 | (2) |
|
|
265 | (1) |
|
|
265 | (1) |
|
12.4 Content-based image classification |
|
|
265 | (2) |
|
12.4.1 Feature-descriptor-based image classification |
|
|
266 | (1) |
|
12.4.2 CNN-based image classification |
|
|
266 | (1) |
|
12.5 Encryption-based image classification |
|
|
267 | (2) |
|
|
269 | (4) |
|
12.6.1 Experimental framework |
|
|
269 | (1) |
|
12.6.2 PhotoDNA hash values dataset |
|
|
270 | (3) |
|
|
273 | (3) |
|
|
276 | (1) |
|
|
277 | (4) |
|
|
277 | (4) |
|
13 Chaos-based communication systems |
|
|
281 | (22) |
|
|
13.1 Cryptography and chaos |
|
|
281 | (1) |
|
13.2 Continuous chaotic systems |
|
|
282 | (5) |
|
13.2.1 Chua's chaotic system |
|
|
282 | (1) |
|
13.2.2 Lorentz chaotic system |
|
|
283 | (2) |
|
13.2.3 Chen's chaotic system |
|
|
285 | (1) |
|
13.2.4 Lii chaotic system |
|
|
285 | (2) |
|
13.3 Chaotic secure communication and its application in optical communication |
|
|
287 | (2) |
|
13.3.1 The design of chaotic secure communication |
|
|
287 | (2) |
|
13.4 Optic chaotic communication |
|
|
289 | (14) |
|
13.4.1 Ikeda-delayed chaotic system |
|
|
289 | (1) |
|
13.4.2 A chaotic system with suppressed time-delay signature based on multiple electro-optic nonlinear loops |
|
|
290 | (1) |
|
|
291 | (2) |
|
13.4.4 Time-delay signature suppression |
|
|
293 | (3) |
|
13.4.5 Synchronization scheme |
|
|
296 | (4) |
|
|
300 | (3) |
Index |
|
303 | |