The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The authors note a correction to the article [1]. Table 5 of the original article is incomplete. Few percentage values are missing. This article presents the corrected version of Table 5.
Gathering public opinion by analyzing big social data has attracted wide attention due to its interactive and real time nature. For this, recent studies have relied on both social media and sentiment analysis in order to accompany big events by tracking people’s behavior. In this paper, we propose an adaptable sentiment analysis approach that analyzes social media posts and extracts user’s opinion...
Cloud computing is a tremendous opportunity for both enterprises and end users. Cloud users can benefit from the possibility of remote processing in order to outsource their data and infrastructure; that is why many companies have chosen to adopt cloud-deployed solutions such as remote databases, mail servers, and connected applications. However, the cloud fails to provide sufficient security measure...
A wormhole attack is a specific mechanism where two or more Autonomous Systems (ASes) coordinate to perform a black hole attack by exchanging secure BGP updates over a tunnel, signing route attestations for each other. Routing protocols generally choose route through a wormhole because it is, in general, the shortest route. This attack can redirect traffic through a chosen path that is compromised...
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
The digitalization of our day-to-day activities has resulted in a huge volume of data. This data, called Big Data, is used by many organizations to extract valuable information either to take marketing decisions, track specific behaviors or detect threat attacks. The processing of such data is made possible by using multiple techniques, called Big Data Analytics, which allow getting enormous benefits...
The longest prefix match is an algorithm used in routers to determine the next hop to which an entering packet must be forwarded based on its destination IP address. In this paper we present a blind forwarding scheme by implementing the longest prefix match algorithm using a homomorphic encryption scheme to deal with encrypted destination IP addresses. The goal of this protocol is to prevent any intermediate...
Credible BGP (C-BGP) is a lightweight alternative to secure BGP. Its main design objective is to address signature verification costs and deployment challenges associated with S-BGP. To this end, C-BGP defines a control layer of trusted ASes that is comprised of major Autonomous Systems (ASes) in the network. In this environment a non-trusted AS has to verify only the signatures of intermediate ASes...
Private Information Retrieval (PIR) is the fact that a client retrieves a certain record from a remote database managed by untrusted parties without letting them know which record has actually been requested, thus preserving the privacy of the client. Ostrovsky and Skeith showed in [1] that any homomorphic encryption can actually be used to achieve PIR. In this paper we use their protocol as basis...
In this paper we address a practical application of Van Dijk somewhat homomorphic encryption over the integers scheme. This application consists of giving a client the opportunity to choose a video to watch without letting the server or any third party know which video it is, thus preserving the privacy of the client. In a prior work we have already discussed this application using a fully homomorphic...
Video on-Demand services and other related applications have gained the utmost attention recently due to the growth of Internet and the development of streaming protocols. However, in these systems, where privacy and confidentiality are sensitive, many security aspects must be addressed. In this paper we propose a fully private video on-demand protocol that allows clients to preserve their privacy...
Cloud computing is a distributed technology that can extend the resources available for computers connected to the Internet. Computers can benefit from remote servers to gain extra storage capacities or to execute complex computations that require extended memories. However, the cloud fails to employ sufficient security measure to preserve the privacy of each client connecting to it. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.