Home / Journals / JCS / Vol.1, No.1, 2019
  • Open AccessOpen Access

    ARTICLE

    A Novel SINS/IUSBL Integration Navigation Strategy for Underwater Vehicles

    Jian Wang1, Tao Zhang1,*, Bonan Jin1, Shaoen Wu2
    Journal of Cyber Security, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jcs.2019.05818
    Abstract This paper presents a novel SINS/IUSBL integration navigation strategy for underwater vehicles. Based on the principle of inverted USBL (IUSBL), a SINS/IUSBL integration navigation system is established, where the USBL device and the SINS are both rigidly mounted onboard the underwater vehicle, and fully developed in-house, the integration navigation system will be able to provide the absolute position of the underwater vehicle with a transponder deployed at a known position beforehand. Furthermore, the state error equation and the measurement equation of SINS/IUSBL integration navigation system are derived, the difference between the position calculated by SINS and the absolute position obtained… More >

  • Open AccessOpen Access

    ARTICLE

    Secure Model of Medical Data Sharing for Complex Scenarios

    Wei She1, Yue Hu2, Zhao Tian1, Guoning Liu3, Bo Wang4, Wei Liu1, 2, *
    Journal of Cyber Security, Vol.1, No.1, pp. 11-17, 2019, DOI:10.32604/jcs.2019.05856
    Abstract In order to secure the massive heterogeneous medical data for the complex scenarios and improve the information sharing efficiency in healthcare system, a distributed medical data ledger model (DMDL) is proposed in this paper. This DMDL model has adopted the blockchain technology including the function decoupling, the distributed consensus, smart contract as well as multi-channel communication structure of consortium blockchain. The DMDL model not only has high adaptability, but also meets the requirements of the medical treatment processes which generally involve multi-entities, highly private information and secure transaction. The steps for processing the medical data are also introduced. Additionally, the… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data

    Guangyong Yang1,*, Mengke Yang2,*, Shafaq Salam3, Jianqiu Zeng4
    Journal of Cyber Security, Vol.1, No.1, pp. 19-28, 2019, DOI:10.32604/jcs.2019.05947
    Abstract Big data is becoming increasingly important because of the enormous information generation and storage in recent years. It has become a challenge to the data mining technique and management. Based on the characteristics of geometric explosion of information in the era of big data, this paper studies the possible approaches to balance the maximum value and privacy of information, and disposes the Nine-Cells information matrix, hierarchical classification. Furthermore, the paper uses the rough sets theory to proceed from the two dimensions of value and privacy, establishes information classification method, puts forward the countermeasures for information security. Taking spam messages for… More >

  • Open AccessOpen Access

    ARTICLE

    A Block Compressed Sensing for Images Selective Encryption in Cloud

    Xingting Liu1, Jianming Zhang2,*, Xudong Li2, Siwang Zhou1, Siyuan Zhou2, Hye-JinKim3
    Journal of Cyber Security, Vol.1, No.1, pp. 29-41, 2019, DOI:10.32604/jcs.2019.06013
    Abstract The theory of compressed sensing (CS) has been proposed to reduce the processing time and accelerate the scanning process. In this paper, the image recovery task is considered to outsource to the cloud server for its abundant computing and storage resources. However, the cloud server is untrusted then may pose a considerable amount of concern for potential privacy leakage. How to protect data privacy and simultaneously maintain management of the image remains challenging. Motivated by the above challenge, we propose an image encryption algorithm based on chaotic system, CS and image saliency. In our scheme, we outsource the image CS… More >

  • Open AccessOpen Access

    ARTICLE

    Review of Access Control Model

    Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2
    Journal of Cyber Security, Vol.1, No.1, pp. 43-50, 2019, DOI:10.32604/jcs.2019.06070
    Abstract Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed. More >

Per Page:

Share Link