Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hongbing Cheng is active.

Publication


Featured researches published by Hongbing Cheng.


The Journal of China Universities of Posts and Telecommunications | 2006

Identity-Based Key Agreement and Encryption For Wireless Sensor Networks

Geng Yang; Chunming Rong; Christian Veigner; Jiangtao Wang; Hongbing Cheng

It is an important challenge to find out suitable cryptography for wireless sensor networks (WSN) because of the limitations of power, computation capability, and storage resources. Many schemes based on public or symmetric key cryptography are investigated. Recently, a practical identity-based encryption technique is proposed. In this article, we present an identity-based key agreement and encryption scheme for WSNs. This scheme is an elliptic curve cryptography type algorithm. First, we briefly review regarding identity-based encryption and decryption, particularly, the Boneh-Franklin algorithms. Then we describe a key agreement and encryption scheme on the basis of the Boneh-Franklin algorithms for WSNs. We discuss the efficiency and security of our scheme by comparing it with traditional public key technique and symmetric key technique.


China Communications | 2015

Secure big data storage and sharing scheme for cloud tenants

Hongbing Cheng; Chunming Rong; Kai Hwang; Weihong Wang; Yanyan Li

The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud. In this paper, we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers. Instead of protecting the big data itself, the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function. Analysis, comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.


international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011

A novel intrusion detection algorithm for wireless sensor networks

Chunming Rong; Skjalg Eggen; Hongbing Cheng

Wireless sensor network (WSN) is an emerging important research area. Because WSNs in general and in nature are unattended and physically reachable from the outside world, they could be vulnerable to physical attacks in the form of node capture or node destruction. These forms of attacks are hard to protect against and require intelligent prevention methods. It is necessary for WSNs to have security measures in place as to prevent an intruder from inserting compromised nodes in order to decimate or disturb the network performance. In this paper we present an intrusion detection algorithm for wireless sensor networks which does not require prior knowledge of network behavior or a learning period in order to establish this knowledge. We have taken a more practical approach and constructed this algorithm with small to middle-size networks in mind, like home or office networks. The proposed algorithm is also dynamic in nature as to cope with new and unknown attack types. This algorithm is intended to protect the network and ensure reliable and accurate aggregated sensor readings. Theoretical simulation results indicate that compromised nodes can be detected with high accuracy and low false alarm probability.


network and parallel computing | 2007

An Identity-Based Encryption Scheme for Broadcasting

Geng Yang; Jiangtao Wang; Hongbing Cheng; Chunming Rong

It is a challenge to find out suitable cryptography for wireless sensor networks (WSN) due to limitations of power, computation capability and storage resources. Many schemes based on public or symmetric key cryptography are investigated. We propose an identity-based broadcast encryption scheme, which can be used for key distribution or directly broadcasting message. The scheme is also suitable for general kind of networks. We review first identity-based encryption (IBE) and decryption, particularly, the Boneh-Franklin (BF) algorithm. Then we describe a key agreement and encryption scheme based on the Boneh-Franklin algorithms. We discuss the efficiency and security of our scheme by comparing with traditional public key technique and symmetric key technique.


2016 Digital Media Industry & Academic Forum (DMIAF) | 2016

Securing big data in the Cloud by protected mapping over multiple providers

Chunming Rong; Hongbing Cheng; Martin Gilje Jaatun

The Cloud is increasingly being used to store and process big data, and conventional security mechanisms using encryption are either not sufficiently efficient or not suited to the task of protecting big data in the Cloud. In this paper we present an alternative approach which divides big data among multiple Cloud providers, and instead of protecting the data itself, protects the mapping of the various data elements to each provider using a trapdoor function. Our initial analysis indicates that this is an efficient and secure approach for securing big data.


Chinese Journal of Electronics | 2012

Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

Hongbing Cheng; Chunming Rong; Zheng-Hua Tan; Qingkai Zeng


advanced information networking and applications | 2011

Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor Networks

Hongbing Cheng; Chunming Rong; Geng Yang


international conference on body area networks | 2012

Authenticated health monitoring scheme for wireless body sensor networks

Chunming Rong; Hongbing Cheng


international conference on cloud computing | 2012

A Secure Data Access Mechanism for Cloud Tenants

Chunming Rong; Hongbing Cheng


international conference on information technology | 2014

Privacy protection beyond encryption for cloud big data

Hongbing Cheng; Weihong Wang; Chunming Rong

Collaboration


Dive into the Hongbing Cheng's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Geng Yang

Nanjing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Weihong Wang

Zhejiang University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kai Hwang

University of Stavanger

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manyun Qian

Zhejiang University of Technology

View shared research outputs
Top Co-Authors

Avatar

Yanyan Li

Zhejiang University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge