Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jinghua Jiang is active.

Publication


Featured researches published by Jinghua Jiang.


computer and communications security | 2015

Enabling Encrypted Cloud Media Center with Secure Deduplication

Yifeng Zheng; Xingliang Yuan; Xinyu Wang; Jinghua Jiang; Cong Wang; Xiaolin Gui

Multimedia contents, especially videos, are being exponentially generated today. Due to the limited local storage, people are willing to store the videos at the remote cloud media center for its low cost and scalable storage. However, videos may have to be encrypted before outsourcing for privacy concerns. For practical purposes, the cloud media center should also provide the deduplication functionality to eliminate the storage and bandwidth redundancy, and adaptively disseminate videos to heterogeneous networks and different devices to ensure the quality of service. In light of the observations, we present a secure architecture enabling the encrypted cloud media center. It builds on top of latest advancements on secure deduplication and video coding techniques, with fully functional system implementations on encrypted video deduplication and adaptive video dissemination services. Specifically, to support efficient adaptive dissemination, we utilize the scalable video coding (SVC) techniques and propose a tailored layer-level secure deduplication strategy to be compatible with the internal structure of SVC. Accordingly, we adopt a structure-compatible encryption mechanism and optimize the way how encrypted SVC videos are stored for fast retrieval and efficient dissemination. We thoroughly analyze the security strength of our system design with strong video protection. Furthermore, we give a prototype implementation with encrypted end-to-end deployment on Amazon cloud platform. Extensive experiments demonstrate the practicality of our system.


IEEE Transactions on Multimedia | 2017

Toward Encrypted Cloud Media Center With Secure Deduplication

Yifeng Zheng; Xingliang Yuan; Xinyu Wang; Jinghua Jiang; Cong Wang; Xiaolin Gui

The explosive growth of multimedia contents, especially videos, is pushing forward the paradigm of cloud-based media hosting today. However, the wide attacking surface of the public cloud and the growing security awareness from the society are both calling for data encryption before outsourcing to cloud. Under the circumstance of encrypted videos, how to still preserve all the service benefits of cloud media center remains to be fully explored. In this paper, we present a secure system architecture design as our initial effort toward this direction, which bridges together the advancements of video coding techniques and secure deduplication. Our design enables the cloud with the crucial deduplication functionality to completely eliminate the extra storage and bandwidth cost, which would have been incurred by hosting encrypted videos from different entities. The design is also carefully tailored to the scalable video coding (SVC) techniques to support heterogeneous networks and devices for high-quality adaptive video dissemination. We show fully functional system implementations with structure-aware encryption design and structure-aware deduplication strategies that are both completely compliant with the video format in SVC. Extensive security analysis and experiments via our prototype deployed on Azure cloud platform show the practicality of the design. Our work can also be easily extended to support other media applications that employ media files with scalable structures.


IEEE Access | 2016

Towards Secure and Accurate Targeted Mobile Coupon Delivery

Jinghua Jiang; Yifeng Zheng; Xingliang Yuan; Zhenkui Shi; Xiaolin Gui; Cong Wang; Jing Yao

This paper presents our research on secure and accurate targeted mobile coupon delivery. Our goal is to enable the secure delivery of targeted coupons to eligible users equipped with mobile devices, whose behavioral profiles accurately satisfy the targeting profile defined by the vendor. Our design well preserves user privacy, and further provides the strict security guarantee of vendor protection, by verifying users eligibility for a coupon without revealing the vendors targeting profile. We first show a basic approach which can effectively address the challenges posed by secure and accurate targeted coupon delivery, via properly leveraging Yaos garbled circuits. In order to achieve practical performance for resource-limited mobile devices, we then present our proposed design, which imposes lightweight workload on the user side, via properly bridging together homomorphic encryption and Yaos garbled circuits. We implement a preliminary user-side prototype and deploy it on an Android smartphone to evaluate the performance. Extensive experimental results demonstrate that our proposed design achieves practical performance for mobile devices.


Chinese Journal of Computers | 2012

Social Relation Cognitive Model of Mobile Nodes in the Internet of Things

Jian An; Xiaolin Gui; Wendong Zhang; Jinghua Jiang; Jin Zhang

In the Internet of Things,the quantification of social relations is the basis of mobile-aware service,which involves many decision factors,such as time,space and behavior.Based on social network theory,a new cognitive model for mobile nodes social relation in the Internet of Things is proposed.Firstly,by reasoning and evaluating the complexity and uncertainty of social relation from various angles,the social characteristics of mobile nodes are summarized.Then,we would quantize the social relations of mobile nodes using location factor,interconnection factor,service quality factor and feedback aggregation factor,so as to solve the shortcomings in these quantitative models which are caused by the single decision factors and the limitation of the calculated results.Finally,the weight distribution is set up by information entropy and rough set theory for these decision factors,which overcomes the shortage of traditional method,in which the weight is set up by subjective manners and has poor dynamic adaptability.Simulation results show that,cognitive model has better predictive accuracy and dynamic adaptability.


annual acis international conference on computer and information science | 2012

Location Attraction Mobility Model for Mobile Ad Hoc Network

Wendong Zhang; Xiaolin Gui; Jian An; Jinghua Jiang

Mobility models play a crucial role in mobility wireless networks with respect to evaluating the network protocols and performances. However, the majority of existing mobility models either does not exhibit realistic movement characteristics or modeling methods are too complex. In this paper, a new mobility model based on Location Attraction (LAMM) is proposed, which utilizes humans clustering features in real life. Through analyzing real GPS trace of mobile users, we observe the number and location attraction of hot regions. We find that the number of hot regions is extremely stationary in an observation area, and the pause position density within hot regions show a trend with exponential decline. Based on such movement characteristics, we developed a mobility model and the validation shows that LAMM better depict the mobility patterns of human.


IEEE Transactions on Services Computing | 2017

A Practical System for Privacy-Aware Targeted Mobile Advertising Services

Jinghua Jiang; Yifeng Zheng; Zhenkui Shi; Xingliang Yuan; Xiaolin Gui; Cong Wang

With the prosperity of mobile application markets, mobile advertising is becoming an increasingly important economic force. In order to maximize revenue, ads are recommended to be delivered to potentially interested users, which requires user targeting, i.e., analyzing users’ profiles and exploring users’ interests. However, collecting user personal information for targeted mobile advertising services raises critical privacy concerns. Although some solutions like anonymization and obfuscation have been proposed for privacy-aware targeted advertising, they undesirably face the issues of security, efficiency, and/or ad relevance. In this paper, we propose a practical system enabling secure and efficient targeted mobile advertising services. It allows the ad network to perform accurate user targeting, while ensuring strong privacy protection for mobile users. Specifically, we show how to properly leverage a cryptographic primitive called private stream searching to support secure, accurate, and practical targeted mobile ad delivery. Moreover, we propose secure billing schemes to enable the ad network to charge advertisers in a privacy-preserving manner. The security strength of our system is thoroughly analyzed. Through extensive experiments, we show that our system achieves practical efficiency on mobile devices.


Journal of Communications and Information Networks | 2016

Towards privacy-preserving user targeting

Jinghua Jiang; Yifeng Zheng; Zhenkui Shi; Jing Yao; Cong Wang; Xiaolin Gui

User targeting via behavioral analysis is becoming increasingly prevalent in online messaging services. By taking into account users’ behavior information such as geographic locations, purchase behaviors, and search histories, vendors can deliver messages to users who are more likely to have a strong preference. For example, advertisers can rely on some ad-network for distributing ads to targeted users. However, collecting such personal information for accurate targeting raises severe privacy concerns. In order to incentivize users to participate in such behavioral targeting systems, addressing the privacy concerns becomes of paramount importance. We provide a survey of privacy-preserving user targeting. We present the architectures of user targeting, the security threats faced by user targeting, and existing approaches to privacy-preserving user targeting. Some future research directions are also identified.


Journal of Network and Computer Applications | 2013

Research on social relations cognitive model of mobile nodes in Internet of Things

Jian An; Xiaolin Gui; Wendong Zhang; Jinghua Jiang; Jianwei Yang


conference on computer communications workshops | 2015

Towards secure and practical targeted mobile advertising

Jinghua Jiang; Zhenkui Shi; Xingliang Yuan; Cong Wang; Xiaolin Gui


Engineering | 2018

Toward Privacy-Preserving Personalized Recommendation Services

Cong Wang; Yifeng Zheng; Jinghua Jiang; Kui Ren

Collaboration


Dive into the Jinghua Jiang's collaboration.

Top Co-Authors

Avatar

Xiaolin Gui

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Cong Wang

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Xingliang Yuan

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Yifeng Zheng

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Zhenkui Shi

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Wendong Zhang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jian An

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Xinyu Wang

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Jing Yao

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jianwei Yang

Xi'an Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge