The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Checking data integrity remotely is of essential significance in cloud storage. It enables customers to check if their remotely stored information is intact or not without downloading the entire information. Out of two main focuses, we propose a remote information integrity checking model: ID-DPDP (personality based conveyed provable information ownership) in distributed-cloud storage. The conventional...
Cloud Computing is a framework where services are provided to the clients on pay per use basis. Many of the organizations uses cloud servers for outsourcing their sensitive data. Along with all the advantages of cloud computing there comes a threat of security of sensitive outsourced data. Cloud users cannot rely only on cloud service provider for the security reasons of the outsourced data. On that...
In many applications, such as e-voting, it is imperative that the privacy reaches a level of unconditional security. In this context, protocols that verify that condition reach maximum interest. Probably, the most interesting of them is Non Interactive Dining cryptographers (NIDC), which relaxes the condition of concurrency online for all participants. NIDC proposes to store the vote on a table of...
The purpose of a hash function is to produce a "fingerprint" of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like...
Non-verbal human social signals have emerged as an important area of study including the analysis of human deception. The ability to credibly detect truth and deception can be critical today especially due to the wave of terrorism acts and illegal immigration upheavals just to mention a few instances where individuals might not be forthright with their information. Unlike for non-verbal human social...
Cloud computing provides a novel computing paradigm for enterprises to store programs and data in the Cloud in a transparent manner, which poses the challenge of security and privacy. In this paper, based on homomorphic cryptography and Zero-Knowledge Proof, we present a novel privacy-preserving scheme for Cloud publish/subscribe service, which achieve efficient privacy-preserving authentication,...
In current Xen environment, platform attests its integrity to remote customer through signing the measurements of itself by Attestation Identity Key (AIK) from virtual TPM instance. They believe that this evidence of the platform is credible since the signature of AIK can not be faked. However, this approach ignores the privileged domain and its administrator. Since they could access arbitrary memory...
Many applications require reliable and trustful data aggregation in Wireless Sensor Networks (WSNs). In this paper, we propose a new scheme to achieve data privacy and integrity protection in data aggregation for WSNs, called Preserving Privacy and Assuring Integrity (PPAI) scheme. For this, before data transmission, the PPAI scheme blurs the original sampled data of a sensor node by randomly breaking...
Many cloud storage providers declare that they store multiple replicas of clients' data in order to prevent data loss. However, currently there is no guarantee that they actually spend storage for multiple replicas. Recently a multiple-replica provable data possession (MR-PDP) protocol is proposed, which provides clients with the ability to check whether multiple replicas are really stored at the...
Advanced distribution operation is an increasingly important function for smart grid, and a reliable communication network constitutes the core of the advanced distribution automation system. Ethernet Passive Optical Network (EPON) is regarded as a promising fiber-based communication technique for advanced distribution automation because it is not only high-speed, cost-effective but also scalable...
Since wireless sensor networks (WSNs) are resources- constrained, it is very essential to gather data efficiently so that the life of the networks can be prolonged. Data aggregation can conserve a significant amount of energy by minimizing the transmission costs in terms of the number of data packets. On the other hand, many applications require privacy of the sampled data protecting their integrity...
While updating a software system, it is paramount to safeguard the consistency of execution and let as many operations as possible execute undisturbed in order to minimise disruption. This paper proposes a framework that supports transparent dynamic updates of distributed systems consisting of Java classes. This framework aims at: (i) ensuring the consistency of the execution flow, and (ii) handling...
Current security protocols such as IPSec and TLS/SSL provide security mechanisms to authenticate and protect the communication between end-hosts over the Internet. Nonetheless, new communication scenarios like mobility and heterogeneous networks have exposed some technical limitations of these protocols. Both protocols employ the IP address as end-host identifier to establish security associations...
Bare PC applications do not use an operating system or hard disk. We present a lightweight VoIP security scheme for a bare PC softphone that consists of an RSA-based key exchange, AES voice encryption, and SHA-1 data integrity and authentication. The scheme is easily extended to incorporate replay protection and a key derivation function as specified in SRTP for example. Experimental results comparing...
A VPN uses IPSec framework to provide data integrity, data reliability authentication and against replay at the network layer. These features can protect the private data at a high security level but also bring additional pressure to the installations. In this paper, we will describe our IPSec VPN based security gateway system which can process private data in several Giga bps, using Intel's IXP2850...
This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact...
Communications and processing for Net-Centric Airborne Networks may become more vulnerable as additional nodes and entities are added to the networks. Accordingly, Information Assurance must provide greater protections in the face of these wider vulnerabilities. The capabilities of legacy systems still provide a basis for IA, but new operating modes mean that new capabilities are needed to mitigate...
Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken; the conclusions are used in the design of two new MAC constructs quicker block chaining MAC1 (QBC-MAC1) and quicker block chaining MAC2 (QBC-MAC2). Using software simulation we show that our new constructs point to improvements in usage of CPU...
3G-WLAN is a companion system of third-generation (3G) cellular systems and WLAN systems. By integration of these two systems, users can not only be offered a bit rate expectation placed on 3G systems, but also sufficient roaming and mobility support. Through 3G-WLAN, users could accesses into 3G application servers and makes use of service of these server. The services usually make use of the technique...
The deployment of wireless technologies for device communication in the industrial control field is a challenging and promising issue mainly due to the increasing flexibility and the mobility. However, with limited resources such as computation capability and memory, traditional security solutions can not guarantee security requirements and communications overhead in industrial wireless networks....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.