You are on page 1of 54

Advanced Hybrid Information

Processing: First International


Conference, ADHIP 2017, Harbin, China,
July 17–18, 2017, Proceedings 1st
Edition Guanglu Sun
Visit to download the full and correct content document:
https://textbookfull.com/product/advanced-hybrid-information-processing-first-internati
onal-conference-adhip-2017-harbin-china-july-17-18-2017-proceedings-1st-edition-gu
anglu-sun/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advanced Hybrid Information Processing: First


International Conference, ADHIP 2017, Harbin, China,
July 17–18, 2017, Proceedings 1st Edition Guanglu Sun

https://textbookfull.com/product/advanced-hybrid-information-
processing-first-international-conference-adhip-2017-harbin-
china-july-17-18-2017-proceedings-1st-edition-guanglu-sun/

Advanced Hybrid Information Processing Third EAI


International Conference ADHIP 2019 Nanjing China
September 21 22 2019 Proceedings Part I Guan Gui

https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-i-guan-gui/

Advanced Hybrid Information Processing Third EAI


International Conference ADHIP 2019 Nanjing China
September 21 22 2019 Proceedings Part II Guan Gui

https://textbookfull.com/product/advanced-hybrid-information-
processing-third-eai-international-conference-adhip-2019-nanjing-
china-september-21-22-2019-proceedings-part-ii-guan-gui/

Social Media Processing 6th National Conference SMP


2017 Beijing China September 14 17 2017 Proceedings 1st
Edition Xueqi Cheng

https://textbookfull.com/product/social-media-processing-6th-
national-conference-smp-2017-beijing-china-
september-14-17-2017-proceedings-1st-edition-xueqi-cheng/
Trusted Computing and Information Security: 11th
Chinese Conference, CTCIS 2017, Changsha, China,
September 14-17, 2017, Proceedings 1st Edition Ming Xu

https://textbookfull.com/product/trusted-computing-and-
information-security-11th-chinese-conference-ctcis-2017-changsha-
china-september-14-17-2017-proceedings-1st-edition-ming-xu/

Neural Information Processing: 24th International


Conference, ICONIP 2017, Guangzhou, China, November
14-18, 2017, Proceedings, Part II 1st Edition Derong
Liu Et Al. (Eds.)
https://textbookfull.com/product/neural-information-
processing-24th-international-conference-iconip-2017-guangzhou-
china-november-14-18-2017-proceedings-part-ii-1st-edition-derong-
liu-et-al-eds/

Advances in Multimedia Information Processing – PCM


2017: 18th Pacific-Rim Conference on Multimedia,
Harbin, China, September 28-29, 2017, Revised Selected
Papers, Part II Bing Zeng
https://textbookfull.com/product/advances-in-multimedia-
information-processing-pcm-2017-18th-pacific-rim-conference-on-
multimedia-harbin-china-september-28-29-2017-revised-selected-
papers-part-ii-bing-zeng/

China Satellite Navigation Conference CSNC 2017


Proceedings Volume I 1st Edition Jiadong Sun

https://textbookfull.com/product/china-satellite-navigation-
conference-csnc-2017-proceedings-volume-i-1st-edition-jiadong-
sun/

China Satellite Navigation Conference CSNC 2017


Proceedings Volume III 1st Edition Jiadong Sun

https://textbookfull.com/product/china-satellite-navigation-
conference-csnc-2017-proceedings-volume-iii-1st-edition-jiadong-
sun/
Guanglu Sun
Shuai Liu (Eds.)

219

Advanced Hybrid
Information Processing
First International Conference, ADHIP 2017
Harbin, China, July 17–18, 2017
Proceedings

123
Lecture Notes of the Institute
for Computer Sciences, Social Informatics
and Telecommunications Engineering 219

Editorial Board
Ozgur Akan
Middle East Technical University, Ankara, Turkey
Paolo Bellavista
University of Bologna, Bologna, Italy
Jiannong Cao
Hong Kong Polytechnic University, Hong Kong, Hong Kong
Geoffrey Coulson
Lancaster University, Lancaster, UK
Falko Dressler
University of Erlangen, Erlangen, Germany
Domenico Ferrari
Università Cattolica Piacenza, Piacenza, Italy
Mario Gerla
UCLA, Los Angeles, USA
Hisashi Kobayashi
Princeton University, Princeton, USA
Sergio Palazzo
University of Catania, Catania, Italy
Sartaj Sahni
University of Florida, Florida, USA
Xuemin Sherman Shen
University of Waterloo, Waterloo, Canada
Mircea Stan
University of Virginia, Charlottesville, USA
Jia Xiaohua
City University of Hong Kong, Kowloon, Hong Kong
Albert Y. Zomaya
University of Sydney, Sydney, Australia
More information about this series at http://www.springer.com/series/8197
Guanglu Sun Shuai Liu (Eds.)

Advanced Hybrid
Information Processing
First International Conference, ADHIP 2017
Harbin, China, July 17–18, 2017
Proceedings

123
Editors
Guanglu Sun Shuai Liu
Harbin University of Science Inner Mongolia University
and Technology Hohhot
Harbin China
China

ISSN 1867-8211 ISSN 1867-822X (electronic)


Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering
ISBN 978-3-319-73316-6 ISBN 978-3-319-73317-3 (eBook)
https://doi.org/10.1007/978-3-319-73317-3

Library of Congress Control Number: 2017962886

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

Printed on acid-free paper

This Springer imprint is published by Springer Nature


The registered company is Springer International Publishing AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

We are delighted to introduce the proceedings of the first edition of the 2017 European
Alliance for Innovation (EAI) International Conference on Advanced Hybrid Infor-
mation Processing (ADHIP). This conference gathered together researchers, develop-
ers, and practitioners from around the world who are leveraging and developing
theories and methods for hybrid information compression, classification, and recog-
nition. The theme of ADHIP 2017 was “Data-Driven Theory, Method, and Application
in the Real World.”
The technical program of ADHIP 2017 consisted of 65 full papers in oral presen-
tation sessions of the main conference tracks. The conference tracks were: Track 1,
“Advanced Methods and Applications for Hybrid Information”; Track 2, “Real
Applications of Aspects with Hybrid Information.”
Aside from the high-quality technical paper presentations, the technical program
also featured two keynote speeches given by Dr. Guoru Ding, IEEE Senior Member,
from the National Mobile Communications Research Laboratory of China and
Dr. Wanxiang Che from the Research Center for Social Computing and Information
Retrieval, Harbin Institute of Technology.
The steering chairs and all members of the Program Committee were essential for
the success of the conference. We sincerely appreciate their constant support and
guidance. It was also a great pleasure to work with such an excellent Organizing
Committee and we thank them for their hard work in organizing and supporting the
conference. In particular, we also thank the Technical Program Committee, led by our
TPC chair, Xiaochun Cheng, who completed the peer-review process of technical
papers and compiled a high-quality technical program. We are also grateful to con-
ference manager, Lenka Bilska, for her support and all the authors who submitted their
papers to the conference.
We strongly believe that this ADHIP conference provides a good forum for all
researchers, developers, and practitioners to discuss all science and technology aspects
that are relevant to hybrid information processing. We also expect that future ADHIP
conferences will be as successful and stimulating, as indicated by the contributions
presented in this volume.

November 2017 Shuai Liu


Guanglu Sun
Yun Lin
Guohui Yang
Organization

Organizing Committee
General Co-chairs
Guanglu Sun Harbin University of Science and Technology, China
Shuai Liu Inner Mongolia University, China

Technical Program Committee Co-chairs


Xiaochun Cheng Middlesex University, UK
Yun Lin Harbin Engineering University, China
Bo You Harbin University of Science and Technology, China

Web Chair
Houbing Song West Virginia University, USA

Publicity and Social Media Chair


Guohui Yang Harbin Institute of Technology, China

Workshops Chair
Ruolin Zhou Western New England University, USA

Sponsorship and Exhibits Chair


Xiaochun Cheng Middlesex University, UK

Publications Chair
Shuai Liu Inner Mongolia University, China

Panels Chair
Jingchao Li Shanghai Dianji University, China

Tutorials Chair
Guodong Wang South Dakota School of Mines and Technology, USA

Demos Chair
Qi Wang Nanjing Normal University, China
VIII Organization

Posters and PhD Track Chair


Zhiping Zhang Wright State University, USA

Local Chairs
Jiazhong Xu Harbin University of Science and Technology, China
Suxia Zhu Harbin University of Science and Technology, China

Conference Coordinator
Lenka Bilska EAI (European Alliance for Innovation)

Technical Program Committee


Yun Lin Harbin Engineering University, China
Guanglu Sun Harbin University of Science and Technology, China
Liang Zhang Jimei University, China
Zheng Pan Inner Mongolia University, China
Xuefei Ma Harbin Engineering University, China
Shanshan Li Harbin Engineering University, China
Chao Wang Harbin Engineering University, China
Seng Wang Harbin Engineering University, China
Meiyu Wang Harbin Engineering University, China
Zhigang Li Harbin Engineering University, China
Yuan Liu Western New England University, USA
Weina Fu Inner Mongolia Agricultural University, China
Jiazhong Xu Harbin University of Science and Technology, China
Yongjun He Harbin University of Science and Technology, China
Kuang Zhang Harbin Engineering University, China
Guodong Wang South Dakota School of Mines and Technology, USA
Shuai Liu Inner Mongolia University, China
Zhiqiang Wu Wright State University, USA
Guohui Yang Harbin Institute of Technology, China
Zhutian Yang Harbin Institute of Technology, China
Guoru Ding Pla University of Science and Technology, China
Ao Li Harbin University of Science and Technology, China
Jingchao Li Shanghai Dianji University, China
Xiaochun Cheng Middlesex University, UK
Gihog Min Pai Chai University, South Korea
Jing Qiu Harbin University of Science and Technology, China
Xumin Ding Harbin University of Science and Technology, China
Suxia Zhu Harbin University of Science and Technology, China
Bo You Harbin University of Science and Technology, China
Organization IX

Wei Wang Harbin University of Science and Technology, China


Liu Shuai Inner Mongolia University, China
Gaocheng Liu Inner Mongolia University, China
Meng Ye Lu Inner Mongolia University, China
Fanyi Meng Harbin Institute of Technology, China
Contents

Application of Improved RFID Anti-collision Algorithm in Cylinder


Inflation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
You Bo, Wu Kun, and Xu Jiazhong

User-Controlled Encrypted Data Sharing Model in Cloud Storage . . . . . . . . . 12


Yuezhong Wu, Shuhong Chen, Guojun Wang,
and Changyun Li

A Cache Consistency Protocol with Improved Architecture . . . . . . . . . . . . . 21


Qiao Tian, Jingmei Li, Fangyuan Zheng, and Shuo Zhao

A Fast Frequency Switching Algorithm for Multi-parameter Fusion


Decision Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Kaizhi Peng, Binbin Xu, Rui Fu, and Xiaoling Liu

Offline Chinese Signature Verification Based on AlexNet . . . . . . . . . . . . . . 33


Cui Wencheng, Guo Xiaopeng, Shao Hong, and Zou Limin

An Optimized Method for Turbocharged Diesel Engine EGR


Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Xiang-huan Zu, Chuan-lei Yang, He-chun Wang,
and Yin-yan Wang

Research on User Safety Authentication Based on Biometrics


in Cloud Manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Xiaolan Xie, Xiao Zhou, and Yarong Liu

An Improved Harris-SIFT Algorithm for Image Matching . . . . . . . . . . . . . . 56


Yu Cao, Bo Pang, Xin Liu, and Yan-li Shi

Spark Memory Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65


Wei Zhang and Jingmei Li

A Quantitative Model for Analysis and Evaluation of Tor Hidden


Service Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Peipeng Liu, Xiao Wang, Xin He, Chenglong Li, Shoufeng Cao,
Longtao He, and Jiawei Zhu

Research on Compressed Sensing Signal Reconstruction Algorithm


Based on Smooth Graduation l1 Norm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Xuan Chen
XII Contents

Performance Evaluation of Structured Compressed Sensing Based Signal


Detection in Spatial Modulation 3D MIMO Systems . . . . . . . . . . . . . . . . . . 94
Wei Ren, Guan Gui, and Fei Li

Facial Appearance Description Through Facial Landmarks Computation . . . . 103


Na Liu, Hao Ge, Lei Song, and Huixian Duan

Research and Implementation of Distributed Simulation System


Based on HLA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Weidong Zhang, Yun Xiao, and Ni Lei

Study on Rolling Bearing On-Line Health Status Estimation Approach


Based on Vibration Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Yulong Ying, Jingchao Li, Jing Li, and Zhimin Chen

A Novel Individual Radio Identification Algorithm Based


on Multi-dimensional Features and Gray Relation Theory . . . . . . . . . . . . . . 130
Hui Han, Jingchao Li, and Xiang Chen

A New Robust Rolling Bearing Vibration Signal Analysis Method . . . . . . . . 137


Jingchao Li, Yulong Ying, Guoyin Zhang, and Zhimin Chen

Two-Dimensional Fractal Dimension Feature Extraction Algorithm Based


On Time-Frequency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Wenwen Li, Zheng Dou, and Tingting Cao

Accurate Decision Tree with Cost Constraints. . . . . . . . . . . . . . . . . . . . . . . 154


Nan Wang, Jinbao Li, Yong Liu, Jinghua Zhu,
Jiaxuan Su, and Cheng Peng

A Signal Recognition Method Based on Evidence Theory . . . . . . . . . . . . . . 166


Xiang Chen, Hui Han, Hui Wang, Yun Lin, Mengqiu Chai,
and Mingyu Hu

Research on Intelligent Test Paper Based on Improved


Genetic Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Ruitao Nan and Jingmei Li

A Fast Cyclic Spectrum Detection Algorithm for MWC Based


on Lorentzian Norm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Junwei Peng, Zhiren Han, and Jingfang Sun

Trusted Computing Based on Interval Intuitionistic Fuzzy Sets


in Cloud Manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Xiaolan Xie, Xiaofeng Gu, and Xiaochun Cheng
Contents XIII

Topic-Aware Influence Maximization in Large Recommendation


Social Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Jinghua Zhu, Qian Ming, and Nan Wang

A Novel Channel Extraction Method Based on Partial Orthogonal


Matching Pursuit Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Wang Xiangjun, Dou Zheng, and Lin Yun

Reliability Evaluation of DCell Networks. . . . . . . . . . . . . . . . . . . . . . . . . . 213


Xi Wang, Funan He, Yuejuan Han, and Lantao You

Distributed Construction of Fault-Tolerance Virtual Backbone Network


for UAV Cluster Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Kai Tao, Xiaoyun Sun, Kaishi Zhang, and Xiaojun Liu

Learning the Structure of Dynamic Bayesian Network with Hybrid


Data and Domain Knowledges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Haiyang Jia, Juan Chen, and Zhiming Song

DLRRS: A New Recommendation System Based on Double Linear


Regression Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Chenglong Li, Zhaoguo Wang, Shoufeng Cao, and Longtao He

Chances and Challenges: How to Make a Successful MOOC . . . . . . . . . . . . 250


Hanbin Wu and Hong Gao

Survey on Spectrum Prediction Methods via Back Propagation


Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Zheng Dou, Tingting Cao, and Wenwen Li

Prediction Model Based Failure Time Data for Software Reliability. . . . . . . . 265
Peng Lin, Xu Tian, Xiaojuan Wang, Xu Cao, Jiejing Cao,
Jianli Li, and Yan Gong

Automated Segmentation of Carotid Artery Vessel Wall in MRI . . . . . . . . . . 275


Bo Wang, Gang Sha, Pengju Yin, and Xia Liu

Wavelet Threshold Denoising of ACO Optical Lens Image . . . . . . . . . . . . . 287


Ping Xue, Xiangyong Niu, Xiaohui Zhu, Hongmin Wang,
and Jihua Chen

Fast Feature Extraction Method for Faults Detection System. . . . . . . . . . . . . 297


Hongmin Wang, Xiaohui Zhu, Xiangyong Niu, and Ping Xue

The Influence of Vibration on Performance of Navigation Tasks. . . . . . . . . . 307


Ming-hui Sun, Wen-zhao Gu, Ming Ding, and Xiao-ying Sun
XIV Contents

The Comprehensive Quality Evaluation of Minority Students in Colleges


and Universities Based on Principle of Information Entropy . . . . . . . . . . . . . 319
Wu Wang, Lina Shan, and Yunjie Gu

An Artificial Neural Network Approach to Student Study Failure Risk


Early Warning Prediction Based on TensorFlow . . . . . . . . . . . . . . . . . . . . . 326
Mi Chunqiao, Peng Xiaoning, and Deng Qingyou

Immune Detector Optimization Algorithm with Co-evolution


and Monte Carlo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Xi Liang, Jiang Tao, Sun Guanglu, and Zhang Fengbin

Traffic Classification Based on Incremental Learning Method . . . . . . . . . . . . 341


Guanglu Sun, Shaobo Li, Teng Chen, Yangyang Su,
and Fei Lang

A Clustering Algorithm for the DAP Placement Problem in Smart Grid. . . . . 349
Guodong Wang, Yanxiao Zhao, Yulong Ying, Jun Huang,
and Robb M. Winter

A Fragile Watermarking Scheme of Anti-deleting Features


for 2D Vector Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
Guoyin Zhang, Qingan Da, Liguo Zhang, Jianguo Sun,
Qilong Han, Liang Kou, and WenShan Wang

Spatial Spectrum Estimation for Wideband Signals by Sparse


Reconstruction in Continuous Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Jiaqi Zhen and Yanchao Li

Improved K-Means Algorithm and Its Application to Vehicle


Steering Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Hui Qi, Xiaoqiang Di, Jinqing Li, and Hongxin Ma

Nearest-Neighbor Restricted Boltzmann Machine for Collaborative


Filtering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Xiaodong Qian and Guoliang Liu

A Low Energy Consumption Multi-sensor Data Fusion Method


for Fan Coil Unit Thermal Performance Test . . . . . . . . . . . . . . . . . . . . . . . 399
Cuimin Li, Jin Li, Bai Yu, and Lei Wang

Performance Analysis of Sparsity-Penalized LMS Algorithms


in Channel Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Jie Yang, Hao Huang, Jie Wang, Sheng Hong, Zijian Hua,
Jian Zhang, and Guan Gui

Research on Interference of Conventional Communication Signals . . . . . . . . 417


Bekki Sadek, Yun Lin, and Xiuwei Chi
Contents XV

Research on OFDM Carrier Synchronization . . . . . . . . . . . . . . . . . . . . . . . 425


Zhaorui Ma, Zheng Dou, and Zhigang Li

Design and Application of Electrocardiograph Diagnosis System Based


on Multifractal Theory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Chunkai Zhang, Ao Yin, Haodong Liu, and Jingwang Zhang

A Precoding Scheme Based on SLNR for Downlink


MU-MIMO Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Wei Zhang, Wenjie Wo, and Jingjing Duan

Research on LDPC - CPM Coded Modulation Communication System . . . . . 457


Xin Wei, Zhi-gang Li, and Zheng Dou

Intelligent Decision Modeling for Communication Parameter Selection


via Back Propagation Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Zheng Dou, Yaning Dong, and Chao Li

A Cross Domain Collaborative Filtering Algorithm Based on Latent


Factor Alignment and Two-Stage Matrix Adjustment. . . . . . . . . . . . . . . . . . 473
Xu Yu, Junyu Lin, Feng Jiang, Yan Chu, and Jizhong Han

Abnormal Traffic Flow Detection Based on Dynamic Hybrid Strategy. . . . . . 481


Yang Liu, Hongping Xu, Hang Yi, Xiaotao Yan, Jian Kang,
Weiqiang Xia, Qingping Shi, and Chaopeng Shen

Response to Multiple Attack Behaviour Models in Cloud Computing . . . . . . 489


Xu Liu, Xiaoqiang Di, Jinqing Li, Huamin Yang, Ligang Cong,
and Jianping Zhao

An Improved Genetic Algorithm on Task Scheduling . . . . . . . . . . . . . . . . . 497


Fangyuan Zheng and Jingmei Li

Shared Cache Allocation Based on Fairness in a Chip


Multiprocessor Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Dongfang Wang and Jingmei Li

Research on Fast Recognition Algorithm of Golf Swing . . . . . . . . . . . . . . . 505


Qiao Tian, Jingmei Li, Fangyuan Zheng, and Chao Lv

Soft Decision Feedback Turbo Equalizer Based on Channel Estimation . . . . . 510


Xingyuan You, Lintao Liu, and Haocheng Ding

Research on Integrity Protection of Data for Multi-server


in the Cloud Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
Guangjun Song, Dandan Lu, and Ming Li
XVI Contents

Implementation of Direction Finding Processor Based on the Novel DOA


Estimation with Channel Mismatch Self-calibration . . . . . . . . . . . . . . . . . . . 529
Yan Zou, Ping Chu, and Xiaoyu Lan

Computationally Efficient 2D DOA Estimation for Cylindrical


Conformal Array. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538
Xiaoyu Lan and Yan Zou

Blind Source Separation for Multi-carrier Efficient Modulations


Using MIMO Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
Zhimin Chen, Jingchao Li, Peng Chen, and Pu Miao

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555


Application of Improved RFID Anti-collision
Algorithm in Cylinder Inflation System

You Bo, Wu Kun(&), and Xu Jiazhong

School of Automation, Harbin University of Science and Technology,


Harbin 150080, China
youbo@hrbust.edu.cn, haerbin_wukun@163.com

Abstract. An improved design of an inflatable system based on RFID smart


cylinder and an improved algorithm for preventing the collision of multiple
electronic tags during the recognition process are solved. The continuous filling
of the unmarked and discarded cylinders is solved, and the cross charging of the
cylinders is solved. And customer churn and other issues. Through the RFID
radio frequency identification technology and GPRS wireless communication
technology to achieve the inflatable terminal can be real-time upload the
cylinder of RFID coding and filling information to the database server. In this
paper, a new improved algorithm is proposed, which is based on the binary tree
search algorithm, which improves the number of collisions and transmission
faults of the reader in the recognition process. Information. The system has
carried out the filling test, the real-time monitoring and testing of the cylinder
data and the historical data query test. The test results show that the system can
control the continuous filling of the non-seized and discarded cylinders and the
cross filling of the cylinder to realize the accurate and fast of the network
transmission, to meet the requirements of the safety management of the barrel of
things.

Keywords: RFID  Algorithm  GPRS  Database  Objects of Internet styling

1 Introduction

With the fine management of liquefied petroleum gas companies and the state to
improve the management of liquefied petroleum gas, cylinder safety management has
always been a very headache for managers. Cylinder safety management is mainly
reflected in: whether the control is not seized, scrapped cylinders continue to fill; can
control the cross-filling cylinder; can control the loss of scrap cylinders; can control the
loss of customers and other phenomena [1–3]. In order to solve the above problems, to
achieve the safety management of the Internet of things, the system depends mainly
processing. On the cylinder on the smart angle valve device, the smart angle valve
embedded with RFID smart chip and limit control device. RFID smart chip so that each
cylinder has a unique RFID code, that is, ID information. The inflatable gun is
equipped with an RFID identification device and a control inflator. The identification
device is composed of a reader and an STM32 controller. The control device on the
intelligent angle valve can only be opened after the reader and the identification. And

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
G. Sun and S. Liu (Eds.): ADHIP 2017, LNICST 219, pp. 1–11, 2018.
https://doi.org/10.1007/978-3-319-73317-3_1
2 Y. Bo et al.

then open the inflatable operation. When the cylinder inflated after the end of the filling
information (cylinder inspection, filling, release, validity, specifications, cylinder code)
through the GPRS wireless communication module uploaded to the database server,
easy to monitor the center for statistical, query and other data applications. The
inflatable system is through the RFID technology to control the cylinder is not seized,
scrap cylinders continue to fill and cylinder filling, to eliminate expired, not seized,
dangerous cylinders are used again, through the cylinder RFID coding means for each
cylinder to wear a Helmet, so that people’s lives and property from the threat [4–6]. But
the core problem of the system is the reader in the identification of cylinder ID, there
will be RFID tag collision phenomenon, resulting in the reader can not correctly
identify any one of the label information, reducing the reader’s recognition efficiency
and read and write Speed, seriously affecting the normal operation of the system.
There are two kinds of anti-collision algorithms in RFID system. ALOHA-based
uncertainty algorithm and deterministic algorithm based on binary tree (BT, binary
tree). ALOHA algorithm is a random algorithm, its operation is simple but random, low
throughput, there will be a label in a very long time can not be identified, that is, “label
hunger” phenomenon. The binary tree algorithm is a deterministic algorithm. The
algorithm does not have the phenomenon of “label hunger and thirst”, its recognition
rate is high, and the advantages of throughput are applied in the RFID system, but the
algorithm is relatively complex and the recognition time is long. In the improved binary
tree algorithm, Fikenzeller proposed a binary search algorithm [7], the advantage lies in
the idea of simple thinking, but there are many requests and return the amount of data
larger shortcomings. On this basis, Zhang Hang proposed a return binary search
algorithm [8], the advantages of the algorithm can be ordered to read and reduce the
number of requests, the disadvantage is that the amount of data returned to the label is
still large. The dynamic binary search algorithm proposed by Hsuei has improved the
first two algorithms, and the problem of reducing the number of requests but the large
amount of data returned by the tag still exists [9]. In this case, Bingcai proposed based
on the stack storage anti-collision algorithm, which reduces the amount of data returned
by the label has improved, but the number of requests for the reader did not change a
lot [10]. Above the binary search algorithm still exists too many times the number of
reader requests and the amount of data returned by the label is too large and so on [11–
13].
In this paper, based on the binary search algorithm, an improved algorithm based
on stack is proposed, which can reduce the number of times of reader/writer while
ensuring the redundancy of data redundancy, and effectively solve the problem that
many cylinders are embedded in the filling process RFID tag collision problem.

2 System Solutions
2.1 System Composition
With pneumatic system based on RFID intelligence cylinder design mainly consists of
four parts, respectively, inflatable terminal layer, data layer, data processing layer and
application management. The system structure diagram is shown in Fig. 1.
Application of Improved RFID Anti-collision Algorithm 3

Monitoring center Smartphone

Application management

data center

Data processing layer


The database server Web server Management server

Internet

Data transmission layer

GPRS Network

Inflatable terminal layer

Fig. 1. The overall structure of the inflatable system

(1) Inflatable terminal layer


Before filling operation, first by identifying the device within the cylinder RFID chips
on ID information verification, if the verification through, start control pneumatic
device, the intelligent Angle on the cylinder valve limit device filling valve opened, the
air gun to the cylinder air. If not, the buzzer alerts the alarm and indicates which
identity information is not passed on the LCD. Fill in the filling and then upload the
cylinder’s filling information to the database via GPRS module.
(2) Data transfer layer
The data transmission layer is located between the inflatable terminal layer and the data
processing layer, which is used to carry out the downstream transmission of the
cylinder information and control information. In order to meet the requirement of data
collection and transmission, the GPRS network is used to transmit data.
4 Y. Bo et al.

(3) Data processing layer


The data processing layer receives the data message from the inflatable terminal layer
and interprets, classifies, and stores the packets. This layer consists primarily of
database servers, Web servers, and administrative servers.
(4) Application management
Application management consists mainly of monitoring center and user center, the
monitoring center and the server adopt the C/S structure, and the user and the server are
the B/S structure. The monitoring center can access the database server, Web server,
and management database over the Internet, and check the filling information of the
cylinder in real time. Users can also check the filling information of a cylinder by using
a smartphone login account.

2.2 System Functional Requirements


(1) Validation
First identification equipment within the cylinder RFID chips on ID information for
validation: whether the current cylinders for XXX, determine whether the cylinder
using time has been to scrap (discard time < system time + 30), the cylinder testing
time is due (detection time < system time + 30), the bottle filling number is consistent
with the filling data information within the machine, the cylinder is in accordance with
the provisions. All of these conditions must be met, and the identification device will
activate the charging device, turn on the inflatable valve and inflate the inflatable gun.
(2) Run the detection function
In the process of aeration, the controller to start the module of infrared measuring tem-
perature and pressure measuring modules, read every 0.5 s a temperature and pressure in
a cylinder, and then compared with set of reference temperature and pressure, your LCD
screen time display cylinders, temperature and pressure parameters. If the temperature or
pressure inside the cylinder to rise to limit value, an alarm signal, the controller imme-
diately signal intelligent Angle valve shut down, the end of the cylinder filling operation.
(3) Query function
Administrators monitor the data and view historical data in real time, and generate data
reports that facilitate the analysis, statistics, and application of data.

3 Algorithm Principle

Role of read and write in the RFID system, if there are multiple electronic label, the
same time there can be multiple tags for energy and send information to the read/write
device that will interfere with each other, causing the cylinder embedded RFID
encoding can’t correct recognition. In this adopted a stack-based RFID binary tree
anti-collision algorithm, the principle of which is to read and write device using the
detected conflict into the stack to the current request sequence, when the conflict a
greater than 1, through the stack decide next time to read and write device sends the
request instructions, avoid the request each time from the base of the tree in the process
of identification is insufficient [14, 15]. The algorithm can reduce query times and
improve recognition efficiency.
Application of Improved RFID Anti-collision Algorithm 5

3.1 Basic Binary Search Algorithm Principle


The algorithm requires that each tag have unique ID information, and the information is
encoded in Manchester to quickly locate the location of the data conflict location. In
this code, the increase along the encoding logic “0” indicates the descent along the
encoding logic “1”. In the process of receiving data, there is no jump in the state level,
and the data bit is in conflict. For example, it identifies the collision process by bit, as
shown in Fig. 2.

Fig. 2. The Manchester code identifies the conflict bits

3.2 Introduction

(1) Request(ID) Request: abbreviated R(ID), within the read-write scope, the label of
all the active status is received and the ID information is returned. For example,
the R(11111111) directive, which removes the tag outside of the silent state,
returns its own ID information from the tag.
(2) Rw-data read-write Data: the reader reads and writes to the selected TAB.
(3) Push (data) into the stack: Push data into the stack.
(4) Pop () the stack instruction: the sequence of the previous entry stack.
(5) Select the ID tag.
(6) UnSelect(ID) to select: the selected tag causes it to enter the silent state and does
not respond to any instruction from the reader.

3.3 Algorithm Process


The whole improved anti-conflict algorithm’s ideas and processes, as shown in Fig. 3.
Assume that there are four tags in the scope of the writer’s scope, whose ID
information is encoded in eight bits, and its tag ID information is shown in Table 1.

Table 1. The tag ID number


The tag ID number
Tag 1 (highest) 10111001 (lowest)
Tag 2 (highest) 10011000 (lowest)
Tag 3 (highest) 11011001 (lowest)
Tag 4 (highest) 11011000 (lowest)
6 Y. Bo et al.

Fig. 3. The framework of the conflict prevention algorithm

Use these four labels to specify the process:


a. The reader sends the R(11111111) instruction, and the status tag returns its own ID.
Label at 0, 5 and 6 clashed, received 1xx1100x serial number is 1, according to the
rules of algorithm, when conflict digit is greater than 1, the sequence of read/write
device receives the highest conflict location to 0 and the rest of the conflict to *,
10*1100*, get the next new send sequence onto the stack, and then sends the
current sequence that Push(11111111).
b. Send R(10*1100*) instruction, received the command of all labels, comparing their
ID number and request serial number, its scope is at the highest level to the highest
* bits of data between bits. Within this range, the same data to a tag to make reply
Application of Improved RFID Anti-collision Algorithm 7

and return with * a corresponding data, namely the tag 1 and 2 is selected, and the
tag 1 and 2 data returned 11, 00 respectively, the conflict is still greater than one,
then the current sequence onto the stack, which Push(10*1100*), according to the
highest position 0 conflict rules, get the next sends the request sequences of R
(1001100 *).
c. Send R(1001100*) instruction, only 2 tags TAB is selected and no conflict occurs,
read and write device sends the Select(10011000) instructions and RW - Data
command, read the label 2 Data, at the end of the operation, send UnSelect
(10011000) instruction will be set to silent mode. Because no conflict has occurred,
it is possible to determine whether the stack is empty. When the stack is not empty,
the stack instruction Pop() is called, and the stack sequence pops up, and the next
request sequence, R(10*1100*) is sent.
d. Send R(10*1100*) instruction, 1 is selected, the tag Data returned 11 and there is no
conflict, and then to read and write device sends the Select(10111001) instructions
and RW - Data operation, upon the completion of the read and write, send UnSelect
(10111001) order will tag 2 set of silent state. Because no conflict has occurred, it is
possible to determine whether the stack is empty. When the stack is not empty, the
stack instruction Pop () is called, and the next request sequence, R(11111111), is
sent.
e. Send the R(11111111) instruction, tag 3 and tag 4, and only one conflict occurs, and
the reader receives a new sequence of 1101100x. The highest conflict location 0 and
the remaining conflicts are *, and the next time the sequence is R(11011000) and
Push(11111111).
f. Send R(11011000), the only label 4 response, Select(11011000) to be selected and
corresponding RW-Data instructions after the completion of the operation, send
UnSelect(11011000) order will tag 4 set of silent state. View the stack not empty,
and send the next instruction R(11111111).
g. To send R(11111111), because the tag 1, tag 2, and tag 3 are blocked, only the tag 3
response, the read-writer, reads and writes to it, and the recognition process is over.

3.4 Analysis
In the VC++ simulation platform, the process of transceiver and electronic tags is
implemented, and the read-write process is simulated by a large amount of data. Label
bits digit, which represeanted by K = 8, K = 16, K = 32 three conditions, the basic
dynamic binary, backward binary binary, and improved algorithm to identify the total
number of read and write, transfer the total digits are simulated, the simulation results
as shown in Figs. 4, 5, 6, 7, 8 and 9.
Figure 4 through Fig. 6: (1) when the tag number is certain, the total number of
reads and reads increases as the number of tags increases; (2) the label number, tag
number are at the same time, the basic dynamic binary algorithm to identify the total
number of binary and almost unanimously, the improved algorithm based on stack and
backward binary total number. So the stack based improvement algorithm and the
backward binary are better than the basic binary and dynamic binary algorithm.
8 Y. Bo et al.

1000 1000
Basic Binary Basic Binary
900 900 Dynamic Binary
Dynamic Binary
Backward Binary Backward Binary
800 800
Improved Algorithm Improved Algorithm

700 700

Number of recognition
Number of recognition

600 600

500 500

400 400

300 300

200 200

100 100

0 0
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200
Number of tags Number of tags

Fig. 4. K ¼ 8 Fig. 5. K ¼ 16

1000 2000
Basic Binary Basic Binary
900 Dynamic Binary 1800 Dynamic Binary
Backward Binary Backward Binary
800 1600
Improved Algorithm Improved Algorithm
Transmission total number of bits

700 1400
Number of recognition

600 1200

500 1000

400 800

300 600

200 400

100 200

0 0
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200
Number of tags Number of tags

Fig. 6. K ¼ 32 Fig. 7. K ¼ 8

4000 8000
Basic Binary Basic Binary
3500 Dynamic Binary 7000 Dynamic Binary
Backward Binary Backward Binary
Transmission total number of bits

Improved Algorithm Improved Algorithm


Transmission total number of bits

3000 6000

2500 5000

2000 4000

1500 3000

1000 2000

500 1000

0 0
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200
Number of tags Number of tags

Fig. 8. K ¼ 16 Fig. 9. K ¼ 32

From Figs. 7, 8 and 9: (1) The total number of transmissions increases as the
number of tabs increases, as the number of tags increases. (2) When the number of tags
is certain, the number of total digits transferred by the four algorithms increases as the
number of tabs increases. (3) When the number of tabs and the number of tags is
identical, the total number of bits of the stack based improvement algorithm is the
smallest.
Application of Improved RFID Anti-collision Algorithm 9

By Figs. 4, 5, 6, 7, 8 and 9, it is so easy to get: (1) under the same conditions, the
improved algorithm and backward binary algorithm based on stack in the identification
of the total number of almost the same, but the improved algorithm in the data
transmission is far less than backward binary algorithm. So according to the total
number of identification number and transmission of the simulation result shows that
the improved algorithm is superior to the basic binary, dynamic binary, backward
binary algorithm.

4 Monitoring System Design and Testing

4.1 Monitoring System Design


The monitoring center consists of the upper machine software and the database. The
top machine software was written in the Visual Studio 2010 development environment
with the c# language, using SQL Server 2008 as a database, and its application
interface was implemented using ADO through the OLE.db technology. The entire
monitoring system structure diagram is shown in Fig. 10.
The monitoring system is established by GPRS communication module, cylinder
information management module, user information management module and cylinder
information. GPRS communication module is responsible for RFID read-write device
collecting information in accordance with the agreement of cylinders packing back-
wardness to monitor and control system, monitoring system based on protocol analysis
data, in every field in the database table. The information about the cylinder

SQL database

Surveillance system

GPRS Cylinder
Cylinder information User information
communication information query
management module management module
module module

User
Inflatable Cylinder Revision of inform Cylinder Cylinder
delete New
terminal Cylinders information cylinder ation information information
users users
device inquiry information modifi entry inquiry
cation

Fig. 10. Monitors the architecture diagram


10 Y. Bo et al.

information in the database includes the information such as the RFID number of the
steel bottle, the time information for filling, the time of scrap, the charge record, the
filling station number of the cylinder, etc.

4.2 Monitor System Real-Time Data Test


The previous real-time monitoring interface is shown in Fig. 11. Interface display basic
information refilling station, shows the number of cylinders filling and filling, query the
total gas filling gun number, and the data in the form of real time curve display. Adjust the
amount of charge and fill the total amount of gas in real time according to the requirement.
You can query the full history of the filling and display the user’s detailed cylinder
information, as well as the historical data for a certain period of time. Its historical data
query interface is shown in Fig. 12.

Fig. 11. The top machine interface of the monitoring center

Fig. 12. Historical data query interface


Application of Improved RFID Anti-collision Algorithm 11

5 Conclusion

An improved algorithm designed to prevent multiple electronic tags from colliding in


the identification process is designed based on RFID. According to the result of sim-
ulation shows that the improved algorithm is superior to the binary tree search algo-
rithm, decrease the number of collisions and consult for the recognition process of the
cylinder, and the cylinder data information upload real-time test, the test results show
that the system can realize the cylinder accurately and fast network transmission of
information, the administrator can query the cylinder filling data real-time information
and historical data, and meet the requirements of the cylinder iot security management.

References
1. Shijie, X.: Design and implementation of the RFID based cylinder management system.
Xiamen University (2007)
2. Rong, H.: Application of radio frequency identification technology in cylinder safety
traceability. China Autom. Ident. Technol. 02, 72–74 (2013)
3. Chao, Z., Shouyuan, C., Zengzhen, S., Jian, L., Lijuan, L., Lin, L.: Development of logistics
tracking system based on RFID, GPS and GPRS. Electron. Des. Eng. 05, 147–149 (2015)
4. Jin, T., Yahui, W., Xuemei, F., Shujun, Z., Donghui, C.: Fresh agricultural products cold
chain logistics status monitoring information system. J. Jilin Univ. (Eng. Sci.) 06, 1707–
1711 (2015)
5. Lin, L.: Design and implementation of IT - based network operation and maintenance
management system. Huazhong Normal University (2012)
6. Jedda, A., Khair, M.G., Hussein, T.M.: Decentralized RFID coverage algorithms using
writeable tags. Comput. Netw. 07, 257–261 (2016)
7. Finkenzeller, K.: Radio Frequency Identification Technology. Electronic Industry Press,
Beijing (2006)
8. Hang, Z., Minghao, T., Hui, C.: Improved backplane binary anti-collision algorithm.
Comput. Eng. Appl. 25, 208–211 (2011)
9. Chuiyi, X., Yigang, H., Bing, L., Gefeng, F.: Improvement of dynamic binary tree search
algorithm. Comput. Eng. (02), 260–262+265 (2015)
10. Bingcai, C., Dongsheng, X., Guochang, G., Lili, G.: An RFID anti-collision algorithm based
on stack storage. Comput. Appl. (06), 1483–1486 (2009)
11. Xue, W., Zhihong, Q., Zhengchao, H., Yiman, L.: Research on RFID anti-collision
algorithm based on binary tree. J. Commun. 06, 49–57 (2014)
12. Bo, F., Jintao, L., Weimin, Z., Ping, Z., Zhenhua, D.: A new anti-collision algorithm for
RFID tag identification. J. Autom. 06, 632–638 (2008)
13. Duroc, Y., Vera, G.A., Martin, J.G.: Modified RSSI technique for the localization of passive
UHFRFID tags in LOS channels. Int. J. Microwave Wirel. Technol. 55, 27–32 (2013)
14. Zhenya, C., Tai, J.: An Ethernet-based anti-trailing elevator access control system. Comput.
Eng. Appl. 22, 232–237 (2016)
15. Hsu, C.-H., Chen, Y.-M., Kang, H.-J.: Performance-effective and low-complexity redundant
reader detection in wireless RFID networks. EURASIP J. Wirel. Commun. Netw. 1, 12–16
(2008)
User-Controlled Encrypted Data Sharing
Model in Cloud Storage

Yuezhong Wu1,2, Shuhong Chen3,5(&), Guojun Wang3,


and Changyun Li2,4
1
School of Information Science and Engineering, Central South University,
Changsha 410083, China
yuezhong.wu@163.com
2
School of Computer Science, Hunan University of Technology,
Zhuzhou 412007, China
lcy469@163.com
3
School of Computer Science and Educational Software,
Guangzhou University, Guangzhou 510006, China
shuhongchen@gzhu.edu.cn, csgjwang@gmail.com
4
Intelligent Information Perception and Processing Technology,
Hunan Province Key Laboratory, Zhuzhou 412007, China
5
School of Computer and Communication, Hunan Institute of Engineering,
Xiangtan 411104, China

Abstract. Cloud storage services provide us convenience for storing and


sharing vast amounts of data by its low cost, high scalability and other
advantages while it brings out security risks as well. A user-controlled encrypted
data sharing model in cloud storage (UESMCS) is put forward hereby. It pre-
processes user data to ensure the confidentiality and integrity based on triple
encryption scheme of CP-ABE ciphertext access control mechanism and
integrity verification. Thus, the reliability and safety for data sharing can be
achieved provided the trustworthy third party being brought in. The experi-
mental results show that UESMCS ensures data security in cloud storage ser-
vices platform and enhances the operational performance for data sharing. The
security sharing mechanism perfectly fits the actual cloud storage environment.

Keywords: Cloud storage  Data confidentiality  Ciphertext access control

1 Introduction

A substantial number of people, in their learning, working and living store, share their
information through an open network. Cloud storage services, a new form of network
application model, emerged and gathered numerous different types of storage devices
through the application of software co-functioning to realize external data storage and
business access services through using clustering applications, grid technology and
distributed file systems and other functions, ensures data security and saves storage
space effectively [1–3]. Users can store their data in remote cloud storage stored
centers, access on-demand and user-friendly for enterprises to save costs, improve
availability and reliability. However, corporate users lost a fundamental physical
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018
G. Sun and S. Liu (Eds.): ADHIP 2017, LNICST 219, pp. 12–20, 2018.
https://doi.org/10.1007/978-3-319-73317-3_2
User-Controlled Encrypted Data Sharing Model in Cloud Storage 13

control for their data stored in the cloud, which will doubt their confidentiality and
integrity of the data, and inevitably raises its concerns about data security and privacy
aspects. There are two points about the reason: First, the cloud service providers are
facing a wide range of internal and external attacks following malicious enemies
deleting or destroying user data. Second, the cloud service providers may be dishonest,
they may seek to save their reputation or interests while trying to hide the information
of theft or destruction of the data stored in the cloud. Thus, based on the complexity of
the dynamic and open cloud storage environment and other features, users rely entirely
on untrusted cloud storage providers and other data storage and management factors,
how to securely share data in the open cloud storage environments is a problem need to
be solved for cloud storage applications.
To have these problems worked out, and to guarantee a safe cloud storage service
of data sharing for general users or business users, a secure storage for cloud sharing
model is proposed based on CP-ABE technology. It is functioning actively by user and
systems with triple encryption to secure user-controlled access for the data in cloud
storage.
The main contributions of this paper are:
(1) User-controlled encrypted data. Based on symmetric encryption, CP-ABE and
MD5 technology, it is triple encrypted and integrities checking for the data. It
promises access permissions of the encrypted data by user-controlled, ensuring
the security of data stored and shared in the cloud storage.
(2) Trusted third party. The introduction of a trusted certification authority as a third
party authorized purposed to store key information, monitor and audit user access
data to achieve security data sharing.
The remainder of this paper is organised as follows: Sect. 2 introduces the termi-
nology and the related work. Symbol description is in Sect. 3, and we also introduce
the proposed the data sharing model and application scene. In Sect. 4, we detail the
security encryption and algorithm design. In Sect. 5, we present the results and analysis
for the experiment. Finally, we conclude in Sect. 6, and briefly touch on the future
work.

2 Related Work

Ciphertext access control mechanism is a cloud storage data security approach, which
uses the data encryption keys, and achieves the access control target through the control
key access permissions. It is an important solution for protecting the privacy of user
data in the untrusted server-side scene. CP-ABE uses a set of attributes to represent a
user, generates user’s private keys in accordance with their properties set, and asso-
ciates with the ciphertext and the access control policy. The user can decrypt the
ciphertext only when the user’s private key attributes meet the ciphertext access control
policies. It is a suitable ciphertext access control mechanism in cloud storage envi-
ronments, encrypted data for user groups satisfied certain conditions, and does not
encrypted by determining the user groups individually. The authors proposed CP-ABE
mechanisms, which are flexible to satisfy the requirements for customizing access
14 Y. Wu et al.

policy by the data owner in cloud storage environment [4, 5]; Jung et al. proposed a
multi-authorities mechanism for preserving privacy data in cloud storage environments
with CP-ABE access control program, which uses globally unique identifier for the
user to prevent users conspiracy [6]; The authors proposed the CP-ABE programs for
multi-authority in cloud storage to solve the key escrow problem [7, 8]. In this paper,
the authors adopt CP-ABE access control policies to encrypt plaintext file encryption
key, improving encryption efficiency, while add a trusted third party to solve the key
escrow problem.
After obtaining the ciphertext, it also needs to be considered to provide users with
data integrity verification. The techniques in this research field include: hash functions,
public key cryptography, digital signatures, Merkle hash trees, and so on. The authors
proposed some more efficient data integrity verification methods, making use of these
methods, the client will be able to verify the integrity of the data being damaged only
through exchanging minimal data with the cloud platform [9, 10]; the authors proposed
a data integrity dynamic authentication service, which processed blocks and generated
verification labels before storing the data, then stored the processed data into the cloud
server, and verified the integrity of the data by selecting the method of random sam-
pling [11, 12]. In this paper, the authors adopt MD5 data integrity verification program,
which can verify whether data integrity suffered damage through a series of simple
digest value.

3 Data Sharing Model


3.1 Secure Sharing Model
Based on the network application scene storing and sharing unstructured documents in
the cloud, the authors proposed a user-controlled encrypted data sharing model in cloud
storage. There are three-layer architecture in this model: the cloud user layer, the
system service layer and the cloud storage layer. Respectively including: the cloud
client, the authentication servers (AS), the system servers (SS) and the cloud server
provider (CSP), as shown in Fig. 1.
(1) The cloud client is made up by the document owner and user. By operating the
application directly, the clients upload document, retrieve document and other
resource sharing services. It interacts with the AS and SS. The cloud client has the
following functions: ①Creating index for a plaintext uploaded by the user, and
encrypting the index keywords; ②Encrypting the plaintext and the key respec-
tively according to encryption keys and user access policy set by the user;
③Packaging ciphertext, and uploading them to the SS; ④Getting the ciphertext
and decrypting from the SS, and getting the detection and audits for the encytpted
data from the AS.
(2) The authentication servers (AS) is used as a trusted third-party. It interacts with
the cloud client, stores user information and encryption policy, and provides key
services to help users complete the encryption and decryption; It reviews and
monitors access relevant data from the SS; It verifies MD5 digest value of doc-
uments generated by the cloud client and SS.
Another random document with
no related content on Scribd:
So the Wind-Child did as her father had asked her. She stood at
the edge of the cave. She stretched out her arm and the wind
quieted. Then the Wind-Child forgot to obey her father. The sun
came out, and she saw many bright shells lying on the sand. The
waves had washed them up during the storm. She left the mountain,
and ran along the beach gathering shells.
As soon as the Wind-Child had picked up one shell, she dropped it
to go on farther in search of one that was larger. On and on she
went, always looking for a shell that was brighter. She suddenly
found that she had gone a long way from home. She could not see
the wigwam. She found herself, where the magic trail of the shells
had led her, in a deep, dark forest. It was a frightful place, and the
trees shut the Wind-Child in on all sides.
They seemed glad to see the Wind-Child.
The forest was settled by a strange race of grizzly people. They
were dark, rough in their ways, and wore shaggy fur clothing. Their
wigwams were made of the trunks of trees. They had great fires in
the open places of the woods about which they sat. They seemed
glad to see the Wind-Child. The mothers crowded around her, and
the children brought her nuts. They gave her a fur cloak and one of
the best wigwams in which to live. When the Wind-Child begged to
go home to her father, these grizzly people of the forest gave her
sweets to eat. They let her taste of the thick, sweet maple syrup that
they cooked in their kettles. They gave her wild honey that the bees
had left the season before in the hollow trees. After eating these, the
Wind-Child forgot all about her home, and lived with and learned the
ways of these forest people. Years and years passed and she was
still among them, grown as wild and savage as they themselves
were.
The Great Spirit looked for his daughter season after season all
over the earth, and still he could not find her. His mountain was
deserted. His voice could be heard calling her in every wind that
blew. Great drought and famine came upon the land because he
neglected the earth. It was a time of great suffering. But one day he
came upon the grizzly people. They were moving their camp from
one part of the forest to another. In their midst was the Wind-Child,
looking almost like one of them. She knew her father, though, and
ran to him, begging to go home with him. He took her in his arms,
but he turned in anger toward her captors.
As the Great Spirit gazed in anger upon the grizzly people they
drew their fur cloaks over their heads. They dropped down to the
ground at his feet to beg for mercy. The Great Spirit left the forest.
As he did so these wild people of the woods found that they could
not rise to their feet again. They were not able to draw their fur
cloaks from their heads. They went about on all fours, covered from
head to foot with shaggy fur. They could not speak, but could only
growl.
They were the first bears, and there have been bears ever since in
place of the strange savages who captured the Wind-Child.
The Great Spirit took the Wind-Child to the top of the mountain
and they lived there always. On her return the rain fell and the sun
shone, and there was plenty in the earth again. But the bear tribe
prowled the earth, hunted by the Indians, because of the Wind-
Child’s curiosity.
WHY THE BEAR
HAS A STUMPY TAIL.

Once upon a time, in the far away days, when the beasts walked
the land, and talked like real people, the bear had a long, beautiful,
bushy tail, as fine as the tail of any other creature, and you may be
sure he was very proud of it.
One winter day the bear was out traveling, and whom should he
meet but Brother Fox, hastening along with a string of fish dangling
down his back.
“Ah,” said Bruin, “stop a bit, friend; where did you find such fat
fish?”
Now, very likely Brother Fox had helped himself to the fish from
some one’s larder, but he never told the bear; not he.
“It is a secret, about these fish,” he said to Bruin; “come close, and
I will tell you.”
So Bruin went close to Brother Fox, and Brother Fox said:
“You must go to the river where the ice is thick, make a hole in the
ice, sit down with your tail in the hole, and wait for the fish to bite.
When your tail smarts, pull it out, quickly. That is the way to fish.”
“Oh, is it?” said Bruin. “Well, if you say it is so, it must be true,
Brother Fox,” and he walked toward the river swinging his tail as he
went, and Brother Fox hid behind a tree to laugh up his sleeve, and
watch.
Well, poor old Bruin got a stick, and made a hole in the ice. Then
he sat down with his long, beautiful, bushy tail in the water and
waited, and, oh, it was very cold indeed.
He waited, and waited, and then his tail began to smart. He gave a
quick pull to bring up the fish, and, alas, the ice had frozen fast
again.
Off came the bear’s beautiful, long, bushy tail, and he never was
able to put it on again.
And that is why the bear has a short, stumpy tail, because he tried
to fish, as Brother Fox told him to, through the ice.
WHY THE BEAR
SLEEPS ALL
WINTER.

Once upon a time, little Brother Rabbit lived, quite sober and
industrious, in the woods, and just close by lived a big, brown Bear.
Now little Brother Rabbit never troubled his neighbors in those
days, nor meddled with their housekeeping, nor played any tricks the
way he does now. In the fall, he gathered his acorns, and his pig
nuts, and his rabbit tobacco. On a frosty morning, he would set out
with Brother Fox for the farmer’s; and while Brother Fox looked after
the chicken yards, little Brother Rabbit picked cabbage, and pulled
turnips, and gathered carrots and parsnips for his cellar. When the
winter came, he never failed to share his store with a wandering field
mouse, or a traveling chipmunk.
Now, in those days, old Bear was not content to do his own
housekeeping, and doze in the sun, and gather wild honey in the
summer, and dig for field mice in the winter. He was full of mischief,
and was always playing tricks. Of all the beasts of the wood, the one
he loved best to trouble was sober little Brother Rabbit.
Just as soon as Brother Rabbit moved to a new tree stump, and
filled his bins with vegetables, and his pantry with salad, along came
old Bear and carried off all his stores.
Just as soon as Brother Rabbit filled his house with dry, warm
leaves for a bed, creepy, creepy, crawly, along came old Bear, and
tried to squeeze himself into the bed, too, and of course he was too
big.
At last, Brother Rabbit could stand it no longer, and he went to all
his friends in the wood to ask their advice.
The first one he met was Brother Frog, sitting on the edge of the
pond, and sticking his feet in the nice, cool mud.
“What shall I do, Brother Frog?” asked Brother Rabbit; “Brother
Bear will not leave me alone.”
“Let us ask Brother Squirrel,” said Brother Frog.
So the two went to Brother Squirrel, cracking nuts in the hickory
tree.
“What shall we do, Brother Squirrel?” asked Brother Frog; “Brother
Bear will not leave Brother Rabbit alone.”
“Let us ask Brother Mole,” said Brother Squirrel, dropping his nuts.
So the three went to where Brother Mole was digging the cellar for
a new house, and they said:
“What shall we do, Brother Mole? Brother Bear will not leave
Brother Rabbit alone.”
“Let us ask Brother Fox,” said Brother Mole.
So Brother Mole, and Brother Squirrel, and Brother Frog, and
Brother Rabbit went to where Brother Fox was combing his brush
behind a bush, and they said to him:
“What shall we do, Brother Fox? Brother Bear will not leave
Brother Rabbit alone.”
“Let us go to Brother Bear,” said Brother Fox.
So they all went along with little Brother Rabbit, and they hunted
and hunted for old Bear, but they could not find him. They hunted
and hunted some more, and they peeped in a hollow tree. There lay
old Bear, fast asleep.
“Hush,” said Brother Fox.
Then he whispered to Brother Frog, “Bring a little mud.”
And he whispered to Brother Squirrel, “Bring some leaves.”
And he whispered to Brother Mole, “Bring some dirt, little brother.”
And to Brother Rabbit he said, “Stand ready to do what I tell you.”
So Brother Frog brought mud, Brother Squirrel brought leaves,
Brother Mole brought dirt, and Brother Rabbit stood ready.
Then Brother Fox said to Brother Rabbit, “Stop up the ends of
Brother Bear’s log.”
So Brother Rabbit took the mud and the leaves and the dirt, and
he stopped up the ends of the log. Then he hammered hard with his
two back feet, which are good for hammering. And they all went
home, for they thought that old Bear would never, never get out of
the log.
Well, old Bear slept and slept, but after a while he awoke, and he
opened one eye. He saw no sunshine, so he thought it was still
night, and he went to sleep again.
After another while, he awoke again, but he heard the rain and
sleet beating outside, and it was very warm and dry inside.
“What a very long night,” said old Bear, and he curled up his paws,
and he went to sleep again.
This time, he just slept, and slept, until it began to be very warm
inside the log, and he heard in his dreams the footsteps of birds
outside.
Then he awoke, and he stretched himself, and he shook himself.
He rubbed his eyes with his paws, and he poked away the mud, and
the leaves, and the dirt, and he went outside.
But was he not surprised?
It had been a frosty night when he had gone to sleep, and now the
woods were green. Old Bear had slept all winter.
“That was a fine, long sleep,” said old Bear, as he set out for little
Brother Rabbit’s house to see if he had anything good for breakfast;
“I shall sleep again, next fall.”
So every summer, old Bear plays tricks on little Brother Rabbit, but
when the fall comes, he creeps away to a warm, dark place to sleep
until spring.
And so have his grandchildren, and his great-grandchildren ever
since.
Transcriber’s Notes
pg 25 Changed: “The rice is too salt,”
to: “The rice is too salty,”
*** END OF THE PROJECT GUTENBERG EBOOK ONCE UPON A
TIME ANIMAL STORIES ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project

You might also like