陈兰香

发布时间:2021-02-22浏览次数:11373

陈兰香:工学博士,教授,博导,福建师范大学计算机与网络空间安全学院、福建省网络安全与密码技术重点实验室。

电子邮箱:lxiangchen@fjnu.edu.cn

研究方向:云计算与云存储安全、大数据隐私保护

教育经历

2005/07-2009/12    华中科技大学计算机学院计算机系统结构专业博士

2003/09-2005/07    华中科技大学计算机学院计算机系统结构专业硕士

1999/09-2003/07    成都理工大学计算机科学与技术系计算机科学与技术专业本科

工作经历

2010/01-至今   福建师范大学   计算机与网络空间安全学院

学术兼职

期刊IEEE Transactions on Emerging Topics in Computing,IEEE Transactions on Industrial Informatics, IEEE Transactions on Systems, Man, and Cybernetics, IEEE Internet of Things JournalIEEE Transactions on ReliabilityIEEE Transactions on Services ComputingACM Transactions on Design Automation of Electronic SystemsFuture Generation Computer SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsJournal of Network and Computer ApplicationsWorld Wide Web Journal, IEEE AccessSoft ComputingComputers & SecurityComputers & Electrical EngineeringSecurity and Communication NetworksJournal of Computer and System SciencesMultimedia SystemsThe Journal of Supercomputing,计算机学报,计算机研究与发展等审稿人。

科研项目:

1. 国家自然科学基金面上项目:隐私保护的结构化加密技术研究,2021-2024,主持;

2. 国家自然科学基金青年项目:云存储中多用户可验证的动态可搜索对称加密研究,2017-2019,主持;

3. 福建省自然科学基金面上项目:健康医疗大数据共享安全的关键技术应用研究,2019-2022,主持;

4. 福建省自然科学基金面上项目:云存储服务中密文检索关键技术应用研究, 2015-2018, 主持;

5. 福建省自然科学基金青年项目: 云存储服务中保障数据安全的关键技术研究, 2011-2014, 主持;

6. 福州市科技计划项目:安全云存储系统关键技术应用研究,2014-2017,主持;

7. 国家自然基金面上项目:基于随机模型的多处理机系统可靠性研究,2016-2019,参与;

8. 国家自然科学基金海峡联合基金重点项目:面向大学生心理安全大数据的预警模型及应用研究,2019-2022,参与;

9. 福建省自然科学基金面上项目:大规模多处理机系统的容错性研究,2017-2020,参与;

10.福建省自然科学基金项目:网络系统故障诊断与定位分析,2013-2015,参与;

11.福建省教育厅(JK)项目:可检索的加密云存储关键技术应用研究,2014 -2017,主持;

12.福建省教育厅A类项目:云存储服务中可证明数据持有的关键技术研究,2011-2012,主持;

13.福建省教育厅B类项目:云存储中可证明数据持有及恢复技术研究,2011-2012,主持;

14.国家社会科学基金“十二五”规划2014年度教育学青年课题:基于提取和反馈的计算机辅助二语词汇习得模式研究,2014-2017,参与;

15.福建省教育厅A类项目:非负矩阵分解在无向无权重复杂网络社区发现中的应用,2015-2017,参与;

专著

陈兰香.云存储安全—大数据分析与计算的基石,清华大学出版社,2019.

发表论文

1)  陈磊磊,陈兰香,穆怡. 医疗辅助诊断系统中新型的双向隐私保护方法. 密码学报, 8(1): 167-182, 2021.

2)  符庆晓, 陈兰香, 李继国, 姚志强. 一种高效的基于分治邻接表的动态完整性审计方案[J]. 密码学报, 8(4): 601-615, 2021.

3) 薛玉洁, 陈兰香, 穆怡. 基于BTM主题模型的对称可搜索加密方案. 密码学报, DOI: 10.1195.TN.20211112.1634.002.

4) Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen. Secure and Efficient Data Aggregation for IoT Monitoring Systems. IEEE Internet of Things Journal, 8(10): 8056-8063, 2021.

5) Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang. Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT. IEEE Transactions on Cloud Computing, DOI: 10.1109/TCC.2021.3087614. 2021.

6) Wai-Kong Lee, Lanxiang Chen, Chin-Chen Chang, Zhiqiang Yao. Post-quantum Blockchain for Secure Communication in IoT based Smart Home Services. International Journal of Embedded Systems, Online, 2021.

7) Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu, Kim-Kwang Raymond Choo. Secure search for encrypted personal health records from big data NoSQL databases in cloud. Computing, 102(6): 1521-1545, 2020.

8) Lanxiang Chen, Wutong Bai, Zhiqiang Yao. A Secure and Privacy-Preserving Watermark based Medical Image Sharing Method. Chinese Journal of Electronics, 29(5): 819-825, Sept. 2020.

9) Mengjie Lv, Shuming Zhou, Gaolin Chen, Lanxiang Chen, Jiafei Liu, Chin-Chen Chang: On Reliability of Multiprocessor System Based on Star Graph. IEEE Transactions on Reliability, 69(2): 715-724, 2020.

10)Lanxiang Chen, Wai-Kong Lee, Chin-Chen Chang, Kim-Kwang Raymond Choo, Nan Zhang. Blockchain based Searchable Encryption for Electronic Health Record Sharing. Future Generation Computer Systems, 95 (2019): 420-429, 2019.

11)Lanxiang Chen, Zhenchao Chen. Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption. The 18th International Conference on Cryptology and Network Security (CANS 2019), pp 163-183, Fuzhou, China, 25-27 October 2019.

12)Lanxiang Chen, Zhenchao Chen, Kim-Kwang Raymond Choo, Chin-Chen Chang, Hung-Min Sun. Memory Leakage-Resilient Dynamic and Verifiable Multi-Keyword Ranked Search on Encrypted Smart Body Sensor Network Data. IEEE Sensors Journal, 19(19): 8468-8478, 2019.

13)Zehui Shao, Pu Wu, Enqiang Zhu, Lanxiang Chen. On Metric Dimension in Some Hex Derived Networks. Sensors, 19(1): 94, 2019.

14)Huidan Hu, Changlu Lin, Chin-Chen Chang, Lanxiang Chen. An enhanced secure data backup scheme using multi-factor authentication. IET Information Security, 13(6): 649-658, 2019.

15)Zehui Shao, Zepeng Li, Pu Wu, Lanxiang Chen and Xiaosong Zhang. Multi-Factor Combination Authentication using Fuzzy Graph Domination Model. Journal of Intelligent & Fuzzy Systems, 37(4): 4979-4985, 2019.

16)Lanxiang Chen, Nan Zhang, Kuan-Ching Li, Shuibing He, Linbing Qiu. Improving File Locality in Multi-Keyword Top-k Search Based on Clustering. Soft Computing, 22(9): 3111-3121, 2018.

17)陈兰香, 陈振朝. 一种基于相似搜索平衡二叉树的多关键词排序密文检索方案. 密码学报, 5(3): 271–285, 2018.

18)Lanxiang Chen. A Framework to Enhance Security of Physically Unclonable Functions Using Chaotic Circuits. Physics Letters A, 382(18): 1195-1201, 2018.

19)Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Shuming Zhou. A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack. Journal of Internet Technology, 19(1): 167-176, 2018.

20)Wai-Kong Lee, Raphael C.-W. Phan, Bok-Min Goi, Lanxiang Chen,Xiujun Zhang, Naixue Xiong. Parallel and High Speed Hashing in GPU for Telemedicine Applications. IEEE Access, Volume 6, pp. 37991-38002, 2018.

21)Zehui Shao, Pu Wu, Enqiang Zhu, Lanxiang Chen. Metric Dimension and Robot Navigation in Specific Sensor Networks. The 10th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2018), pp. 369-373, 2018.

22)Yongsheng Rao, Pu Wu, Zehui Shao, Ramy Shaheen, S.M. Sheikholeslami, Lanxiang Chen. The Rainbow Restrained Domination in Torus Network. The 10th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2018), pp. 393-400, 2018.

23)Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Wenbo Shi, Nan Zhang. DMRS: An Efficient Dynamic Multi-keyword Ranked Search over Encrypted Cloud Data. Soft Computing, 21(16): 4829–4841, 2017.

24)张楠, 陈兰香. 一种高效的支持排序的关键词可搜索加密系统研究. 信息网络安全, 2017(2): 43-50, 2017.

25)陈兰香,周书明.云存储中基于二进制向量索引的密文云数据排序查询方法.计算机应用与软件34(3)7-12, 2017.

26)陈兰香, 邱林冰. 基于Merkle哈希树的可验证密文检索方案. 信息网络安全, 2017(4): 1-8, 2017.

27)Shuming Zhou, Sulin Song, Xiaoxue Yang, Lanxiang Chen. On Conditional Fault Tolerance and Diagnosability of Hierarchical Cubic Networks. Theoretical Computer Science. 609(2016): 421-433, 2016.

28)Lanxiang Chen, Nan Zhang. Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud. The First EAI International Conference on Security and Privacy in New Computing Environments (SPNCE 2016), LNICST, volume 197, 2016.

29)Yong Yu, Yafang Zhang, Jianbing Ni, Man Ho Au, Lanxiang Chen, Yongyu Liu. Remote Data Possession Checking with Enhanced Security for Cloud Storage. Future Generation Computer Systems, 52: 77-85, 2015.

30)Lanxiang Chen, Gongde Guo and Zhen Peng. A hill cipher-based remote data possession checking in cloud storage. Security and Communication Networks, 7(3): 511–518, 2014.

31)彭真,陈兰香,郭躬德,云存储中基于喷泉码的数据恢复系统. 计算机应用, 34(4): 986-9932014.

32)Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, and Qi Xia. Improvement of a remote data possession checking protocol from algebraic signatures. The 10th International Conference on Information Security Practice and Experience (ISPEC 2014), pp. 359-372, 2014.

33)Lanxiang Chen, Shuming Zhou, Xinyi Huang, Li Xu. Data Dynamics for Remote Data Possession Checking in Cloud Storage. Computers & Electrical Engineering, 39(7): 2413-2424, 2013.

34)Lanxiang Chen. Using Algebraic Signatures to Check Data Possession in Cloud Storage. Future Generation Computer Systems, 29 (7): 1709-1715, 2013.

35)陈兰香,许力. 云存储服务中可证明数据持有及恢复技术研究. 计算机研究与发展, 49(Suppl.): 19-25, 2012.

36)Shuming Zhou, Lanxiang Chen, Jun-Ming Xu, Conditional fault diagnosability of dual-cubes, International Journal of Foundations of Computer Science, 23 (8): 1729-1747, 2012.

37)彭真,陈兰香,郭躬德. 基于喷泉码的隐私保护和数据恢复方法. 华中科技大学学报(自然科学版), 40(355): 54-572012.

38)曹夕,许力,陈兰香. 一种云存储系统中数据完整性验证协议. 计算机应用, 32(1): 8-122012.

39)Lanxiang Chen, Zhen Peng. The Design Principles for User-centered Remote Data Possession Checking. The 8th International Conference on Computational Intelligence and Security (CIS 2012),pp. 615-618, 2012.

40)陈兰香.一种基于同态Hash的数据持有性证明方法. 电子与信息学报, 33(9): 2199-2204, 2011.

41)陈兰香,一种基于会话的安全Web文件服务模型. 计算机工程, 37 (18): 127-130, 2011.

42)Lanxiang Chen, Shuming Zhou. Research on Remote Data Possession Checking. Journal of Convergence Information Technology, 6(12): 42-50, 2011.

43)Lanxiang Chen, Gongde Guo. An Efficient Remote Data Possession Checking in Cloud Storage. International Journal of Digital Content Technology and its Applications, 5(4): 43-50, 2011.

44)Lanxiang Chen. Using Algebraic Signatures for Remote Data Possession Checking. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2011), pp. 289-294, 2011.

45)Lanxiang Chen, Dan Feng, Yu Zhang, Lingfang Zeng and Zhongying Niu. Integrating FPGA/ASIC into cryptographic storage systems to avoid re-encryption. International Journal of Parallel, Emergent and Distributed Systems, 25(2): 105–122, 2010.

46)Lanxiang Chen, Shuming Zhou. The Comparisons between Public key and Symmetric key Cryptography in Protecting Storage Systems. 2010 International Conference on Computer Application and System Modeling (ICCASM’10), pp. 494-502, 2010.

47)Shuming Zhou, Lanxiang Chen. Fault Tolerance of (n, k)-Star Graphs. The 5th International Conference on Computer Science & Education (ICCSE'10), pp. 239-243, 2010.

48)Shuming Zhou, Lanxiang Chen. Fault Tolerant Maximal Local Connectivity of Alternating Group Networks. The 2010 3rd International Congress on Image and Signal Processing (CISP'10), pp. 4394-4398, 2010.

49)Lanxiang Chen, Dan Feng, Zhan Shi, Feng Zhou. Using Session Identifiers as Authentication Tokens. The 2009 (44th) IEEE Conference on Communication (ICC 2009), in DresdenGermany, June 14-18, 2009.

50)Lanxiang Chen, Dan Feng, Lingfang Zeng, Yu Zhang. A Direction to Avoid Re-encryption in Cryptographic File Sharing. IFIP International Conference on Network and Parallel Computing (NPC 2007), pp. 375–383, 2007.

51)Dan Feng, Lanxiang Chen, Lingfang Zeng, Zhongying Niu. FPGA/ASIC based Cryptographic Object Store System. IEEE Proceedings of the Third International Symposium on Information Assurance and Security (IAS 2007), pp. 267-272, 2007.

52)Lanxiang Chen, Dan Feng. Dynamic Security Policy for Credential-based Storage Systems. IEEE Proceedings of the Second International Conference on Convergence Information Technology (ICCIT 2007), pp. 1162-1167, 2007.

53)Lanxiang Chen, Dan Feng, Liang Ming. The Security Threats and Corresponding Measures to Distributed Storage Systems. Source: The 7th International Symposium on Advanced Parallel Proceeding (APPT 2007), pp. 548–556, 2007.

54)Lanxiang Chen, Dan Feng. An Efficient Credential-based Scheme for Cross-domain File Sharing. IEEE Proceedings of International Conference on Computational Intelligence and Security (CIS 2007), pp. 614-617, 2007.


授课

Linux操作系统》、《计算机网络》、《程序设计-C语言》、《Java程序设计》、《云计算与虚拟化技术》、《新技术的应用安全》(研究生课程)、《物联网数据存储与管理》、《云计算安全》、《计算机专业英语》、《计算机科学导论》、《网络管理原理与应用》、《大学计算机应用基础》等。