Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings

Multiple string matching algorithm is a core technology in network intrusion detection system. Automata based matching algorithms such as AC and BOM are widely used in practical systems because of their excellent matching performance, but the huge memory usage of automata restricts them to be applied to large-scale pattern set. In this paper, we proposed a charset-transformation-based multiple string matching algorithm named CTM to reduce the memory usage of the automata. Based on the classical compression algorithm banded-row, CTM algorithm optimizes the compression method and increases the compression rate. The proposed CTM algorithm plays a charset transformation on the charset of the patterns to increase the continuity of distribution of non-empty elements in the automata, and then uses the banded-row method to compress the automata. Experiments on random ASCII charset show that the proposed algorithm significantly reduces memory usage and still holds a fast matching speed. Above all, CTM costs about 2.5% of the memory usage of AC, and compared with basic banded-row method, the compression rate of CTM can be increased by about 35%.

[1]  Laura J Armbrust,et al.  PACS and image storage. , 2009, The Veterinary clinics of North America. Small animal practice.

[2]  Jinjun Chen,et al.  External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..

[3]  Qing Zhou,et al.  A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..

[4]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[5]  Robert L. Grossman,et al.  Sector and Sphere: the design and implementation of a high-performance data cloud , 2009, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[6]  Mohamed Bouye,et al.  New secure partial encryption method for medical images using graph coloring problem , 2015, Nonlinear Dynamics.

[7]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[8]  Ian T. Foster,et al.  Virtual workspaces: Achieving quality of service and quality of life in the Grid , 2005, Sci. Program..

[9]  Vinod Patidar,et al.  Medical image protection using genetic algorithm operations , 2014, Soft Computing.

[10]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.

[11]  Xinxin Niu,et al.  Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems , 2016, Int. J. Distributed Sens. Networks.

[12]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[13]  Ian T. Foster,et al.  The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[14]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[15]  Rajat Saxena,et al.  A generic approach for integrity verification of big data , 2018, Cluster Computing.

[16]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[17]  Saroj Kanta Mishra,et al.  Telemedicine in India: current scenario and the future. , 2009, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[18]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[19]  Engin Kirda,et al.  A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).

[20]  Taekyoung Kwon,et al.  A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage , 2015, J. Internet Serv. Inf. Secur..

[21]  Varun Jeoti,et al.  A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) , 2018 .

[22]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[23]  Anil Kumar,et al.  Extended substitution–diffusion based image cipher using chaotic standard map , 2011 .

[24]  R.Santha Maria Rani,et al.  Dynamic Public Data Auditing Schemes on Cloud: A Survey , 2018 .

[25]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[26]  Xiaowei Yang,et al.  Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices , 2017, 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM).

[27]  Lei Zhou,et al.  Data integrity verification of the outsourced big data in the cloud environment: A survey , 2018, J. Netw. Comput. Appl..

[28]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[29]  Qian Wang,et al.  Dynamic Proofs of Retrievability for Coded Cloud Storage Systems , 2018, IEEE Transactions on Services Computing.

[30]  Zhanhuai Li,et al.  Study on Cloud Storage System Based on Distributed Storage Systems , 2010, 2010 International Conference on Computational and Information Sciences.

[31]  Rengarajan Amirtharajan,et al.  Transreceiving of encrypted medical image – a cognitive approach , 2018, Multimedia Tools and Applications.

[32]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[33]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.

[34]  P. Poonguzhali,et al.  Secured patient information transmission using reversible watermarking and DNA encrytion for medical images , 2015 .

[35]  Smita Chaudhari,et al.  A Comprehensive Survey on Public Auditing for Secure Cloud Storage , 2018 .

[36]  W. D. Bidgood,et al.  Introduction to the ACR-NEMA DICOM standard. , 1992, Radiographics : a review publication of the Radiological Society of North America, Inc.

[37]  Hua Wang,et al.  Improved security of a dynamic remote data possession checking protocol for cloud storage , 2014, Expert Syst. Appl..

[38]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[39]  Vishakha Gupta,et al.  High-Performance Hypervisor Architectures: Virtualization in HPC Systems , 2007 .

[40]  Qiang Zhang,et al.  Image encryption using DNA addition combining with chaotic maps , 2010, Math. Comput. Model..

[41]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[42]  S. H. Krishnaveni,et al.  A Study of Data Storage Security Issues in Cloud Computing , 2015 .

[43]  Huaqun Wang,et al.  Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.

[44]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[45]  Li Xu,et al.  Data dynamics for remote data possession checking in cloud storage , 2013, Comput. Electr. Eng..

[46]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[47]  Geoffrey C. Fox,et al.  High Performance Parallel Computing with Clouds and Cloud Technologies , 2009, CloudComp.

[48]  A. Alfalou,et al.  Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. , 2013, Optics express.

[49]  Wullianallur Raghupathi,et al.  Strategic IT applications in health care , 2002, CACM.