The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Unmanned aircraft are quickly gaining credibility as an efficient tool for a wide range of tasks. With the increase in the amount of UAVs in the sky, the need for the UAV traffic management arises. Unmanned air traffic management system (UTMS), especially in the urban airspace, could be considered as a critical infrastructure, which — if disrupted — can lead to severe monetary losses and even casualties...
Traditional cloud storage has relied almost exclusively on large storage providers, who act as trusted third parties to transfer and store data. This model poses a number of issues including data availability, high operational cost, and data security. In this paper, we introduce a system that leverages blockchain technology to provide a secure distributed data storage with keyword search service....
There has been a significant growth in the interest to outsource data as well as operational services to clouds. Data outsourcing deprives the data owners of direct control over their data and this introduces new privacy risks. Data encryption has been introduced to address the data confidentiality issue. However, the management of encrypted data poses several challenges, the most important one is...
This paper addresses the problem of detecting the presence of malware that leaveperiodictraces innetworktraffic. This characteristic behavior of malware was found to be surprisingly prevalent in a parallel study. To this end, we propose a visual analytics solution that supports both automatic detection and manual inspection of periodic signals hidden in network traffic. The detected periodic signals...
We notice, in our experiments with three malware samples of Darkcomet, Andromeda, and Zeus, that all three of them generate highly periodic network traffic. In addition, while there are a few works on intrusion detection which are based on this periodic behavior of malware, the prevalence of this behavior among the malware families in the wild is unknown. In this paper, we conduct an extensive experimental...
Big data is the biggest asset today, for organizations to amass and leverage to improve on services and profits. Knowing this, data brokers have excelled in the task of collecting information about internet users from a variety of sources, both online and offline, and then sell this information to interested parties. This robs the users of the monetizing potential of their information. In this paper,...
With the massive amount of data being collected and collated every minute today, big data is what keeps the wheels of organizations running. This big data is generally collected by 'data brokers' who then sell this to whomsoever is willing to pay the right price. Due to the lack of any specific mechanism to ascertain the value of this information, the contributors and owners of this big data, i.e...
Big data is the biggest asset today, for organizationsto amass and leverage to improve on servicesand profits. Knowing this, data brokers have excelled inthe task of collecting and selling user information tointerested parties. This robs the users of the monetizingpotential of their information. In this paper, we have putforth our idea for users to monetize on their informationaided by the notion...
Oblivious data processing has a potential to make an extremely significant impact on the whole landscape of data processing, specifically in scenarios that could be classified as big data. Recent developments in the area of fully homomorphic cryptography make oblivious data processing much more realistic. However, performance implications could render these approaches uneconomical. Other approaches...
The increased computation and storage capabilities of smartphones have attracted more and more cybercriminals to write mobile malware for different purposes. Due to the popularity of smartphones in both personal life and business, it is empowering an emerging mobile security threat issue. In this paper, we present an intrusion detection system that incorporates not only network features but also host-based...
Database-as-a-Service is offered by many cloud service providers and could significantly reduce the IT infrastructure maintenance bills for enterprises. However, many hesitate migrating their data storage and processing to the cloud, and one of the reasons are data security issues. Encryption could provide sound security guarantees, but existing approaches often gravitate to one of the extremes: either...
Organizations and businesses have realized that their profits lie in utilizing the power of big data which is available freely, making it the most valuable asset for an organization to possess. Armed with this awareness, data brokers, the people who collect this information and present it in neat bundles for prospective buyers, are exploiting this resource at the cost of the common internet users,...
Together with the popularity of graph structure in real world data, graph analysis has become an attractive research topic. Triangle counting is one of typical graph mining tasks and plays a significant role in complex network analysis, with a wide range of applications in social network analysis, spam detection, and computer-aided design applications. Given the sensitive nature of graph data, the...
Today big data is synonymous with every business and organization, so much so that data brokers have made a business of trading this big data like any other commodity. In turn, the buyers of this big data make massive profits. The only one who loses out on profits and his privacy is the internet user — the generator and owner of this big data. Our work looks at allowing the user to monetize on his...
Thanks to the proliferation of social media and networking sites today, a massive amount of data is being generated by the second. This information is collated, collected and trawled from various sources to construct a ‘user profile’ of sorts and used to type cast and categorize people. This is done on a regular basis by data brokers, whose sole purpose is to collect user information and sell them...
With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if...
Individuals and companies, taking advantage of cloud computing which affords both resource and compute scalability, are willing to outsource their exploding data to save the storage and managing cost, however, users often do not fully trust the cloud and therefore outsource their private data after encryption to protect the data privacy. Here, as the data are both encrypted and outsourced in the cloud,...
Amplified and disrupting cyber-attacks might lead to severe security incidents with drastic consequences such as large property damage, sensitive information breach, or even disruption of the national economy. While traditional intrusion detection and prevention system might successfully detect low or moderate levels of attack, the cooperation among different organizations is necessary to defend against...
Organizations and individuals nowadays are more and more willing to outsource their data to save storage and management costs, especially with the push of cloud computing which offers both storage and computation scalability. However, the data, once being released to a server, is no longer under its owner's control, and its privacy and security herein become a primary concern. To this end, users usually...
Rule mining, for discovering valuable relations between items in large databases, has been a popular and well researched method for years. However, such old but important technique faces huge challenges and difficulties in the era of cloud computing although which affords both storage and computing scalability: 1) data are outsourced to a cloud due to data explosion and high storage and management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.