Table of Content

    15 June 2018, Volume 4 Issue 6
    Research on Information System Auditing Mechanism for the Cyberpower Development
    2018, 4(6):  490-495. 
    Asbtract ( )   PDF (772KB) ( )  
    References | Related Articles | Metrics
    Blockchain and Quantum Computing
    2018, 4(6):  496-504. 
    Asbtract ( )   PDF (1390KB) ( )  
    References | Related Articles | Metrics
    In recent years, the emerging of digital encryption currency such as bitcoin, blockchain as its key technology has caused the government, technology companies, financial institutions and capital market great attention and wide public concern. Blockchain is a new kind of distributed, decentralized or centralized mechanism, has high distributed redundant storage, go to the center of the credit, automatic intelligent contract execution, timeseries data, not tampered with, the advantages of security and privacy. However, with the development of quantum computer, some advantages of blockchain will be challenged. By analyzing the core technology of the blockchain and combining the advantages of quantum computing, we could analyze the problems that the blockchain system will face in the future. We could work to provide effective guidance and reference to relevant researches of blockchain in the future.
    On the Supervision of Virtual Currency Financial Crimes
    2018, 4(6):  505-510. 
    Asbtract ( )   PDF (1104KB) ( )  
    References | Related Articles | Metrics
    As a decentralized product of internet finance, virtual currency has the characteristics of small occupied space, fast circulation speed, high degree of concealment and high risk factor. While bringing business opportunities and conveniences to peoples lives, it is also very easy to become a tool and channel for criminals to carry out financial crimes. In recent years, more and more financial crimes have committed by using virtual currency for money laundering, fraud and tac evasion. Based on this, China should learn from the regulatory experience of the United States, the European Union and other developed countries to formulate laws and regulations so as to clarify the central banks dominant regulatory status, improve regulatory technologies, enhance collaborative supervision and other measures and engage in all aspects before, during, and after the event. We will improve our system of supervision over virtual currency and financial crimes, which can better to promote the healthy and sustainable development of the financial market.
    An Android Malicious Code Detection Method Based on Native Code Features
    2018, 4(6):  511-517. 
    Asbtract ( )   PDF (1132KB) ( )  
    References | Related Articles | Metrics
    In the face of the rapid growing number of Android malicious code, in order to effectively and accurately detect malicious code, a malicious code detection method based on Android native code features is proposed. The Dalvik bytecode and SO file are converted into ARM assembly code and the control flow graph of each function is generated. The pattern is used to annotate the control flow graph. The subgraph isomorphism and pattern matching are used to calculate the similarity of the control flow graph set. The comparison between the similarity and a threshold determines whether the application to be detected contains malicious code. The code coverage of the method is higher than the traditional static detection method. Finally, the above method is validated by experiments to show this method is feasible and the accuracy and detection rate of the method is better than the static detection tool Androguard.
    Slide Attacks on the Even-Mansour Scheme with Key Leakage
    2018, 4(6):  518-525. 
    Asbtract ( )   PDF (1288KB) ( )  
    References | Related Articles | Metrics
    The Even-Mansour scheme has been widely used in the block cipher for its simple structure and strict security, and it has always been a very popular research point in the block cipher. The main tool for attacking this scheme is the slide attack. However, there is no relevant research on the attack on the Even-Mansour scheme with key leakage. In this paper, we present an improved keyleakage attack based on slide attacks on the Even-Mansour scheme. Moreover, we present the key-leakage attacks on some variants of the Even-Mansour scheme. The performance of improved attacks are much better than the original attacks when the key is leaked.
    An Improved Multi-Replica Data Integrity Verification Scheme in Cloud Storage Environment
    2018, 4(6):  526-532. 
    Asbtract ( )   PDF (1430KB) ( )  
    References | Related Articles | Metrics
    In cloud storage environment, in order to protect users data security, cloud service providers will make redundant backups of user data and store them on different nodes. In order to solve the problem of user copy security, this paper uses random mask to process data privacy of user data, uses adaptive Trie tree structure to improve the efficiency of data block signature, and designs a data integrity verification scheme to protect redundant copies of users. The program can achieve dynamic data updates, improve the efficiency of data validation, and conduct trusted audits of data through trusted third parties. Simulation results show that the scheme is feasible and efficient.
    A Method of Uncertain Graphs Based on Node Characteristics for Preserving Privacy in Social Networks
    2018, 4(6):  533-538. 
    Asbtract ( )   PDF (925KB) ( )  
    References | Related Articles | Metrics
    tWith the wide application of the Internet, network services based on social network has gradually become a part of peoples life. In order to solve the problem of network security which caused by disclosure of privacy data in social networks, this paper proposes a method of uncertain graph based on node characteristics. Unlike the commonly used method of uncertain graph, starting with analysing the characteristics of the nodes, this method selects the important nodes by using the degree centrality of the nodes, adds some edges between their adjacent nodes, injects uncertainty into the selected triangles, and generates an uncertain graph to realize privacy preserving in social network. The experiments conduct also show that this method can not only preserve the privacy of social networks, but also have better data effectiveness compared with the (k,ε) obfuscation algorithm.
    A Visually Meaningful Image Encryption Algorithm Based on Compressed Sensing
    2018, 4(6):  539-547. 
    Asbtract ( )   PDF (3405KB) ( )  
    References | Related Articles | Metrics
    n order to achieve more reliable and secure transmission, image encryption technology has been commonly used for transmission of important image data. However, the encrypted images generated by traditional encryption algorithms are texture-like or noise-like images which can be easily distinguished by human visual system. A meaningful image encryption algorithm in ciphertext is designed and implemented. Combined the compressed sensing of images with the wavelet transform technology to encrypt image which makes the encrypted image on the vision is the same as the ordinary images, reduces the chance of being attacked. The algorithm achieves the following operations by using Matlab programming: reading the secret images, pre-encrypting the secret images, pre-processing the cover images, embedding the encrypted images in cover images; loading the encrypted images, extracting the pre-encrypted images and reconstructing the secret images. For the pre-encryption to the secret image, it mainly uses the compressed sensing of images based on discrete wavelet transform; when embedding the encrypted image on cover images or extracting it from them, the encryption and decryption based on the content of integer wavelet transform is mainly used; while reconstructing secret image, the stagewise OMP reconstruction algorithm is mainly used. Finally, the algorithm realized the meaningful ciphertext image encryption with certain robustness.
    Research on Financial Data Security Management Based on Data Life Cycle
    2018, 4(6):  548-554. 
    Asbtract ( )   PDF (1122KB) ( )  
    References | Related Articles | Metrics
    At present, the trend of comprehensive financial management in China is constantly strengthened. The Internet, big data, and cloud computing are widely used in the financial industry. The convergence and development of the financial industry and the Internet is rapid. But at the same time, we have to face the problem of customer information security under the trend of “Internet +”. For information systems, data security is the core issue of information security. The current hacker attacks are focused on stealing the core corporate data and customer data. The security defense systems of enterprises also focuses on data security. Therefore, the data security management is a top priority for enterprises in the field of Internet finance. In order to improve the level of enterprise data security management and reduce the risk of data leakage caused by improper use of business data, we study the method of data security risk management based on the data life cycle.
    A Light-Weight RFID Authentication Protocol Based on M-Sequence
    2018, 4(6):  555-558. 
    Asbtract ( )   PDF (747KB) ( )  
    References | Related Articles | Metrics
    Although the RFID technology is more and more widely used, security and privacy problem of RFID has not been completely solved. In most RFID authentication protocols, the search volume of the server depends on the number of tags. A light-weight RFID protocol is proposed based on M-sequence. In the proposed protocol, the search volume of the server does not depend on the number of tags. Based on the pseudo-randomness of M-sequence and the unidirectionality of hash function, the proposed protocol can resist replay attack, statistical analysis, spoofing attack, privacy track and so on.
    Blockchain Technology and Application
    2018, 4(6):  559-569. 
    Asbtract ( )   PDF (1884KB) ( )  
    References | Related Articles | Metrics
    A rush of digital cryptocurrency is being set off by bitcoin since it was introduced in 2008. As its underlying core technology, blockchain and blockchain technology have received extensive attention from many aspects. Blockchain technology is a combination of many technologies for data exchange, processing and storage based on cryptography, peer-to-peer communications, distributed coherency protocols and smart contracts. Blockchain is a decentralized, distributed public database based on the blockchain technology. The implementation of the blockchain's classification, five-tier architecture, smart contracts, scalability and security are introduced in detail in this article. We introduced the application of blockchain in current fields and related development of domestic blockchain. Finally, the advantages and disadvantages of the blockchain are outlined, which lays the foundation for futther research and application.
    The Application of Credit Card Security Marketing Based on Artificial Intelligence
    2018, 4(6):  570-574. 
    Asbtract ( )   PDF (2067KB) ( )  
    References | Related Articles | Metrics
    Accurate access to customers and reducing user churn have become the key to credit card marketing with the increasing competition. In order to enhance the effective credit card marketing capabilities, a solution based on artificial intelligence technology is proposed from the perspective of passive prevention and active mining. In passive prevention, the model of humanmachine recognition can effectively prevent and control malicious attacks on marketing resources, while in active mining, the precision marketing model can effectively promote the ability to search for target customers. The comprehensive application of risk prevention and precise mining can guarantee more marketing bonus for highquality customers, as well as reduce marketing risk and costs, which provide a safe and efficient solution to credit card marketing.
    The Foundation and Application of Blockchain Technology
    2018, 4(6):  575-580. 
    Asbtract ( )   PDF (1504KB) ( )  
    References | Related Articles | Metrics
    A blockchain is a distributed ledger consisting of unchangeable blocks, by using cryptographically signed links and forms a chronological chain structure. The contents and records in this blockchain are accessible for the authorized users. With tamper-proof, can be anonymous, to the center and other advantages. Today, blockchain has extensive research on e-money, digital assets, internet of things, and supply chain. The article describes in detail the working principle and technical characteristics of the blockchain. The three platforms Bitcoin implemented in the blockchain are compared with Ethereum and Hyperledger to introduce the basic technologies of the three platforms. Because of its unique technical advantages, the blockchain has been applied in many fields and scenarios, changing the traditional needs that rely on the third-party trust mechanisms. Subsequently, the blockchain was elaborated and analyzed in terms of security.