The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Preserving privacy in Big data is one of the most debated topics of computer security. The fast growing volume of data and the need of companies to extract value from that data creates new complicated and serious security challenges. Despite its wide spread, the common use and the popularity of Big data paradigm, significant risks and challenges are inherent to this new concept, especially when we...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
Any information system using encryption tends to have its own key management infrastructure. In practice, we find a separate key management systems dedicated to application encryption, or database encryption, or file encryption etc. This emergent needs to several key management systems and multiple cryptographic algorithms are resolved by the new Key Management Interoperability Protocol (KMIP). This...
Within the diversity of existing Cloud storage solutions, meeting the requirements of user mobility and devices' variety is crucial. First, data should be synchronized automatically and continuously when the user moves from one equipment to another. Second, the service should offer to the owner the possibility to share some of his data with specific users.
Cloud Storage services are increasingly adopted by users to outsource their data. These services tend essentially to synchronize data across user's devices and to share them between different users. Two issues raise when dealing with synchronizing shared data. First, synchronizing data that are already encrypted by users to multiple destinations may clearly introduce key and access control management...
Although the great success and the popularity of Cloud computing, an important number of challenges and threats are inherent to this new computing paradigm. One of the serious challenges in Cloud service architecture is managing authentication. Our goal in this paper is to present a flexible authentication solution based on TLS standard and asynchronous one time password mechanism. Our purpose is...
The centerpiece of an efficient Cloud security architecture is a well-defined access control policy. In literature we can find several access control models such as the Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONABC). The UCONABC is very suitable for the context of...
Data security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition...
Access Control over large scale distributed system like Cloud computing are one of the most debated topics of computer security. Despite the common use and the popularity of the Cloud computing paradigm, significant risks and challenges are inherent to this new concept, especially when we talk about storage of sensitive data via insecure network. In this paper we look at the problem of protecting...
Access Control over large scale distributed system like Cloud computing are one of the most debated topics of computer security. Despite the common use and the popularity of the Cloud computing paradigm, significant risks and challenges are inherent to this new concept, especially when we talk about storage of sensitive data via insecure network. In this paper we look at the problem of protecting...
While paperless is a source of tremendous opportunities for companies, it is also a bearing of many new risks. Indeed, externalization of electronic filing system can expose the company to several vulnerabilities and threats. We propose, in our gSafe (Government Safe) project a new Cloud service, named Safe Box as a service (SBaaS). SBaaS is used for probative value archiving sensitive documents during...
Named Data Networking (NDN) presents one of the first and most emergent Information Centric Networking (ICN) project. It offers an excellent substrate to solve today's Internet problems. To ensure security challenge, it adopts a data-centric model. The access control represents a fundamental security aspect. It prevents the data publication under any sensitive namespace and the access to any confidential...
The exponential growth of the Internet and the diversity of services delivered to the end users, such as Cloud computing, have catalyzed researches on new generation networks. Hence, several proposals have been made to change the network applications and Internet media; in particular network virtualization is in the center of research interest. It is widely considered given its ability of dynamic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.