Research Fundings from National Nature Science Foundation of China

(1)Title: Study of heterogeneous robot's three-dimensional collaborative operation.

(2016.01-2019.12, Principle Investigator: Dr. Jianqiang Li)

Abstract: For lack of a single robot structure operation, this project analysis internal dynamic properties of heterogeneous robots, and builds a multi-level, multi-task heterogeneous robot hybrid system limited time switching model. Based on complementary perception information of air/ground robot complexity environment, visual / INS positioning and data fusion approach in SLAM method is studied to build an environment map.Heuristic logic intelligent planning method mixed genetic algorithm optimize global search and scroll local search is proposed for map features. It establishes theoretical framework and relization method for heterogeneous autonomous robots cooperation and quickly search. Finally this method is verified by actual systems field operations.


(2) Title: Constructing Highly Efficient Cloud Storage Auditing Protocols from Distributed String Equality Checking

(2016.01-2018.12, Principle Investigator: Dr. Fei Chen)

Abstract: With the recent large-scale adoption of cloud storage, cloud storage auditing has drawn considerable attention from both the industry and the research community. Researchers are also proposing various cloud storage auditing protocols with different functionalities. However, a large gap still exists between the current research and the current industrial cloud storage practice, due to the efficiency and functionality issues of proposed protocols. To resolve the gap, this project aims to study more efficient and practical cloud storage auditing protocols which leverage only simple concepts, support third-party public auditing and efficient
data dynamics, enjoy parallel execution, and accommodate diverse real-world cloud storage models. Specifically, this project 1) studies to model the problem of cloud storage auditing as a distributed string equality checking problem; 2) constructs two cloud storage auditing protocols from two classical distributed string equality checking algorithms; 3) parallelizes the proposed protocols in this project which are based on distributed string equality checking by leveraging the MapReduce model; and 4) generalizes the proposed protocols to support diverse cloud storage models. The research results from this project can not only deepen the research community’s understanding on cloud storage auditing, but also enable the real-world industry to further resolve cloud storage auditing.

(3) Title: Dynamic Computation Partitioning for Data Streaming Applications in Mobile Cloud Computing

(2016.01-2018.12, Principle Investigation: Dr. Lei Yang)

Abstract: Mobile cloud computation partitioning has been considered as an effective approach to improve the performance of applications running on mobile devices. Computation partitioning is to decide which parts of the application should be executed on mobile devices and which parts should be offloaded on clouds, such that the application performance is maximized. Existing works focus on the partitioning for workflow applications, and as well suffer from performance degradation in dynamic mobile cloud environments. To solve these problems, we will study the dynamic computation partitioning for data streaming applications. First, we will develop novel models to represent the data streaming applications, in which the input streaming data have certain temporal order in terms of the arrival and processing time, and whose performance metrics are more complex, including both the completion time and throughput. Based on this model, we will design optimal partitioning algorithm for data streaming applications. Second, we will study the computation partitioning problem in dynamic environment where the network bandwidth and device workload vary during the execution course of the applications. Third, we will study multi-user computation partitioning problem for large scale mobile cloud systems. In the systems, mobile users may share and complete the resources on the cloud, and thus their partitioning decisions are dependent with each other. The aim is to maximize the average performance of all the mobile users. This research will be applied into the implementation of advanced mobile cloud platforms in future. Meanwhile, it provides technical support and opportunities to cloud service providers to join in the market of mobile computing. 


(4) Title: Research on Homomorphic Aggregate Signature based on Lattice for Sensor Network

(2012.01-2015.12, Principle Investigator: Prof. Jianping Yu)
Abstract: The project is to construct homomorphic aggregate scheme and protect the data of aggregation or broadcast communication. Specific research directions include: (i) security analyses of sensor data aggregation and coding network broadcast communication; (ii) lattice Cryptography; (iii) homomorphic signature and aggregate signature; (iv) homomorphic aggregate signature.


(5) Title: Differentiated security evaluation model based on optimization of security and Quality of Service (QoS)

(2012.01-2015.12, Principle Investigator: Prof. Jianyong Chen)
Abstract: with the development of cloud computing, service sharing is becoming main approach of internet. Similar with differentiated QoS, the differentiated security can satisfy specific requirement of security from different services and users. It is necessary to provide dynamic and differentiated security solution for specific service through evaluation model. The key issue of differentiated security is how to quantify the interaction relationship between security and QoS. The project studies the mapping relationship between security dimension and service access environment, security requirement of service and type of service. Then combining with resource consumptions from security algorithms in different security dimensions, the project studies the impact of security algorithms and protocols to key parameters of QoS. Based on the studies, a multi-objective mathematical model is set up. With improve immune algorithm, optimal parameters of both security and QoS can be got from solving the model. Fruits of the project can break the security bottle net of cloud computing and benefit network service for users with lower cost and higher security.


(6) Title: Research and application of hybrid systems controllable virtual  viability  region based on  finite-time transition

(2013.01-2015.12, Principle Investigator: Dr. Jianqiang Li)
Abstract: For actual complex system modeling problems such as CPS, robot, and traffic control, this project proposes a finite-time transition hybrid system modeling method. The non-ideal transition under the piecewise affine (PWA) model and mixed logic dynamic (MLD) model as well as linear perturbation reduction are studied. Then the viability region of maximal invariant set and its expression method are proposed to solve through establishing virtual survival instant state regions by reverse calculation. Finally mixed logic model predictive control algorithm is proposed based on invariant sets; the transition sequence and conditions are designed to obtain better robustness and security. Theoretical results will be directly applied to design optimal transition strategy for robot systems.


(7) Title: Research on Elliptic Curve Cryptography Cryptanalysis Techniques

(2015.01-2017.12, Principle Investigator: Dr. Ping Wang)
Abstract: The project will explore a number of ECDLP computation problems penetrate deeply, including: (1) make use of the elliptic curve group structures and the features of the point operations, to design more efficient algorithms for ECDLP computation; (2) design efficient algorithm to solve the multi-elliptic curve discrete logarithm problem, and analysis its computational complexity; (3) based on the quantum algorithm of ECDLP, explore efficient quantum algorithms for elliptic curve isogeny and design quantum algorithms for certain NPC problems. This project will address a number of important issues mentioned above on ECDLP computations, so as to evaluate the security level of current ECC commercial standards more precisely, to explore new more efficient algorithms to solve ECDLP.


(8) Title: Distributed Multiobjective Immune Algorithm and Its Application in the Cloud Computing Differentiated Security

(2015.01-2017.12, Principle Investigator: Dr. Qiuzhen Lin)
Abstract: This project is to develop a novel distributed-parallel framework and a new adaptive technology for immune algorithms. At last, the designed algorithm is applied to optimize the multiobjective model of cloud computing differentiated security. The specific research direction includes: (i) multiple objectives optimization (ii) Immune-inspired optimization algorithms (iii) Modeling of cloud computing differentiated security.

last updated:2016/04/01
Research Institute of Network and Information Security,Shenzhen University | since 2014