JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 28-34.doi: 10.6040/j.issn.1671-9352.2.2019.035

Previous Articles    

A scheme for cloud server positioning and security verification

YANG Chen, ZHENG Ming-hui*, TAN Jie   

  • Published:2020-03-27

Key words: dishonest service provider, multi-point positioning, Euclidean measurement, centroid estimation, security positioning

CLC Number: 

  • TP305
[1] 蔡红云, 田俊峰. 云计算中的数据隐私保护研究[J]. 山东大学学报(理学版), 2014, 49(9):83-89, 96. CAI Hongyun, TIAN Junfeng. Research of data privacy protection for cloud computing[J]. Journal of Shandong University(Natural Science), 2014, 49(9):83-89, 96.
[2] BRUNETTE G,MOGULL R.Security guidance for critical areas of focus in cloud computing v2.1[J]. Cloud Security Alliance, 2009(11):1-76.
[3] TAKABI H, JOSHI J B D, AHN G J. Security and privacy challenges in cloud computing environments[J]. IEEE Security & Privacy Magazine, 2010, 8(6):24-31.
[4] 王占丰, 冯径, 邢长友, 等. IP定位技术的研究[J]. 软件学报, 2014, 25(7):1527-1540. WANG Zhanfeng, FENG Jing, XING Changyou, et al. Research on the IP geolocation technology[J]. Journal of Software, 2014, 25(7):1527-1540.
[5] 刘旭明, 王伟, 景强, 等. 基于粒子群优化的RSSI等弧三边定位算法[J]. 传感器与微系统, 2018, 37(8):134-136. LIU Xuming, WANG Wei, JING Qiang, et al. RSSI-based equal-arc trilateral localization algorithm based on particle swarm optimization[J]. Transducer and Microsystem Technologies, 2018, 37(8):134-136.
[6] 刘影, 钱志鸿, 王雪, 等. 基于到达时间差的无线传感器网络质心定位算法[J]. 吉林大学学报(工学版), 2010, 40(1):245-249. LIU Ying, QIAN Zhihong, WANG Xue, et al. Wireless sensor network centroid localization algorithm based on time difference of arrival[J]. Journal of Jilin University(Eng and Technol Ed), 2010, 40(1):245-249.
[7] 李东岳, 王英龙, 魏诺, 等. 信号强度和运动向量结合的无线传感器网络移动节点定位[J]. 电子学报, 2010, 38(S1):221-224. LI Dongyue, WANG Yinglong, WEI Nuo, et al. Localization algorithm for mobile nodes in wireless sensor networks based on single strength and motion vector[J]. Acta Electronica Sinica, 2010, 38(S1):221-224.
[8] 冯秀芳, 吕淑芳. 基于RSSI和分步粒子群算法的无线传感器网络定位算法[J]. 控制与决策, 2014, 29(11):1966-1972. doi:10.13195/j.kzyjc.2013.0929. FENG Xiufang, L(¨overU)Shufang. Wireless sensor networks locating algorithm based on RSSI and split-step particle swarm optimization algorithm[J]. Control and Decision, 2014, 29(11):1966-1972. doi:10.13195/j.kzyjc.2013.0929.
[9] 汪明,许亮,何小敏.无线传感器网络精度优选RSSI协作定位算法[J].计算机应用, 2018, 38(7):1981-1988. WANG Ming, XU Liang, HE Xiaomin. RSSI collaborative location algorithms for precision selection of wireless sensor networks[J]. Journal of Computer Applications, 2018, 38(7):1981-1988.
[10] 刘清, 白光伟, 赵露. 一种新型三维传感器网络质心定位算法[J]. 微电子学与计算机, 2014, 31(5):1-5. LIU Qing, BAI Guangwei, ZHAO Lu. A novel 3D centroid localization algorithm for WSNs[J]. Microelectronics & Computer, 2014, 31(5):1-5.
[11] 赵军, 裴庆祺, 徐展琦. 无线传感器网络近似三角形内点测试定位算法[J]. 计算机工程, 2007, 33(5):109-111. ZHAO Jun, PEI Qingqi, XU Zhanqi. APIT localization algorithms for wireless sensor networks[J]. Computer Engineering, 2007, 33(5):109-111.
[12] WANG J Z, JIN H. Improvement on APIT localization algorithms for wireless sensor networks[C] // International Conference on Networks Security. [S.l.] : IEEE Computer Society, 2009(4):719-723.
[13] SHARMA G, KUMAR A. Improved DV-Hop localization algorithm using teaching learning based optimization for wireless sensor networks[J]. Telecommunication Systems, 2017, 67(8):1-16.
[14] TRAMMELL B, MIRJA K. Revisiting the privacy implications of two-way internet latency data[M] // Passive and Active Measurement. New York: Springer, 2018: 73-84.
[15] FALOUTSOS M. Public review for the internet AS-level topology[J]. ACM SIGCOMM Computer Communication Review, 2006, 36(1):15-16.
[16] MOORE D. Where in the world is netgeo.caida.org?[M].[S.l.] : Internet Society Conference, 2000.
[17] KATZ-BASSETT E, JOHN J P, KRISHNAMURTHY A, et al. Towards IP geolocation using delay and topology measurements[C] // Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. Brazil: ACM, 2006: 71-84.
[18] GUEYE B, ZIVIANI A, CROVELLA M, et al. Constraint-based geolocation of internet hosts[J]. IEEE/ACM Transactions on Networking, 2006, 14(6):1219-1232.
[19] 李晨. 云数据存储位置的验证机制研究与实现[D]. 西安: 西安电子科技大学, 2018. LI Chen. Research and implementation of verification mechanism for cloud data storage location[D]. Xian: Xidian University, 2018.
[20] CHANDRAN N, GOYAL V, MORIARTY R, et al. Position based cryptography[C] // Advances in Cryptology-CRYPTO 2009, 29th Annual International Cryptology Conference.[S.l.] :[s.n.] , 2009: 391-407.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!