You are on page 1of 8

Transparent Computing

A Multilevel Access Control Scheme for


Data Security in Transparent Computing

Tao Peng | Central South University, China


Qin Liu | Hunan University
Guojun Wang | Guangzhou University

The Multilevel Access Control Scheme in Transparent Computing (MACTC) can protect user data
by providing different security levels, while offering multilevel access control and valid identity
authentication. The proposed scheme is effective in multilevel data security, flexible in authorized
resource sharing, and secure against various malicious attacks.

I
n recent years, computing paradigms have evolved along with the rapid development of computer
networks and information technologies. Transparent computing1–3 is an emerging technology that
lets users enjoy user-controlled services by extending the stored program concept in the von Neumann
architecture spatiotemporally into networking environments. Transparent computing loads a variety
of heterogeneous OSs and applications dynamically on different devices. This feature lets users focus on
the available application services without worrying about which physical device will be used or on which
OS it should be run.
This new mechanism comes with many advantages for information security.4,5 Centralized manage-
ment on servers brings convenience to the protection of user data and reduces the risk of information
leakage and data theft. However, transparent computing also brings new challenges to service reliability
and security: OSs, applications, and data are centralized on servers and shared by all users. Imagine a
scenario in which an enterprise uses transparent computing as its office system. Some information (files,
tables, data, and so on) will be produced during day-to-day work and will have different security levels

46 Computing in Science & Engineering 1521-9615/17/$33.00 © 2017 IEEE Copublished by the IEEE CS and the AIP January/February 2017
and access permissions. For example, open files can Personal DB
be shared with everyone, but some sensitive tables
might be revealed only to specific users and some
TC1
private personal information won’t be disclosed to
anyone. Thus, according to their sensitivity, users TC2
will have to classify information into three catego-
TS1 TS2
ries: public information, sensitive information, or TC3
Network
private information. Users in transparent comput-
communication
ing reserve zero storage space on their clients; all TCn AS
TS3 TSn
execution results and data must be stored on trans-
parent servers (TSs). But without user consent,
the data stored on servers could be abused or mis- Figure 1. System configuration of our proposed Multilevel Access Control
Scheme in Transparent Computing (MACTC). MACTC has three parts:
used by unauthorized accesses or server managers. the user/TC (transparent client), the authentication server (AS), and the
Therefore, a secure protection scheme is imperative transparent server (TS).
to encrypt each user’s private information before
storing it on TSs, and that scheme should protect
user information with multilevel security, provid- environment. For ease of explanation, we only use
ing precise access control as well. Some existing a single AS in this article, but multiple ASs can be
multiple-receiver encryption schemes use attribute- deployed as necessary.
based encryption (ABE)6,7 to achieve multilevel In consideration of the diversification of user
confidentiality and fine-grained access control, but demands in transparent computing environments
these methods have high computation costs due (users only need basic username/password authenti-
to bilinear map operations during encryption and cation while using a personal desktop but could re-
decryption. Moreover, effective user revocation is quire different biometric information for enhanced
an intractable issue in these schemes because the security while using mobile devices), we use a selec-
data should be re-encrypted when privilege is re- tive multimodality biometric strategy to validate an
voked.8 How to protect multilevel data security individual’s identity, including fingerprint, palm-
and achieve authorized resource sharing in an ef- print, voice, image, and so on. Users can choose a
ficient and flexible way in such an environment has biometric input modality for identity authentica-
become a problem. tion according to their hardware and software plat-
In this article, we propose a Multilevel Ac- forms or environments.
cess Control Scheme in Transparent Computing
(MACTC) to protect user data with different se- Technique Preliminaries
curity levels. The proposed scheme introduces an Transparent computing is aimed at providing a
authentication server (AS) that acts as an authenti- cross-platform experience for users transparently and
cation authority to perform multilevel access con- seamlessly. All resources (including OSs) are stored
trol and identity authentication, dealing with user on remote TSs, with TCs acting as lightweight, al-
data access, storage, transmission, and processing most bare-bones computers. Managed by the trans-
in a transparent computing environment. parent OS, META OS,9 the instance OS and other
resources can be delivered through the network and
System Model requested on demand for local execution in a block-
MACTC has three parts: the user/TC (transparent streaming way.
client), the AS, and the TS; Figure 1 shows the pro- According to sensitivity, users classify infor-
posed scheme’s frame structure. mation into one of three categories, A, B, or C, as
In our scheme, we regard a user and a TC as one follows: A level is public information and is shared
party after successful verification between them. We with all legal users, so anyone in the system can
introduce an AS, a third trust party (TTP)-based access it. B level is sensitive information, is partly
entity, into the scheme, which is located in front of public, and is shared with authorized users, such
the TSs. The AS’s task is to authenticate a legitimate as authorized colleagues and team members; the B
user and verify his or her read and write permissions level of information must be encrypted with dis-
to the protected data. We assume that the AS is de- tinctive encryption keys. C level is private informa-
ployed in a small- or medium-sized business that tion, not public, and can’t be shared with anyone;
does its general work in a transparent computing the C level of information can be protected with

www.computer.org/cise  47
Transparent Computing

Users can set up their routine daily information with the


fixed level in advance when they enroll in a transparent
computing office system (other information is optional). In
this way, users can control their own information themselves.

encryption and decryption by the user him- or file is successfully saved to the personal database on
herself, and encryption keys shouldn’t be revealed the TS:
to anyone. The classifying standard is determined
by a user with a subjective standard. Users can set FPij = ri1(x – u1_BFij)(x – u2_BFij)…(x – ui_BFij)…
up their routine daily information with the fixed (x – ul_BFij) + ri2,(5)
level in advance when they enroll in a transpar-
ent computing office system (other information is where ri1, ri2 are random values, i, j (j < m, m is the
optional). In this way, users can control their own total number of B level of files), and l (l < n, n is
information themselves. the total number of users) are positive integers. The
We use the polynomial generated by the AS polynomial FPij is a l-degree polynomial, meaning
to verify the user’s privilege to access each file of it controls the set of users who can access the jth file
the corresponding security level in the database for user i’s B level of information. We define ul_BFij
(DB). Similar to other related work,10 we propose as the file authentication value, which user l can get
the following access control polynomials for our from the AS to access the jth file in the B-level data
MACTC scheme: of user i. For all 1 ≤ j ≤ m, we set ui_BFij = bi,
which means the user i can access all his or her own
LPi = ri1 + (x – Bi){ri2 + (x – Ci)},(1) files in the B level of data, just by providing the level
authentication value, bi.
Bi = h(bi), Ci = h(ci) + h(BTi),(2)
Proposed Scheme
BLi = LPi(Bi) = ri1, and (3) Now that we’ve described some of the background,
we can present more details about the MACTC
CLi = LPi(Ci) = ri1 + ri2(Ci – Bi)2),(4) scheme, which includes the registration, login,
multilevel access control, and password or authori-
where ri1, ri2 are random numbers, and BLi, CLi are zation change phases.
access control polynomials generated by the AS to
control a user i’s access to the B and C levels of Registration Phase
data. We define Bi, Ci as level authentication iden- The process of registration phase is as follows:
tifiers, which means they’re accessible to user i.
With the level authentication value bi, ci retrieved ■■ R1. User i chooses his or her identity (IDi) and
from the AS, a user i has the chance to obtain the password (PWi) for registration, and then enters
correct Bi, Ci using Equation 2 to verify validity a biometric (including image, fingerprint, or
and get privileges to the B and C levels of data. To palmprint information, denoted as (Ii, Fi, Pi))
retrieve the private C level of data, a user has to into the scanner-embedded device or records
provide a biometric for the terminal device, and his or her voice (denoted as Vi) on the record-
the TC captures template information and com- ing equipment in the TC, which captures and
putes hash values of it, h(BTi). Only when the user stores the biometric template as BTi.
provides a biometric whose hash value matches the ■■ R2. User i encrypts the information with the AS’s
one stored on the AS can he or she pass the valida- public key, pkas, which is E ∗pkas ( IDi , h( PWi ), h( BTi )),
tion process. In this way, the scheme can guarantee where h(·) is a collision-resistant hash function.
security of the C level of data. ■■ R3. User i sends registration information to
For each file in the B level of data for user i, de- the AS. The message from the user to the AS is
fined as BFij, the user can designate a set of l users MSGU 2 A = { E ∗pkas ( IDi , h( PWi ), h(BTi ))}.
to share the file. The AS will generate the following ■■ R4. The AS decrypts the message with its pri-
polynomial for file-level access control, when each vate key, then checks its user list and confirms

48  January/February 2017
the validity of the registration request. If i is correct α. With this α, the AS computes h( BTi * ) by
a fresh registrant, the AS encrypts the user’s h(BTi * ) = c − a. Then, the AS checks if the h( BTi * )
registration as E kas ( h( PWi ), h( BTi )) and then matches the biometric template in its database.
creates a new entry, storing the registration ■■ L9. User i logs in successfully if he or she can
information of i. Otherwise, IDi exists in the pass all of the above validation steps.
user list, and the AS returns the information
“IDi already exists” to user i.
Multilevel Access Control Phase
Login Phase We introduce multilevel access control from the
After user i registers to the AS, when i wants to log processes of writing, reading, and updating files in
in to the server, the login and authentication phase three categories. For write files:
works as follows:
■■ MW1. If user i tries to save his or her data
■■ L1. User i chooses the biometric modality into the remote TS, referring to the B and C
he or she wants to use according to the TC’s levels of files, he or she should encrypt them
hardware configuration and environment, and on the TC before uploading the information,
then enters biometric information, such as E k BFij ( BFij ); E k CFij (CFij ),
fingerprint, palmprint, voice, image, and so
on, which the TC captures as template infor- where BFij, CFij are the jth files of i’s B and C levels of
mation I i*, Fi *, Pi *, and Vi *, respectively. data, and k _BFij and k_CFij are their secret keys. Here-
■■ L2. User i inputs his or her password PWi * and after, we assume x = E k BFij ( BFij ); y = E k CFij (CFij ).
biometric BTi *. The TC verifies the values of
them with the PWi and BTi, which were stored ■■ MW2. User i names the specific users to share
during the registration phase, and checks whether this B level of data. The set of privileged users
h( PWi ) = ? h( PWi * ), h( BT )i = ? h(BTi * ). If they can be represented by Ui = u1, u2, …, ul .
aren’t correct, i reenters them. ■■ MW3. User i encrypts the requirement us-
■■ L3. User i randomly generates a value, α, with the ing session key α, which is generated dur-
same size as the hash value’s output, which will be used ing the login phase, and sends the following
as a session key and a masking value. The random message to the AS: MSG U2A = {E α (w_B ij, x,
value should be generated every session and should Ui ; w_C ij, y)}.
be different every time. Then, the TC computes ■■ MW4. The AS decrypts the message with α,
a = E ∗pkas (t ), b = h( PWi * )α + t , c = h( BTi * ) + α implements i’s demand, and then transfers the
and d = h(a|b|c), where pkas is the public key of queries to the corresponding TS in the form of
the AS. In the expression of b, we add the time- E kat ( x , y ), where kat is a secret key shared be-
stamp t to the value of h( PWi * )α. The reason tween the AS and the TS. The message from
is that h( PWi * ) is a constant parameter, so if the AS to TS is MSG A 2T = { E kat ( x , y )}.
b = h( PWi * )α, an attacker could obtain the ■■ MW5. Upon receiving the message from the
common factor from successive attacks on b. AS, the TS decrypts it with kat and executes the
■■ L4. User i sends his or her login request and re- task of writing files in user i’s database. Dur-
lated information to the AS. The message from ing this process, the data exists in the form of
user to the AS is MSGU2A = {a, b, c, d}. encryption; neither the AS nor the TS can read
■■ L5. The AS performs an integrity check of the the plaintext file.
message by d = ?h(a|b|c). ■■ MW6. Once the files are successfully saved in
■■ L6. Upon receiving the message from user i, the TS database, the AS will generate a multi-
the AS decrypts a = E ∗pkas (t ) with its private level database access control polynomial LPi via
key skas and checks t ∈ TTL (time to live). Equation 1 and file-level database access con-
■■ L7. If all verifications are successful, the AS trol polynomial FPij via Equation 5.
decrypts the user i’s registration information ■■ MW7. The AS returns level authentication val-
E kas ( h( PWi ), h( BTi )), which is stored in the AS ues bi and ci to user i and then distributes file
database. authentication values {ul_BFij} to users u1, u2, …,
■■ L8. The AS computes the value of α by α = (b − t ) (h(PW )),
i ul, with which user l can access the jth file of the
where h(PWi    ) is the decrypted value from point L7. B level of data from user i’s DB. The message
As long as h( PWi * ) = h( PWi ), the AS can get the from the AS to the user is MSGA2U = {E α(bi, ci)}.

www.computer.org/cise  49
Transparent Computing

For read files, a user can access his or her own gets the origin data with the encryption keys
personal DB with the level authentication values k_BFij, k_CFij, k_BFoj, where the key k_BFoj
and access other personal DBs with file authentica- can be negotiated between user o and i. Fi-
tion values. Let’s illustrate the process of reading nally, user i can obtain what he or she wants
files with an example: user i tries to retrieve the jth as follows:
file of the B and C levels of information from his or Dk_BFij ( E k_BFij ( x )) = BFij , C k_CFij ( E k_CFij ( y )) = CFij ,
her own DB and another user o’s B level of data in
o’s personal DB: Dk_BFoj ( E k_BFoj ( z )) = BFoj .

■■ MR1. Using the session key α, user i encrypts For update files, if the user wants to update his
the query message, including the level authen- or existing data in a personal DB with the B and C
tication values bi, ci and the file authentication levels of information, the user must first pass the
value ui_BFoj, which i can get from the AS once validation processing performed by the AS to get
i is appointed as one of the privileged users permission to update files:
for the jth file of o’s B level of data. For the C
level of data, i should also provide one piece of ■■ MU1. User i sends a request and related au-
biometric information, h( BTi * ). Then i sends a thentication values to the AS. Before submit-
message to the AS: ting the message, he or she encrypts it with a
MSGU 2 A = { E α (r_Bij , bi ; r_C ij , ci , h( BTi * ); r_Boj , ui _BFoj )}. session key. The message from the user to the
AS is MSGU2A = {E α(q)}, where
■■ MR2. The AS decrypts the message, then
q = {u_Bij , E k_BFij (uBFij ), bi ; u_C ij , E k_CFij (uCFij ), ci , h(BTi * )},
computes the level-authentication identifiers
Bi, Ci with the submitted bi, ci, and h( BTi * ): and uBFij and uCFij are the updated files of i.
Bi = h(bi ),C i = h(ci ) + h(BTi * ). ■■ MU2. The AS decrypts the message, then
■■ MR3. The AS checks LPi(Bi) = ?BLi and LPi(Ci) computes the level-authentication identifiers
= ?CLi, where BLi, CLi are generated during the Bi, Ci with the submitted bi, ci, and h( BTi * ):
write file phase in MW5. This access control Bi = h(bi ),C i = h(ci ) + h( BTi * ).
process is to verify whether or not user i has ■■ MU3. The AS checks LPi(Bi) = ?BLi and
permission to retrieve the corresponding level LPi(Ci) = ?CLi, where BLi, CLi are generated
of data in his or her own personal DB. during the write file phase in MW5. This pro-
■■ MR4. The AS checks user i’s ability to access cess is to verify whether user i is allowed to
someone else’s personal DB. The AS first checks update the corresponding level of data in a per-
if IDi ∈ Uo, where Uo is the authorized user set sonal DB or not.
assigned by user o during his or her write file ■■ MU4. If the authentication is successful, the AS trans-
phase in MW2. Then, the AS computes the fers the encrypted latest information with kat to the TS.
polynomial for file-level access control and We set x ' = E k_BFij (uBFij ); y ' = E k_CFij (uCFij ) .
checks FPoj(ui_BFoj) = ?FPoj, where FPoj is gener- The message from the AS to the TS is then
ated when user o successfully saved his or her MSG A 2T = { E kat ( x ', y ')}.
jth file of the B level of data in a personal DB. ■■ MU5. Upon receiving the message from the
■■ MR5. If i has conformed to all the access AS, the TS decrypts it and performs the proce-
control rules, the AS queries the TS with dure of updating files.
E kat (r_Bij , r_C ij , r_Boj ) , where kat is a secret key
shared between the AS and the TS. Password or Authorization Change Phase
■■ MR6. The TS decrypts the message with kat, con- For a password change,
ducts the AS’s query, and returns results to the AS
with s, x, y, z, where s = h(x|y|z); x = E k BFij (BFij ); ■■ P1. User i presents a password change request
y = E k CFij (CFij ); and z = E k BFoj (BFoj ).The message to the registration server AS, and then after
from the TS to the AS is MSGT2A = {x, y, z, s}. i logs in to the system, he or she has to pro-
■■ MR7. The AS checks information integrity with vide the original password PWi and biomet-
s = ?h(x|y|z), then encrypts the results with a ses- ric information to authenticate on the AS:
sion key and transfers them to i. The message MSGU 2 A = { E α ( h( PWi ' ), h( PWi * ), h(BTi * ))} .
from the AS to the user is MSGA2U = {Eα(x, y, z)}. ■■ P2. The AS decrypts stored registration infor-
■■ MR8. User i decrypts the message with α and mation in his database and checks the hash

50  January/February 2017
value of the password and biometric against the Table 1. Performance of login and access control phases.
stored one. Access control
■■ P3. If the verification results are correct, the Entity Login Write Read Update
AS conducts the update of i’s password and Transparent client E* + 3H 2E + D E+D 2E
encrypts the latest information with his or
Authentication server D* + D + H 3E + D 2E + D + H E+D
her private key, then replaces the one in the
database. Transparent server 0 D D+H D

When user i wants to revoke someone’s privi- TCs and extraction methods or matching algo-
lege or change the set of authorized users for the rithms), rather than by the scheme we designed.
jth file of his or her B level of information, i should We didn’t develop a new biometric authentica-
negotiate with the AS: tion algorithm but instead use a known efficient
method; thus, we exclude it from our perfor-
■■ A1. User i presents the authorized user modi- mance analysis.
fication request for his or her B-level file, and During the login phase, the TC should submit
then after logging in to the system, provides the encrypted timestamp, the user’s hashed pass-
the level authentication value bi to pass the word, and a biometric. From the AS side, it first
verification procedure on the AS. needs to conduct an integrity check on the mes-
■■ A 2. The AS validates user i and checks sage, decrypt the timestamp to check the TTL, and
LPi(bi) = ?BL i . then decrypt the user’s stored registration informa-
■■ A3. If the verification is successful, the AS up- tion to perform identity authentication. Hence, the
dates the set of authorized users Ui and changes proposed protocol needs 3H + E ∗ computations on
the corresponding file-level access control poly- the user side and H + D ∗ + D computations on the
nomial FPij for user i’s jth file. Disqualified us- AS side during the login phase.
ers can’t access this file anymore because the During the access control phase, performance
authorized user set and polynomial have been depends on the attribute and amount of data that
changed. a user wants to store or retrieve. We take as an
example a user trying to write, read, and update
Performance Analysis and Evaluation his or her B-level file on the TSs to illustrate com-
Now let’s review our scheme’s performance analysis putation performance. This level of information
and evaluation. should use encryption or decryption when up-
loading or downloading from the TSs. Messages
Performance Analysis between the TC and the AS are encrypted by a
Our scheme has four phases, so we focus on session key, and messages between the AS and
the performance of the login and access control the TSs are encrypted by the shared key. When
phases because they’re the principal parts of the getting results from the TSs, the AS and the TS
proposed protocol and should be implemented should check message integrity. Especially in
for each session. Specifically, we focused on the this phase, the AS needs to generate or verify LPi
MACTC protocol’s performance from the TC, and FPij to conduct access control for the B and
AS, and TS angles. We believe that the most ex- C levels. LPi is a three-degree polynomial whose
pensive computations are the asymmetric encryp- computation time is relatively low. The FPij is a
tion E ∗(K, X ) and asymmetric decryption D ∗(K, one-degree polynomial, if the number of autho-
Y ), abbreviated as E ∗ and D ∗, then the symmetric rized users is one. We can build FPij based on the
encryption E(K, X ) and the symmetric encryp- Equation 5 and set each factor of the polynomial
tion D(K, Y ), abbreviated as E and D, and finally, as a distinct floating point number. The running
the one-way hash function h(·), abbreviated as H. time of generating and calculating these polyno-
In the following analysis, we focus on these three mials is negligible. Table 1 shows the computa-
operations because the others, such as modular tion overhead on the TC, the AS, and the TS.
multiplication, concatenation, XOR operation, The communication cost of authentication
and so on, require very few computations; thus, includes the cost of transmitting the messages
we ignore their computation costs here. The bio- involved, which in our scheme, relies to a large
metric authentication process is much more af- extent on the information that users want to ac-
fected by environmental factors (such as diverse cess. For all implementations throughout the

www.computer.org/cise  51
Transparent Computing

Table 2. Computation costs.


Messages(bytes) Files (Kbytes)
Processing 32 64 128 512 1,024 1 100 500 1,000 5,000
E* (ms) 117 117 118 120 125 N/A N/A N/A N/A N/A
D* (ms) 7 17 20 50 93 N/A N/A N/A N/A N/A
E (ms) 83 85 88 93 98 97 147 253 386 1,482
D (ms) 0.8 0.8 1 2 3 3 28 92 176 862
H (ms) 7 8 9 11 16 13 17 21 30 101

MACTC’s four phases, the authentication and time. It takes 0.1 seconds of encryption time and
access control methods such as password, biomet- 0.003 seconds of decryption time for a 1-Kbyte
ric, audiovisual, and access control polynomials message, and 0.4 seconds of encryption time and
are applied by only a one-round protocol. If one 0.2 seconds of decryption time for a 1,000-Kbyte
of these verification processes fails, the protocol file. From the user side, the encryption and de-
would terminate. This is the minimum number cryption are performed once or twice each session
of rounds to achieve authentication, data sharing, (depending on the operations used), so we can
and access control processes, as well as all other say the computation overheads of our scheme are
functions. Therefore, we can say that communica- reasonable.
tion overheads for the TC, the AS, and the TS are
reasonable in the proposed scheme.

Evaluation
We evaluated the MACTC scheme’s perfor-
O ur goal is to provide security management for
user data access, storage, transmission, and
processing in transparent computing. In future work,
mance in terms of running time for various we’ll improve our scheme by deploying multiple ASs
operations in each phase. Our experiments are to avoid the potential bottleneck between users and
implemented with Java Development Kit (JDK)- the TSs, and ensure high availability of the system.
1.7 and the Eclipse integrated development en-
vironment (IDE), running on a local machine Acknowledgments
with an Intel Core-i5 2.5 GHz, 2 Gbytes R AM, This research was supported in part by the National
and Window7 OS. The performance of the in- Natural Science Foundation of China under grant num-
volved phases depends on the size of messages bers 61632009, 61472451, 61272151, and 61402161, the
and files, so we set message sizes to 32, 64, 128, International Science & Technology Cooperation Pro-
512, and 1,024 bytes and files sizes to 1, 100, gram of China under grant 2013DFB10070, the Hunan
500, 1,000, and 5,000 Kbytes. We use the asym- Provincial Science Technology Program of China under
metric encryption algorithm RSA to treat short grant 2012GK4106, and the Hunan Provincial Natural
messages. Specifically, the encryption data of Science Foundation of China under grant 2015JJ3046.
RSA includes two parts: MSGU2A in Step R3 and Guojun Wang is the corresponding author of this
the timestamp t in Step L3. We use the symmet- article.
ric encryption algorithm 256-bit AES to encrypt
messages and files, and hash function 256-bit References
SHA to ensure data integrity. Table 2 shows the 1. Y. Zhang and Y. Zhou, “Transparent Computing:
computation costs. Spatio-temporal Extension on von Neumann Ar-
From the evaluation, we found that the most chitecture for Cloud Services,” Tsinghua Science and
expensive operation is asymmetric encryption, Technology, vol. 18, no. 1, 2013, pp. 10–21.
which takes about 0.1 to 0.2 seconds to encrypt a 2. Y. Zhang and Y. Zhou, “Transparent Computing:
short message, but Table 1 shows that this opera- A New Paradigm for Pervasive Computing,” Proc.
tion must be performed only once during the login Ubiquitous Intelligence and Computing Conf., 2006,
phase. The running time of a hash function (256- pp. 1–11.
bit SHA) is no more than 0.02 seconds for mes- 3. Y. Zhang and Y. Zhou, “TransOS: A Transpar-
sages and about 0.03 seconds for a 1,000-Kbyte ent Computing-Based Operating System for the
file. The symmetric encryption and decryption Cloud,” Int’ l J. Cloud Computing, vol. 1, no. 4,
(256-bit AES) consume most of the computation 2012, pp. 287–301.

52  January/February 2017
4. Y. Zhang et al., “Information Security Underly- Tao Peng is working toward a PhD in the School
ing Transparent Computing: Impacts, Visions and of Information Science and Engineering at Central
Challenges,” Web Intelligence and Agent Systems, vol. South University, Changsha, China. Her research
8, no. 2, 2010, pp. 203–217. interests include network and information security
5. G. Wang et al., “Security from the Transparent issues. Peng received an MSc in circuits and systems
Computing Aspect,” Proc. IEEE Conf. Comput- from Hunan Normal University. Contact her at peng-
ing, Networking and Communications, 2014, pp. tao_work@163.com.
216–220.
6. Q. Liu, G. Wang, and J. Wu, “Time-Based Proxy Qin Liu is an assistant professor in the College of
Re-encryption Scheme for Secure Data Sharing in a Computer Science and Electronic Engineering at Hu-
Cloud Environment,” Information Sciences, vol. 258, nan University, China. Her research interests include
2014, pp. 355–370. security and privacy issues in cloud computing. Liu re-
7. G. Wang et al., “Hierarchical Attribute-Based En- ceived a PhD in computer science from Central South
cryption and Scalable User Revocation for Sharing University. Contact her at gracelq628@hnu.edu.cn.
Data in Cloud Servers,” Computers & Security, vol.
30, no. 5, 2011, pp. 320–331. Guojun Wang is a professor at Guangzhou University,
8. Z. Xia et al., “A Secure and Dynamic Multi-key- China. Before joining Guangzhou University, he was a
word Ranked Search Scheme over Encrypted Cloud professor at Central South University, China. His re-
Data,” IEEE Trans. Parallel and Distributed Systems, search interests include network and information secu-
vol. 27, no. 2, 2015, pp. 340–352. rity, the Internet of Things, and cloud computing. Wang
9. Y. Zhang and Y. Zhou, “4VP: A Novel Meta received a PhD in computer science from Central South
OS Approach for Streaming Programs in Ubiq- University. He’s a distinguished member of the China
uitous Computing,” Proc. Int’ l Conf. Advanced Computer Federation and a member of IEEE, ACM,
Information Networking and Applications, 2007, and IEICE. Contact him at csgjwang@gmail.com.
pp. 394–403.
10. H.-A. Park et al., “Combined Authentication-Based
Read your subscriptions through the
Multilevel Access Control in Mobile Application for
myCS publications portal at http://
Daily Life Service,” IEEE Trans. Mobile Computing,
mycs.computer.org.
vol. 9, no. 6, 2010, pp. 824–837.

Recognizing Excellence in High Performance Computing


Nominations are Solicited for the
SEYMOUR CRAY, SIDNEY FERNBACH, & KEN KENNEDY AWARDS

SEYMOUR CRAY COMPUTER ENGINEERING AWARD


Established in late 1997 in memory of Seymour Cray, the Seymour Cray Award is awarded to recog-
nize innovative contributions to high performance computing systems that best exemplify the creative
spirit demonstrated by Seymour Cray. The award consists of a crystal memento and honorarium of Deadline: 1 July 2017
US$10,000. This award requires 3 endorsements.
All nomination details available at
http://awards.computer.org

SIDNEY FERNBACH MEMORIAL AWARD


Established in 1992 by the Board of Governors of the IEEE Computer Society. It honors the memory
of the late Dr. Sidney Fernbach, one of the pioneers on the development and application of high per-
formance computers for the solution of large computational problems. The award, which consists of
a certificate and a US$2,000 honorarium, is presented annually to an individual for “an outstanding
contribution in the application of high performance computers using innovative approaches.” This
award requires 3 endorsements.

ACM/IEEE-CS KEN KENNEDY AWARD


Established in memory of Ken Kennedy, the founder of Rice University’s
nationally ranked computer science program and one of the world’s foremost experts on high-perfor-
mance computing. A certificate and US$5,000 honorarium are awarded jointly by the ACM and the
IEEE Computer Society for outstanding contributions to programmability or productivity in high per-
formance computing together with significant community service or mentoring contributions. This
award requires 2 endorsements.

www.computer.org/cise 53

You might also like