دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Jaideep Vaidya (editor), Xiao Zhang (editor), Jin Li (editor) سری: ISBN (شابک) : 3030373363, 9783030373368 ناشر: Springer سال نشر: 2020 تعداد صفحات: 613 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 34 مگابایت
در صورت تبدیل فایل کتاب Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I (Lecture Notes in Computer Science, 11982) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ایمنی و امنیت فضای سایبری: یازدهمین سمپوزیوم بین المللی، CSS 2019، گوانگژو، چین، 1 تا 3 دسامبر 2019، مجموعه مقالات، قسمت اول (یادداشت های سخنرانی در علوم کامپیوتر، 11982) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
دو جلد LNCS 11982 و 11983 مجموعه مقالات یازدهمین
سمپوزیوم بین المللی ایمنی و امنیت فضای مجازی، CSS 2019، در
گوانگژو، چین، در دسامبر 2019 برگزار شد.
61 مقاله کامل و 40 مقاله کوتاه ارائه شده است. به دقت بررسی و از
بین 235 مورد ارسالی انتخاب شد. این مقالات طیف وسیعی از موضوعات
را در زمینه ایمنی و امنیت فضای سایبری، مانند احراز هویت، کنترل
دسترسی، در دسترس بودن، یکپارچگی، حریم خصوصی، محرمانگی، قابلیت
اطمینان و پایداری فضای سایبری پوشش میدهند. آنها در بخش های
موضوعی زیر سازماندهی شده اند: امنیت شبکه. امنیت سیستم؛ امنیت
اطلاعات؛ حفظ حریم خصوصی؛ یادگیری ماشین و امنیت؛ امنیت فضای
مجازی؛ داده های بزرگ و امنیت؛ و ابر و امنیت؛
The two volumes LNCS 11982 and 11983 constitute the
proceedings of the 11th International Symposium on Cyberspace
Safety and Security, CSS 2019, held in Guangzhou, China, in
December 2019.
The 61 full papers and 40 short papers presented were carefully
reviewed and selected from 235 submissions. The papers cover a
broad range of topics in the field of cyberspace safety and
security, such as authentication, access control, availability,
integrity, privacy, confidentiality, dependability and
sustainability issues of cyberspace. They are organized in the
following topical sections: network security; system security;
information security; privacy preservation; machine learning
and security; cyberspace safety; big data and security; and
cloud and security;
Preface Organization Contents – Part I Contents – Part II Network Security Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm Abstract 1 Introduction 2 The Analysis of Zoe Algorithm 3 The Sequence Coverage Similarity Algorithm 4 ICS Anomaly Detection Based on Improved Zoe Algorithm 5 Analysis of Experimental Simulation Results 5.1 Evaluation Criteria 5.2 Datasets 5.3 Experimental Results and Analysis 6 Summary and Outlook Acknowledgements References An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application Abstract 1 Introduction 2 Overview of CNN-Based Intrusion Detection Algorithms 3 Intrusion Detection Method Based on Hierarchical Feature Learning 4 Experimental Results and Performance Analysis 4.1 Data Sets and Evaluation Indicators 4.2 Experimental Results 5 Conclusions and Future Work Acknowledgements References Spoofing Attack Detection for Radar Network System State Estimation Abstract 1 Introduction 2 Preliminaries 2.1 Radar Measurement and State Estimation 2.2 Spoofing Attacks 3 Attack Detection Principles and Methods 4 Data Fusion 5 Simulation 6 Conclusion References Survey of Network Security Situational Awareness 1 Introduction 2 Overview of Network Security Situational Awareness 3 Functions of Network Security Situational Awareness 3.1 Extraction of Network Security Situation Elements 3.2 Evaluation of Network Security Situation 3.3 Prediction of Network Security Situation 4 Development Trend of Network Security Situational Awareness 5 Conclusion References Encrypting VoLTE Communication via Baseband Firmware Extension Abstract 1 Introduction 2 Related Works 2.1 HOOK 2.2 VoLTE and RTP 3 Encryption Design 3.1 Key Agreement 3.2 Encryption Algorithm 4 Hooking and Patching Framework 5 Implement 5.1 Hook Packet Sending and Receiving Functions 5.2 Encryption and Decryption 6 Results and Analysis 6.1 Agreement Key 6.2 Data Encryption and Decryption 6.3 Performance Evaluation 7 Conclusions Acknowledgment References Mitigating Link-Flooding Attack with Segment Rerouting in SDN 1 Introduction 2 Background and Related Work 2.1 Link-Flooding Attack 2.2 SDN and Segment Routing 2.3 Previous Studies on LFA Defense 3 System Model 4 Segment Rerouting 5 Performance Evaluation 6 Conclusion References System Security BQSV: Protecting SDN Controller Cluster\'s Network Topology View Based on Byzantine Quorum System with Verification Function 1 Introduction 2 Preliminaries 2.1 Background 2.2 Threat Model 3 Byzantine Quorum System with Verification Function 3.1 Verification Function 3.2 The Effectiveness of BQSV 3.3 Detail Process Steps 4 Implementation and Experiment 4.1 Implementation 4.2 Experiments 5 Related Work 6 Conclusion References A Data Protection Scheme via Isolating Android Partitions Abstract 1 Introduction 2 Related Works 2.1 Encryption Solution 2.2 Security Domain Solution 3 Design 3.1 Summary 3.2 Performance Overhead 3.3 The Isolation Between Normal and Private Zone 3.4 The Switch Between Normal and Private Zone 4 Implementation 4.1 Configuration of TF Card 4.2 Switching the States 4.3 Encryption of Private Zone 5 Evaluation 5.1 Test Results 5.2 Performance Evaluation 5.3 The Speed of Switching Evaluation 5.4 Security Evaluation 5.5 Performance Evaluation of Different TF Cards 6 Limitation and Future Work 7 Conclusions Acknowledgment References A Code Protection Scheme via Inline Hooking for Android Applications Abstract 1 Introduction 2 Background 2.1 Dex File Structure 2.2 Android Hook Framework 3 Scheme 3.1 Instructions Extraction 3.2 Instructions Storage 3.3 Instructions Restoration 4 Experiment 4.1 Configure and Use Hooking Framework in the Project 4.2 Process and Install APK 4.3 Evaluation 5 Conclusion Acknowledgment References Log-Based Control Flow Attestation for Embedded Devices 1 Introduction 2 Background and Related Work 2.1 Remote Attestation 2.2 ARM Architecture 2.3 TrustZone 2.4 Physical Unclonable Functions 3 Threat Model and Assumption 4 Design 4.1 Design Overview 4.2 Design Details 5 Implementation 5.1 Architecture 5.2 Instrumentation 5.3 Optimization 5.4 OP-TEE Integration 6 Evaluation 6.1 Experimental Setup 6.2 Log Length 6.3 Performance 7 Security 7.1 Code Injection Attack 7.2 Code Reuse Attack 8 Conclusion References A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry Data Abstract 1 Introduction 2 Theory of Retrieving {\\varvec K}_{{\\varvec d}} from ALB Dataset 3 Experiments 3.1 Optech Aquarius System and Dataset 3.2 Calculation 3.3 Validation 4 Conclusion Acknowledgments References Shuffle Dense Networks for Biometric Authentication 1 Introduction 2 Related Work 2.1 Dense Connections 2.2 Residual Learning 2.3 Grouped Convolutions 3 Method 3.1 Dense Connections with Residual Learning 3.2 Shuffle Dense Connections 3.3 Network Structure 4 Experiments 4.1 Datasets and Metrics 4.2 Implementation Details 4.3 Study of the Shuffle Operation 4.4 Comparison with Other Methods 5 Conclusion References Information Security An Efficient Attribute Based Encryption Scheme in Smart Grid Abstract 1 Introduction 2 Preliminaries 2.1 Bilinear Maps 2.2 Complexity Assumptions 2.3 Security Model 3 Description of Our System 3.1 System Model 3.2 Basic Scheme 3.3 Enhanced Scheme 4 Security Analysis 5 Performance Evaluation Acknowledgment References Attribute-Based Signatures for Inner-Product Predicate from Lattices 1 Introduction 2 Preliminaries 2.1 Attribute-Based Signatures for IP Predicate 2.2 Background on Lattices 3 The Underlying Interactive Protocol 3.1 Some Sets and Matrices 3.2 Some Techniques 3.3 The Underlying Protocol 4 The ABS-IP Scheme from Lattices 4.1 Description of the Scheme 4.2 Analysis of the Scheme References Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps 1 Introduction 1.1 Related Work 1.2 Our Contributions 1.3 Organization 2 Preliminaries 2.1 Notations 2.2 Fuzzy Extractor 2.3 Chebyshev Chaotic Map 2.4 Network Model 2.5 Requirements 3 Review of Han et al.\'s Scheme 3.1 Registration Phase 3.2 Login and Authentication Phase 3.3 Password and Biometric Change Phase 4 Security Weaknesses of Han et al.\'s Scheme 4.1 Lack of Protection of User Anonymity 4.2 Flaws in the Validation of Timestamp 5 Proposed Scheme 5.1 Registration Phase 5.2 Login and Authentication Phase 5.3 Password and Biometric Change Phase 6 Analysis 6.1 Proof of Authentication and Key Agreement Using BAN Logic 6.2 Security Analysis Against Various Attacks 7 Comparison of Our Scheme with Related and Recently Proposed Schemes 8 Conclusion References Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption 1 Introduction 2 Related Work 3 System Model 3.1 The Model of LC Accessing RC 3.2 The Model of RC Accessing LC 4 Construction of Our Proposed Scheme for Controllers in HSDN 4.1 Algorithm Model of CP-ABE-IA 4.2 Algorithm Model of KP-ABSC-MAS 5 Conclusion References ECC2: Error Correcting Code and Elliptic Curve Based Cryptosystem 1 Introduction 2 Preliminaries 2.1 Linear Codes and Code-Based Cryptography 2.2 Algebraic Geometry Codes and List Decoding Algorithms 2.3 Hard Problems on Elliptic Codes 3 McEliece Based Cryptosystem from Elliptic Codes 3.1 Generate Elliptic Codes 3.2 The Basic Scheme: ECC2 3.3 Transform to Key Encapsulation Mechanism 4 Security and Efficiency 4.1 IND-CPA 4.2 Known Attacks 4.3 Proposition of Parameters 5 Efficiency Analysis 6 Conclusion References A New Provably Secure Identity-Based Multi-proxy Signature Scheme Abstract 1 Introduction 2 Preliminaries 2.1 Bilinear Pairings 2.2 Computational Assumption 3 Definition and Security Model of Identity-Based Multi-proxy Signature 3.1 Definition of Identity-Based Multi-proxy Signature 3.2 Security Model of Identity-Based Multi-proxy Signature 4 Identity-Based Multi-proxy Signature Scheme 5 Analysis of Our Scheme 5.1 Correctness 5.2 Security Proof of Our Scheme 5.3 Efficiency Comparison 6 Conclusion Acknowledgements References Privacy Preservation A Differentially Private Trajectory Publishing Mechanism Based on Stay Points 1 Introduction 2 Preliminaries 2.1 Trajectory and Stay Points 2.2 Differential Privacy 2.3 TF-IDF 2.4 Data Availability 3 Differentially Private Trajectory Publication Mechanism Based on Stay Points 3.1 Differentially Private Stay Points Selection 3.2 Two-Dimensional Laplacian-Based Trajectory Publication 3.3 Algorithm Analysis 4 Experiments 4.1 Experiment Setup 4.2 Availability Evaluation 5 Conclusion References Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity Abstract 1 Introduction 1.1 Risks of Medical Data Sharing and Data Privacy Protection Method of Medical Alliance Chain Based on K-Anonymity and QLDS 2 Algorithm 2.1 Symbolic Description 2.2 Algorithm Description 3 Experiment 3.1 Experimental Results and Analysis 3.2 Energy Consumption Analysis 4 Conclusion Acknowledgements References IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors 1 Introduction 2 Approach 2.1 Scenarios 2.2 Requirements 2.3 Approach 2.4 The Processing Steps of Data Encryption Algorithm 3 System Design and Implementation 3.1 Key Generation 3.2 IoT Device Requests Invisible Membrane 3.3 Cloud Generates Invisible Membrane 3.4 Invisible Membrane Encryption 3.5 Decrypt Image 4 Performance Analyses 5 Conclusion References Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain 1 Introduction 2 A New RSA Blind Signature Scheme 2.1 RSA Blind Signature Scheme 3 Fair Contract Signing Protocol 3.1 Fair Contract Signing Protocol 3.2 Performance Evaluation 4 Conclusions References Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks Abstract 1 Introduction 2 System Model 3 Solution 3.1 System Initialization 3.2 Certificate Distribution for RSUs 3.3 Certificate Distribution of Vehicles 3.4 Secure Group Key Distribution and Batch Authentication 3.5 Periodic Update of Group Key 4 Cooperative Certification 5 Safety Analysis 6 Conclusion Acknowledgment References Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing 1 Introduction 2 Related Works 3 Virtual Vehicle Shadow Based Cooperative Privacy Preservation Scheme 3.1 System Initialization 3.2 Predictive Location Based Privacy Preservation for the Moving Vehicles 3.3 Segmented Secret Based Privacy Preservation for the Parked Vehicles 4 Security and Performance Analysis 4.1 Security Analysis 4.2 Performance Analysis 5 Conclusions References Machine Learning and Security DeT: Defending Against Adversarial Examples via Decreasing Transferability 1 Introduction 2 Background 2.1 Threat Model 2.2 Deep Neural Networks 2.3 Adversarial Examples 2.4 Common Attacks 2.5 Common Defenses 3 Our Defense Method 3.1 Preliminary Denoising 3.2 Random Sampling 3.3 Twice Denoising 3.4 Prediction Voting 4 Evaluation 4.1 Setup 4.2 Effectiveness of Cross Training 4.3 Evaluation Against Black Box Attacks 4.4 Evaluation Against the Gray Box Attack 4.5 Comparison with the State-of-the-Art Defense 5 Conclusion References ADS-B Data Attack Detection Based on Generative Adversarial Networks 1 Introduction 2 Related Work 2.1 ADS-B 2.2 Novelty Detection with GAN 3 Attack Detection Model 3.1 ADS-B Data Model 3.2 GAN Model 3.3 Attack Behavior Analysis 4 Experiment Analysis 5 Discussion 6 Conclusion References Stealthy and Sparse False Data Injection Attacks Based on Machine Learning Abstract 1 Introduction 2 State Estimation and LR Based FDI Attacks 2.1 State Estimation 2.2 LR Based FDI Attacks 3 FDI Attacks Based on RLR 4 Results and Discussion 4.1 Test System 4.2 Simulations Analysis 5 Conclusion References Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve 1 Introduction 2 Related Works and Background 2.1 Related Works 2.2 Background 3 Proposed End-to-End System 3.1 Attack Phase 3.2 Detection Phase 4 Implementation and Results 4.1 Datasets 4.2 Implementation 4.3 Results 5 Conclusion References An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant Abstract 1 Introduction 2 Database (PBSD) Construction 3 Speaker Recognition Test 3.1 Feature Extraction and Model Training 3.2 Voice Aging 3.3 Cold-Suffering Voice 4 Model Updating Strategy 4.1 Cold/Healthy Voices Discrimination 4.2 Cold–Based Speaker Recognition Phrase 4.3 Experimental Results 5 Conclusion Acknowledgment References Evading PDF Malware Classifiers with Generative Adversarial Network Abstract 1 Introduction 2 Background 2.1 PDF Structure 2.2 MalGAN 3 Scheme 3.1 Feature Extraction 3.2 Training GANs for Generating Adversarial Vectors 3.3 Crafting Adversarial PDF Malware Examples 4 Experiment 4.1 Datasets 4.2 Classifiers 4.3 GAN Models 4.4 Results 5 Related Works 6 Conclusion Acknowledgment References Cyberspace Safety Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning Abstract 1 Introduction 2 Related Work 3 Multi-dimensional Feature Set for Cyberbullying Detection 3.1 Feature Set Layer Structure 3.2 Feature Set Dimension Structure 4 Cyberbullying Detection Using the Proposed Multi-dimensional Feature Set 4.1 Machine Learning Models for Cyberbullying Detection 4.2 Dataset Collection 4.3 Dataset Screening 4.4 Dataset Preparation 4.5 Classification 5 Experimental Results 6 Conclusions and Future Work References Another Look at a Proposed Cubic Chaotic Mapping Abstract 1 Introduction 2 A Cubic Chaotic Mapping Revisited 3 A Simple Pseudorandom Bit Generator 4 Conclusion Acknowledgments References Research on Drug Regulation Mode in the Age of the Internet of Things Abstract 1 An Overview of the Internet of Things 1.1 The Concept of the Internet of Things 1.2 Features of the Internet of Things 1.3 The Application of the Internet of Things in Domestic Related Fields 2 A Summary of China’s Drug Regulatory Code 2.1 The Definition of China’s Drug Regulatory Code Network 2.2 The Basic Form of Drug Electronic Regulatory Code 2.3 The Theory of the Internet of Drug Supervision and Code in China 3 The Significance of the Internet of Things Technology in the Electronic Supervision of Drugs 3.1 Realize Real-Time Monitoring and Guarantee the Quality and Safety of Drug Circulation 3.2 Realizing the Effective Tracking of the Whole Process of Drug Circulation 3.3 Enriching the Content of Drug Supervision and Improving the Ability of Drug Regulation 3.4 Greatly Simplifying the Work of Pharmaceutical Enterprises and Improving the Efficiency of Drug Electronic Supervision 4 New Model of Drug Regulation in the Era of Internet of Things 4.1 Electronic Supervision in the Field of Drug Circulation 4.2 Drug Electronic Supervision Under the Technology of Internet of Things 5 Construction of China’s Drug Safety Supply Chain Supervision Model 5.1 Non Supply Chain Drug Safety Supervision Model and Existing Problems 5.2 Construction of Regulatory Model of Drug Safety Supply Chain in China 5.3 Characteristics of the Mode of Drug Safety Supply Chain Supervision 6 Discussion of Potential Problems 6.1 Stability of Work Platform 6.2 Data Security Problem 7 Conclusion Acknowledgement References Privacy-Aware Service Migration for Edge Computing in Urban Cities 1 Introduction 2 Related Work 3 System Model and Problem Formulation 3.1 Resource Model 3.2 Load Balance Analysis of ENs 3.3 Transmission Time Analysis 3.4 Privacy Entropy Analysis 3.5 Problem Definition 4 A Privacy-Aware Service Migration Method for Edge Computing in Urban Cities 4.1 Encoding 4.2 Fitness Functions and Constraints 4.3 Initialization 4.4 Selection 4.5 Crossover and Mutation 4.6 Schedule Selection Using SAW and MCDM 4.7 Method Review 5 Experiment Evaluation 5.1 Experimental Context 5.2 Performance Evaluation 6 Conclusion and Future Work References A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR Abstract 1 Introduction 2 Preliminaries 2.1 Trapdoor Hash Function 2.2 System Model 3 Certificateless Aggregate Signature Scheme Based on Multi-trapdoor Hash Function 4 Efficiency Analysis 5 Conclusion Acknowledgments References The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social Development Abstract 1 Introduction 2 Fuzzy Integral 2.1 Fuzzy Measure 2.2 Fuzzy Integral of Fuzzy Measure 2.3 Fuzzy Distribution Function 2.4 Constructing the Value of gλ 2.5 Algorithm Process 3 Fuzzy Integral Evaluation Method 3.1 Determine the Evaluation Index 3.2 Determine the Satisfaction of Each Factor and the Weight Distribution of Each Factor Among the Evaluated Objects 3.3 Ascertain the Evaluation Value of the Complex Development Level of the Society 3.4 The Experiment 4 Conclusions Acknowledgement References Big Data and Security Big Data Based E-commerce Search Advertising Recommendation 1 Introduction 2 Architecture of Search Advertising System 3 Data Preparation 4 Basic Process of Search Advertising Recommendation 5 Experiments and Analysis 6 Conclusion References File Recovery of High-Order Clearing First Cluster Based on FAT32 Abstract 1 Introduction 2 Related Work 3 Theory of File Deletion and Recovery of FAT32 3.1 FAT32 File System 3.2 Fragmentation 3.3 File Identification 3.4 Analysis of File Deletion Operations 4 The Proposed Algorithm of High-Order Clearing First Cluster Based on FAT32 4.1 Recover Methods of High Level Clearing 4.2 The Proposed Algorithm 5 Experimental Results and Analysis 6 Conclusion Acknowledgements References Mobile Recommendation Method for Fusing Item Features and User Trust Relationship Abstract 1 Introduction 2 Related Research Work 3 Mobile Recommendation Algorithm Based on EMD 3.1 Similarity Calculation of Mobile Users Based on EMD 3.2 The Trust Relation of Mobile Users 3.3 Score Prediction 3.4 Recommended Process Description 4 Experiment and Analysis 4.1 Experimental Data Set 4.2 Evaluation 4.3 Experimental Results and Analysis 5 Conclusion Acknowledgment References Research on Collaborative Filtering Recommendation Method Based on Context and User Credibility Abstract 1 Introduction 2 Analysis of the Traditional Collaborative Filtering 2.1 The Description of Traditional Collaborative Filtering 2.2 Traditional Collaborative Filtering Problem Analysis 3 Collaborative Filtering Recommendation Model Based on Context and User Credibility 3.1 User Context Description 3.2 User Credibility 3.3 Recommendation Algorithm 4 Collaborative Filtering Recommendation Method Based on MapReduce 5 Experiment and Analysis 6 Conclusion Acknowledgment References Multi-watermarking Algorithm for Medical Image Based on NSCT-RDWT-DCT Abstract 1 Introduction 2 Theoretical Background 2.1 Non-Subsampled Contourlet Transform (NSCT) 2.2 Redundant Discrete Wavelet Transform (RDWT) 3 The Proposed Algorithm 3.1 Feature Extraction 4 Experimental Result and Analysis 4.1 Attacks 4.2 Algorithms Comparison 5 Conclusions References An Improved Container Scheduling Algorithm Based on PSO for Big Data Applications 1 Introduction 2 Related Work 3 Improved Container Scheduling Algorithm Based on PSO Algorithm 3.1 Basic Definition 3.2 Improvement of Kube-Scheduler Optimization Process 3.3 Improvement Based on Particle Swarm Optimization 4 Experimental Environment and Results Analysis 4.1 Experimental Environment 4.2 K-PSO and Basic PSO Algorithm Comparison Experiment 4.3 K-PSO Scheduling and Comparison of Existing Scheduling Strategies 4.4 Analysis of Experimental Results 5 Conclusion References Cloud and Security A Secure Density Peaks Clustering Algorithm on Cloud Computing Abstract 1 Introduction 2 Preliminaries 3 Basic Security Primitives 3.1 Existing Security Protocol 3.2 The Proposed Protocol 4 Algorithm Description 4.1 Security Density Peak Clustering Algorithm Based on Grid 4.2 Security Analysis 4.3 Complexity Analysis 5 Performance Evaluation 6 Conclusion Acknowledgment References Research on Cloud Computing Security Problems and Protection Countermeasures 1 Introduction 2 Overview of Cloud Computing 2.1 The Concept of Cloud Computing 2.2 Cloud Computing Model 2.3 Six Characteristics of Cloud Computing 3 Cloud Computing Security Analysis 3.1 Data Security 3.2 Technology Security 3.3 Application Security 3.4 Other Safety Issues 4 Research on Cloud Computing Security System and Protection Countermeasures 4.1 Establish Elastic Cloud Security System 4.2 Security Countermeasures for Cloud Computing 5 Conclusion References Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing Abstract 1 Introduction 2 Literature Review 3 The Model and Its Analysis 3.1 Logistics Resources Scheduling Problem 3.2 Distribution Vehicle Scheduling Under Improved Genetic Algorithm 3.3 Algorithm Analysis of the Model 3.4 Algorithm Flow Under Cloud Computing 4 Conclusions Acknowledgement References Cloud Security Solution Based on Software Defined Network 1 Introduction 2 Software-Defined Networks and Related Technologies 2.1 Software-Defined Network 2.2 Open Flow Protocol 2.3 Software Defined Security Services 3 Cloud Security Solution Model Based on Software-Defined Network 3.1 The Three Dimensions of the Model 3.2 Security Service Framework 3.3 The Advantages of a Cloud Security Model Based on Software Definitions 4 Summary References An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage Applications Abstract 1 Introduction 2 Related Work 3 Preliminary Knowledge 3.1 How Multi-Paxos Protocol Works 3.2 Problem Statement 4 Our Solution: An Optimized Multi-paxos Protocol 5 Evaluation 6 Conclusion Acknowledgments References A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage 1 Introduction 2 Preliminaries 2.1 Blockchain and Smart Contract 2.2 InterPlanetary File System 2.3 Notations 2.4 System Model and Threat Model 3 The Proposed Scheme 3.1 Detailed Design of Ciphertext Retrieval System Based on Blockchain 4 Security and Performance Analysis 4.1 Security Analysis 4.2 Storage Performance Analysis 5 Conclusion References Correction to: Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps Correction to: Chapter “Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps” in: J. Vaidya et al. (Eds.): Cyberspace Safety and Security, LNCS 11982, https://doi.org/10.1007/978-3-030-37337-5_15 Author Index