The technology we use, and even rely on, in our everyday lives –computers, radios, video, cell phones – is enabled by signal processing. Learn More »
1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
News and Resources for Members of the IEEE Signal Processing Society
Upcoming Webinar! February 25, 2020
Webinar Topic: "Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage"
Presented by Wenting Shen and Jiankun Hu, and based on an IEEE Xplore article
published in the IEEE Transactions on Information Forensics and Security
|Presenter: Wenting Shen and Jiankun Hu
|Date: February 25, 2020
Time: 8:00 am ET (New York time)
Duration: Approximately 1 hour
Register: Attendee Registration
About this Topic:
With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems, such as the electronic health records system, the cloud file might contain some sensitive information that should not be exposed to others when the cloud file is shared. Encrypting the whole shared file can realize the sensitive information hiding, but will make this shared file unusable by others. How to realize data sharing with sensitive information hiding in remote data integrity auditing still had not been explored, that is, up to now.
This webinar, which is based on our original article, addresses this problem and proposes a remote data integrity auditing scheme that realizes data sharing with sensitive information hiding. In our scheme, a sanitizer is used on the data blocks corresponding to the sensitive information of the file and transforms these data blocks’ signatures into valid ones for the sanitized file. These signatures are used to verify the integrity of the sanitized file in the integrity auditing phase. As a result, our scheme enables the file stored in the cloud to be shared and used by others on the condition that the sensitive information is hidden, while the remote data integrity auditing is still able to be efficiently executed.
The proposed scheme is based on identity-based cryptography, which simplifies the complicated certificate management. Security analysis and performance evaluation has shown that the proposed scheme is secure and efficient.
About the Presenters:
Wenting Shen received her B.S. and M.S. degrees in computer science and technology from Qingdao University, China, in 2014 and 2017, respectively. She is currently pursuing the Ph.D. degree in fundamental mathematics from Shandong University, China.
From 2018 to 2019, she was a joint doctoral student in the College of Information Sciences and Technology, The Pennsylvania State University, University Park, USA. Her research interests include, but not limited to cloud security and big data security.
Jiankun Hu received the Ph.D. degree in control engineering from the Harbin Institute of Technology, China, in 1993, and the Master’s degree in computer science and software engineering from Monash University, Australia, in 2000. He was a Research Fellow with Delft University, The Netherlands, from 1997 to 1998, and The University of Melbourne, Australia, from 1998 to 1999.
He has many published articles in the IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Forensics and Security, Pattern Recognition, and the IEEE Transactions on Industrial Informatics. Currently, he is an Associate Editor of the IEEE Transactions on Information Forensics and Security. His research interests are in the field of cyber security covering intrusion detection, sensor key management, and biometrics authentication.
Dr. Jiankun Hu is currently a Professor with the School of Engineering and IT, University of New South Wales, Canberra, Australia. He is also an invited expert of the Australia Attorney-General’s Office, assisting the draft of Australia National Identity Management Policy. He has received nine Australian Research Council (ARC) Grants and has served on the Panel on Mathematics, Information, and Computing Sciences, Australian Research Council ERA (The Excellence in Research for Australia) Evaluation Committee 2012.
|Nominate an IEEE Fellow today!||1 March 2023|
|Call for Officer Nominations: President-Elect, Vice President-Conferences, and Vice President-Publications||3 March 2023|
|Call for Nominations: IEEE T-MM 2023 Multimedia Prize Paper Award||31 March 2023|
|Call for Nominations: Board of Governors Members-at-Large and Regional Directors-at-Large||7 April 2023|
|Call for Nominations: IEEE Medals & Recognitions||15 June 2023|
© Copyright 2023 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.