The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web Search Engines allow the user to retrieve data from the Internet using search query. WSEs maintain search query log to improve the result quality by retrieving personalized search result. WSE are known to sell query log related data to the marketing organizations for boosting revenues, which poses a threat to user privacy. Private web search is a concept in which the user gets data from the Internet...
Data integrity is given top priority when exchange of information takes place. Information loses value, even becomes redundant should the intended user fail to obtain it. Modern day communications are mostly done on World Wide Web (WWW). Group communication must strike a balance between how quickly data is exchanged among users, at the same time, data security must not be compromised. Hence, protocols...
Anticensorship continues to be an arms race between citizens who use circumvention systems and the censors that find and block them. Many recently proposed circumvention systems have found ways to hide from deep-packet inspection (DPI), as well as active probing by the censors. However, many circumvention systems have trouble distributing the necessary resources to its users, and often use centralized...
In this paper, we propose a privacy preserving protocol for cloud system utilization based on extreme learning machine (ELM). The purpose is to implement aware agents (A-agents) on portable/wearable computing devices (P/WCD). The proposed protocol is useful to reduce the calculation cost on the P/WCD. The basic idea of the protocol is to divide an ELM-based A-agent into two parts, one containing the...
Privacy-preserving string search is a crucial task for analyzing genomics-driven big data. In this work, we propose a cryptographic protocol that uses Fully Homomorphic Encryption (FHE) to enable a client to search on a genome sequence database without leaking his/her query to the server. Though FHE supports both addition and multiplication over encrypted data, random noise inside ciphertexts grows...
In the big data era, security and privacy concerns are growing. One of the big challenges is secure Frequent Pattern Mining (FPM) over Fully Homomorphic Encryption (FHE). There exist some research efforts aimed at speeding-up, however, we have a big room so as to decrease time and space complexity. Apriori over FHE, in particular, generates a large number of ciphertexts during the support calculation,...
Physical location of data in cloud storage is a problem that gains a lot of attention not only from the actual cloud providers but also from the end users' who lately raise many concerns regarding the privacy of their data. It is a common practice that cloud service providers create replicate users' data across multiple physical locations. However, moving data in different countries means that basically...
Data deduplication is a technique that removes redundancy of data on the storage. For cloud storage services, enabling deduplication over encrypted data is of vital importance to achieve both cost savings and keeping data confidentiality simultaneously. Recently proposed solutions are not sufficient because of lacking desired level of security and efficiency. In this paper, we propose SEED, a novel...
In the beginning, this paper describes basic overview of attacks on TCP/IP stack in general. In the next section, there is overview of security of signalization and description of techniques used to secure signalization in multimedia communication. Then, there are described techniques of multimedia security. The last part of the paper deals with a Public key infrastructure (PKI) and aspects of its...
The TLS Internet Standard, previously known as SSL, is the default protocol for encrypting communications between clients and servers on the Web. Hence, TLS routinely protects our sensitive emails, health records, and payment information against network-based eavesdropping and tampering. For the past 20 years, TLS security has been analyzed in various cryptographic and programming models to establish...
Any information system using encryption tends to have its own key management infrastructure. In practice, we find a separate key management systems dedicated to application encryption, or database encryption, or file encryption etc. This emergent needs to several key management systems and multiple cryptographic algorithms are resolved by the new Key Management Interoperability Protocol (KMIP). This...
The purpose of this work is to promote an improvement of backbone networks in terms of availability and remote access. It especially focuses on network environments based on a hub and spoke topology. The significant findings indicate that data isolation, data encryption and encrypted dynamic routing information transmission are the main requirements for backbone network security. In addition, due...
Information-Centric Networking is a promising networking paradigm that overcomes many of the limitations of current networking architectures. Various research efforts investigate solutions for securing ICN. Nevertheless, most of these solutions relax security requirements in favor of network performance. In particular, they weaken end-user privacy and the architecture's tolerance to security breaches...
We present VTTLS, a vulnerability-tolerant communication protocol. There are often concerns about the strength of some of the encryption mechanisms used in SSL/TLS channels, with some regarded as insecure at some point in time. VTTLS is our solution to mitigate the problem of secure communication channels being vulnerable to attacks due to unexpected vulnerabilities in encryption mechanisms. It is...
Secure Socket Layer (SSL) protocol was introduced in 1994 and was later renamed as transport layer security (TLS) protocol for securing transport layer. SSL/TLS protocol is used for securing communication on the network by ensuring data confidentiality, data integrity and authenticity between the communicating party. Authentication of the communicating party and securing transfer of data is done through...
Fully homomorphic encryption is a cryptographic primitive with significant application potential, such as the capability of computing over encrypted data. However, even after a breakthrough result and several other valuable research efforts, fully homomorphic encryption solutions still come today with highly impractical complexity even for moderately large circuits. We consider the problem of designing...
The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems...
Secure communication and authentication are two very important factors when it comes to applications such as payments. Since payments involve critical information such as user account number, pin, balance, etc., it becomes very vulnerable to fraudulent elements that want to gain access to this information illegally. Thus, this hardware and algorithm aims at creating a mobile payment terminal through...
Spectacular expansion of RFID systems and applications by several industries such as business, electronics, health, marketing, transportation, etc. has made RFID ever more popular. Within this context, the industry search for lower tag weight and low cost system together with solemn security to satisfy the consumer. Tag search is among the most requested protocols in such systems. Being light weight...
Within the IoT-cloud, security has a very significant role to play. One of the best means to safeguard confidentially, security and privacy of a biometric image is through encryption. However, looking through encrypted data is a difficult process. A number of different techniques for searching encrypted data have been devised, but certain security solutions may not be used for smart devices within...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.