- Browse by Author
Browsing by Author "Zou, Xukai"
Now showing 1 - 10 of 39
Results Per Page
Sort Options
Item AuthN-AuthZ: Integrated, User-Friendly and Privacy-Preserving Authentication and Authorization(IEEE, 2020-10) Phillips, Tyler; Yu, Xiaoyuan; Haakenson, Brandon; Goyal, Shreya; Zou, Xukai; Purkayastha, Saptarshi; Wu, Huanmei; BioHealth Informatics, School of Informatics and ComputingIn this paper, we propose a novel, privacy-preserving, and integrated authentication and authorization scheme (dubbed as AuthN-AuthZ). The proposed scheme can address both the usability and privacy issues often posed by authentication through use of privacy-preserving Biometric-Capsule-based authentication. Each Biometric-Capsule encapsulates a user's biometric template as well as their role within a hierarchical Role-based Access Control model. As a result, AuthN-AuthZ provides novel efficiency by performing both authentication and authorization simultaneously in a single operation. To the best of our knowledge, our scheme's integrated AuthN-AuthZ operation is the first of its kind. The proposed scheme is flexible in design and allows for the secure use of robust deep learning techniques, such as the recently proposed and current state-of-the-art facial feature representation method, ArcFace. We conduct extensive experiments to demonstrate the robust performance of the proposed scheme and its AuthN-AuthZ operation.Item A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme(IEEE, 2017) Phillips, Tyler; Zou, Xukai; Li, Feng; Computer and Information Science, School of ScienceIn recent years, biometric, or "who you are," authentication has grown rapidly in acceptance and use. Biometric authentication offers users the convenience of not having to carry a password, PIN, smartcard, etc. Instead, users will use their inherent biometric traits for authentication and, as a result, risk their biometric information being stolen. The security of users' biometric information is of critical importance within a biometric authentication scheme as compromised data can reveal sensitive information: race, gender, illness, etc. A cancellable biometric scheme, the "BioCapsule" scheme, proposed by researchers from Indiana University Purdue University Indianapolis, aims to mask users' biometric information and preserve users' privacy. The BioCapsule scheme can be easily embedded into existing biometric authentication systems, and it has been shown to preserve user-privacy, be resistant to several types of attacks, and have minimal effects on biometric authentication system accuracy. In this research we present a facial authentication system which employs several cutting-edge techniques. We tested our proposed system on several face databases, both with and without the BioCapsule scheme being embedded into our system. By comparing our results, we quantify the effects the BioCapsule scheme, and its security benefits, have on the accuracy of our facial authentication system.Item Dependability and Security in Medical Information System(Springer Nature, 2007) Zou, Xukai; Dai, Yuan-Shun; Doebbeling, Bradley; Qi, Mingrui; Department of Computer and Information Science, School of ScienceMedical Information Systems (MIS) help medical practice and health care significantly. Security and dependability are two increasingly important factors for MIS nowadays. In one hand, people would be willing to step into the MIS age only when their privacy and integrity can be protected and guaranteed with MIS systems. On the other hand, only secure and reliable MIS systems would provide safe and solid medical and health care service to people. In this paper, we discuss some new security and reliability technologies which are necessary for and can be integrated with existing MISs and make the systems highly secure and dependable. We also present an implemented Middleware architecture which has been integrated with the existing VISTA/CPRS system in the U.S. Department of Veterans Affairs seamlessly and transparently.Item Design and Implementation of Privacy-Preserving, Flexible and Scalable Role-Based Hierarchical Access Control(IEEE, 2019-12) Phillips, Tyler; Yu, Xiaoyuan; Haakenson, Brandon; Zou, Xukai; Computer and Information Science, School of ScienceIn many domains, organizations must model personnel and corresponding data access privileges as fine-grained hierarchical access control models. One class of such models, Role-based Access Control (RBAC) models, has been widely accepted and deployed. However, RBAC models are often used without involving cryptographic keys nor considering confidentiality/privacy at the data level. How to design, implement and dynamically modify such a hierarchy, ensure user and data privacy and distribute and manage necessary cryptographic keys are issues of the utmost importance. One elegant solution for cryptography-based hierarchical access control combines the collusion-resistant and privacy-preserving Access Control Polynomial (ACP) and Atallah's Dynamic and Efficient Extended Key Management scheme. Such a model involves cryptographic keys used to encrypt data, can address confidentiality/privacy at the data level and can efficiently support dynamic changes to the RBAC access hierarchy. In this paper, we discuss several implementation challenges and propose solutions when deploying such a system including: data encryption and decryption, key storage and key distribution. Furthermore, we provide analysis of the efficiency and scalability of the resulting system.Item Design and Implementation of Web-based Data and Network Management System for Heterogeneous Wireless Sensor Networks(2011-03-09) Yu, Qun; Liang, Yao; Zou, Xukai; Xia, YuniToday, Wireless Sensor Networks (WSNs) are forming an exciting new area to have dramatic impacts on science and engineering innovations. New WSN-based technologies, such as body sensor networks in medical and health care and environmental monitoring sensor networks, are emerging. Sensor networks are quickly becoming a flexible, inexpensive, and reliable platform to provide solutions for a wide variety of applications in real-world settings. The increase in the proliferation of sensor networks has paralleled the use of more heterogeneous systems in deployment. In this thesis, our work attempts to develop a new network management and data collection framework for heterogeneous wireless sensor networks called as Heterogeneous Wireless Sensor Networks Management System (H-WSNMS), which enables to manage and operate various sensor network systems with unified control and management services and interface. The H-WSNMS framework aims to provide a scheme to manage, query, and interact with sensor network systems. By introducing the concept of Virtual Command Set (VCS), a series of unified application interfaces and Metadata (XML files) across multiple WSNs are designed and implement the scalability and flexibility of the management functions for heterogeneous wireless sensor networks, which is demonstrated though through a series of web-based WSN management Applications such as Monitoring, Configuration, Reprogram, Data Collection and so on. The tests and application trials confirm the feasibility of our approach but also still reveal a number of challenges to be taken into account when deploying wireless sensor and actuator networks at industrial sites, which will be considered by our future research work.Item Efficient Secure E-Voting and its Application in Cybersecurity Education(2022-05) Swearingen, Nathan; Zou, Xukai; Li, Feng; Hu, QinAs the need for large elections increases and computer networking becomes more widely used, e-voting has become a major topic of interest in the field of cryptography. However, lack of cryptography knowledge among the general public is one obstacle to widespread deployment. In this paper, we present an e-voting scheme based on an existing scheme. Our scheme features an efficient location anonymization technique built on homomorphic encryption. This technique does not require any participation from the voter other than receiving and summing location shares. Moreover, our scheme is simplified and offers more protection against misbehaving parties. We also give an in-depth security analysis, present performance results, compare our scheme with existing schemes, and describe how our research can be used to enhance cybersecurity education.Item Electronic Voting Technology Inspired Interactive Teaching and Learning Pedagogy and Curriculum Development for Cybersecurity Education(Springer, 2021-07) Hosler, Ryan; Zou, Xukai; Bishop, Matt; Computer and Information Science, School of ScienceCybersecurity is becoming increasingly important to individuals and society alike. However, due to its theoretical and practical complexity, keeping students interested in the foundations of cybersecurity is a challenge. One way to excite such interest is to tie it to current events, for example elections. Elections are important to both individuals and society, and typically dominate much of the news before and during the election. We are developing a curriculum based on elections and, in particular, an electronic voting protocol. Basing the curriculum on an electronic voting framework allows one to teach critical cybersecurity concepts such as authentication, privacy, secrecy, access control, encryption, and the role of non-technical factors such as policies and laws in cybersecurity, which must include societal and human factors. Student-centered interactions and projects allow them to apply the concepts, thereby reinforcing their learning.Item Energy-Efficient Device Selection in Federated Edge Learning(IEEE, 2021-07) Peng, Cheng; Hu, Qin; Chen, Jianan; Kang, Kyubyung; Li, Feng; Zou, Xukai; Computer and Information Science, School of ScienceDue to the increasing demand from mobile devices for the real-time response of cloud computing services, federated edge learning (FEL) emerges as a new computing paradigm, which utilizes edge devices to achieve efficient machine learning while protecting their data privacy. Implementing efficient FEL suffers from the challenges of devices’ limited computing and communication resources, as well as unevenly distributed datasets, which inspires several existing research focusing on device selection to optimize time consumption and data diversity. However, these studies fail to consider the energy consumption of edge devices given their limited power supply, which can seriously affect the cost-efficiency of FEL with unexpected device dropouts. To fill this gap, we propose a device selection model capturing both energy consumption and data diversity optimization, under the constraints of time consumption and training data amount. Then we solve the optimization problem by reformulating the original model and designing a novel algorithm, named E2DS, to reduce the time complexity greatly. By comparing with two classical FEL schemes, we validate the superiority of our proposed device selection mechanism for FEL with extensive experimental results.Item Enhancing and Implementing Fully Transparent Internet Voting(IEEE, 2015-08) Butterfield, Kevin; Li, Huian; Zou, Xukai; Li, Feng; Department of Computer & Information Science, School of ScienceVoting over the internet has been the focus of significant research with the potential to solve many problems. Current implementations typically suffer from a lack of transparency, where the connection between vote casting and result tallying is seen as a black box by voters. A new protocol was recently proposed that allows full transparency, never obfuscating any step of the process, and splits authority between mutually-constraining conflicting parties. Achieving such transparency brings with it challenging issues. In this paper we propose an efficient algorithm for generating unique, anonymous identifiers (voting locations) that is based on the Chinese Remainder Theorem, we extend the functionality of an election to allow for races with multiple winners, and we introduce a prototype of this voting system implemented as a multiplatform web application.Item Enhancing and Implementing Fully Transparent Internet Voting(Office of the Vice Chancellor for Research, 2015-04-17) Butterfield, Kevin; Li, Huian; Zou, Xukai; Li, FengVoting over the internet has been the focus of significant research with the potential to solve many problems. Current implementations typically suffer from a lack of transparency, where the connection between vote casting and result tallying is seen as a black box by voters. A new protocol was recently proposed that allows full transparency, never obfuscating any step of the process, and splits authority between mutually-constraining conflicting parties. Achieving such transparency brings with it challenging issues. In this paper we propose an efficient algorithm for generating unique, anonymous identifiers (voting locations) that is based on the Chinese Remainder Theorem, extend the functionality of an election to allow for races with multiple winners, and introduce a prototype of this voting system implemented as a multiplatform web application.