The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of smart terminals and mobile social networks, users can find potential friends who have similar interests by sharing personal attribute profile in mobile social networks (MSN). However, the personal attribute profile usually contains sensitive information, and if this information is captured by attackers, it may cause unexpected consequences. In this paper, we propose a privacy-preserving...
In a public cloud, a data owner outsources encrypted data in order to protect its privacy. However, when sharing data with particular users, it is neither willing to share the decryption key nor reluctant to download and decrypt data. The former may reveal its identity and the latter can cause high computing and communication cost. In this paper, we proposed a half-decryption scheme (SDS2) for crowd...
Short Message Service (SMS) is one of the most popular services in the Global System for Mobile (GSM) and many challenges for security arise from the development of message transmission among the broadband network. Recently, an interesting technique called signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented, with better...
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper, we propose a lightweight, computationally efficient protocol, called CLOAK, for the mobile device. CLOAK is based on stream cipher and takes the...
The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems...
Tokenisation has been adopted by the payment industry as a method to prevent Personal Account Number (PAN) compromise in EMV (Europay MasterCard Visa) transactions. The current architecture specified in EMV tokenisation requires online connectivity during transactions. However, it is not always possible to have online connectivity. We identify three main scenarios where fully offline transaction capability...
Friend discovery has been one of the hot topics in our social activities over the past decade. Mobile users have more opportunities to discover and make new social interactions with others in vicinity to build and extend their social communities. However, the inevitable information releasing conflicts with the increasing privacy concerns. In this paper, we employ the concept of friend-of-friend and...
The Mobile Instant Messaging Service (MIMS) is a popular feature on mobile communication devices today. It is a powerful and cheap facility to send and to receive messages through a handheld portable tool. Currently, many MIMS applications are available to support humans' activities in their everyday life. However, the security of this service needs to be increased for further applications such as...
It is increasingly clear that existing phone security mechanisms are inadequate and that change is necessary. Instead of protecting phone conversations from eavesdropping, the UK government's proposed voice encryption standard appears to be designed to facilitate undetectable mass surveillance.
This paper presents a secure mobile bill payment application. It is developed from a concept of a lightweight, agent-based, secure mobile payment protocol[1]. This aspect focuses on measuring the efficiency of the application while processing on a mobile phone. We compared the performance of the proposed method and the traditional method by using three indicators of performance. These include, memory...
Location-based services (LBSs) have raised serious privacy concerns in the society, due to the possibility of leaking a mobile user's location information in enabling location-dependent services. While existing location-privacy studies are mainly focused on preventing the leakage of a user's location in accessing the LBS server, the possible privacy leakage in the calculation of the user's location,...
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed...
Mobile crowdsensing applications can learn the aggregate statistics over personal data to produce useful knowledge about the world. Since personal data may be privacy-sensitive, the aggregator should only gain desired statistics without learning anything about the personal data. Differential privacy, the state-of-the-art privacy mechanism, can provide strong protection to ensure parties' privacy in...
Malicious host problem is still a challenging phenomenon in agent computing environment. In mobile agent computing, agent platform has full control over mobile agent to execute it. A host can analyze the code during stay of mobile agent on that host. A host can modify the mobile code for his benefits. A host can analyze and modify the data which is previously collected during agent itinerary. Hence...
Digital contents have been increasing rapidly in which they can contribute to business-to-customer productivity growth. A number of Mobile Digital Rights Management (MDRM) protocols have been proposed. The aim of MDRM is to distribute digital contents to consumers in a controlled manner that can protect the copyright of digital contents. Some protocols do not provide necessary security properties;...
The biggest issue in dealing with the remote cooperative group is efficient and secured broadcast. There is unavailability of a fully trusted key generator center. The Secure key distribution implementation GKMP (Group Key Management Protocol) is an efficient solution to all these issues. It creates keys for groups, distributes to the key members, ensures rule based access and allows hierarchical...
The increasing popularity of smartphones, equipped with GPS, provides new opportunities for location-based service (LBS). Among all kinds of LBSs, targeted advertising based on users' locations takes great advantage of the rich location data to improve the accuracy of advertising and thus potentially increase the sellers' profits. However, location-based advertising (LBA) has raised significant privacy...
Personal profiles usually contain sensitive information of people, while the emerging requirement of profile matching in mobile social networks may occasionally leak the sensitive information and hence violate people' privacy. In this paper we propose a user self-controllable profile matching protocol in privacy-preserving mobile social networks. By using our protocol, users can customize the matching...
Mobile QQ is the smartphone version of the most popular IM software QQ in China. This paper studies the encipher system and communication protocol of mobile QQ and analyzes its security flaws. We found some security risks of mobile QQ and some of which are fatal especially in a weak wireless environment: Any attacker who could access the communication channel could easily recover the encrypted message...
Personal Health Record (PHR) systems provide patients with access to their own records, as well as control over who accesses their record. There are many PHR system providers available on the market. These PHR systems, however, have little means to integrate with healthcare facilities in the healthcare system network. This paper proposes a Personal Health Record (PHR) system solution which allows...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.