The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the prevalence of cloud computing, privacy-preserving database outsourcing has been spotlighted. To preserve both data privacy and query privacy from adversaries, databases need to be encrypted before being outsourced to the cloud. However, there exists the only kNN classification scheme over the encrypted databases in the cloud. Because the existing scheme suffers from high computation overhead,...
The aim of this paper is to design a system that has benefits equally for the client (cloud storage user) and the cloud storage provider. For the benefit of user, an improved security model for the data stored on the cloud is provided by encrypting the data even before uploading the file to the storage server. On the other side, the capacity of the cloud storage is optimally utilized by avoiding redundant...
Privacy and security of big data is emerging as one among the most relevant research challenges of recent years, also stirred-up by a wide family of critical applications ranging from scientific computing to social network analysis and mining, from data stream management to smart cities, and so forth. Traditionally, the issue of making (even very-large) databases private and secure has a long history...
This research aims to examine the effectiveness and efficiency of fuzzing hashing algorithm in the identification of similarities in Malware Analysis. More precisely, it will present the benefit of using fuzzy hashing algorithms, such as ssdeep, sdhash, mvHash and mrsh – v2, in identifying similarities in Malware domain. The obtained results will be compared with the traditional and most common Cryptographic...
Today it is very necessary to protecting Sensitive information from external world. To protecting sensitive information now a day's barcode technique is used. In the real world many industries are using the technique to protect sensitive information form external parties. This paper contains the algorithm which helps to protect the sensitive information. This proposed algorithm is useful to hiding...
In order to leverage a remote cloud based infrastructure, a company essentially gives away private data and information that might be sensitive and confidential to the service provider. Data Integrity and Confidentiality can be protected by using secret sharing schemes. To prevent service availability failure, multi-cloud data storage system can be implemented. In this paper, multimedia is protected...
By taking into account communication startup overhead and the assigned processor distribution order and by applying hashing technique, a novel sequence distribution strategy is presented and the parallel local alignment algorithm for multiple sequences is designed on the heterogeneous cluster system that the computing nodes have different computing speeds and communication capabilities based on divisible...
Since the current RFID systems have potential security problems in privacy, an improved method based on the random Hash lock is proposed following the analysis of several typical RFID methods. It can effectively prevent location tracking, eavesdropping, replaying and so on. In addition, it has many other advantages, such as s low computation complexity, low label cost and high security.
Fast and efficient protein sequence alignment and comparison algorithms have become significance as the size of databases grow very rapidly. This paper introduces a parallel algorithm for Hashing-N-Gram-Hirschberg (HNGH) algorithm. The HNGH algorithm is an extension of N-Gram-Hirschberg (NGH) algorithm which was proposed by Abdul Rashid in 2007. The parallel algorithm is proposed to speed up the sequential...
Take the relational database as the data model, in analyzes several kinds already in the data encryption technology base which has, studies the database data to save and to establish the corresponding database confirmation mechanism by the scrambled text way. Proposes based on the connection sub-key production algorithm as well as based on the user information key management technology and the field...
The shortest addition chains can provide high efficiency for the modular exponentiation in RSA, but the time and space complexity of finding out the shortest addition chains is extremely high. This research adopts addition chains tree to produce addition chains and store them into a database,in which the number of child nodes of each node is uncertain until the children of this node in the tree is...
Biometric cryptosystem (BC) is a very secure approach for template protection because the stored template is encrypted. The key issues in BC approach include(i) limited capability in handling intra-class variations and (ii) binary input is required. To overcome these problems, this paper adopts the concept of discriminative analysis and develops a new binary discriminant analysis (BDA) method to convert...
In day to day life, Smart card plays an important role. Open your wallet! See at least 20 to 25 cards in it. Wondering?? Today, the world is fully in the hands of smart cards since it is easy to carry and even if it is stolen, it is secure. But due to the increase in hackers today, Smart cards are becoming insecure. The Encrypted PIN can be easily stolen by the cryptanalysts. So it is time to secure...
By borrowing ideas from a cryptographic algorithm of low key authentic degree, a novel steganographic method based on keyword shift is presented. The master key of the method is to shift the sensitive keywords in the text. The conditions to guarantee the reversibility of the method are analyzed and found out, the serviceability of the method in some situations is pointed out. The strong points and...
Multi-level encryption method was used to encrypt the database system and encryption design method for different levels of data granularity was given, respectively taking database level, table level, recording level and field level as the objects.
Due to control and monitoring of large number of process signals in a 365/24/7 process plant, any HMI (Human Machine Interface) application has its limitation for persistent long-term storage of the process data and effective analysis. The data in Siemens HMI application WinCC (Windows Control Centre) and many other applications is in compressed and encrypted form and cannot be accessed using standard...
This work presents a simple key management scheme for dynamic SQL randomization based on the approach of the SNMPv3 key generation. The original SQL randomization technique based on keyed randomization proxies lacks a mechanism for managing and updating cryptographic keys, which renders the technique vulnerable to the exposure or theft of the keys. Our scheme provides a practical solution to remove...
In modern society, especially on the Internet, you might have found you are having more and more usernames or IDs and passwords, which contains your private information. There are too many for you to remember and it is unsafe to write them down on you notebook. To solve this problem, this paper made a design and implementation of Passwords Management System (PMS), by which you can manage your usernames...
In this paper, we proposed a file backup method. Files in devices of computer system can be destructed under abnormal condition. We divide file or database into ranges. Each range contains records and fields. We backup ranges to different devices. When files process the operation of creation, insertion, update or deletion, we only backup the corresponding ranges. When the original file is destructed,...
This paper analyzes the meaning and significance of key authentic degree of cryptosystem under the threat of the rubber-hose attack and ciphertext only attack. A novel cryptosystem of low key authentic degree is designed. The inner encryption is an extension like multiple-choice questions with keywords similar and contrary to the keywords in the plaintext. The corresponding decryption is like doing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.