The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proximity detection is one of the critical components in Location-based Social Networks (LBSNS), which has attracted much attention recently. With the advent of LBSNS, more and more users' location information will be collected by the service providers. However, with a potentially untrusted server, such a proximity detection service may threaten the privacy of users. In this paper, aiming at achieving...
Oblivious RAM (ORAM) is a primitive for hiding storage access patterns in the context of software protection. With the trend of cloud computing, ORAM also has important applications in privacy-preserving cloud storage applications. Many ORAMs for cloud storage have been proposed to improve efficiency and security. However, data availability, data confidentiality, and data integrity have not been simultaneously...
Compression is desirable for network applications as it saves bandwidth. Differently, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to the “Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH)” attack on web traffic protected by the TLS protocol...
We propose a Parity-based Data Outsourcing(PDO) model in this paper. This model outsources a set of raw data by associating it with a set of parity data and then distributing both sets of data among a number of cloud servers that are managed independently by different service providers. Users query the servers for the data of their interest and are allowed to perform both authentication and correction...
In this paper we considered the problem of finding pairs of mutually orthogonal diagonal Latin squares of order 10. First we reduced it to Boolean satisfiability problem. The obtained instance is very hard, therefore we decomposed it into a family of subproblems. To solve the latter we used the volunteer computing project SAT@home. In the course of 10-month long computational experiment we managed...
Proofs of retrievability (POR) are interactive protocols that allow a verifier to check the consistent existence and availability of data residing at a potentially untrusted storage provider, e.g., a cloud. While most POR protocols strictly refer to static files, i.e., content that is read-only, dynamic PORs shall achieve the same security guarantees (existence, consistency and the possibility to...
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interface between user and server, to access and store data for one's need. Mobile technology in cloud computing is helps users to operate on the data for any of the application for their organization...
Distributed storage plays a crucial role in the current cloud computing framework. After the theoretical bound for distributed storage was derived by the pioneer work of the regenerating code, Reed-Solomon code based regenerating codes, including the minimum storage regeneration (MSR) code and the minimum bandwidth regeneration (MBR) code, were developed. However, in the hostile network with passive...
Nowadays, voice over IP (VoIP) is rapidly replacing standard phone line as a telephony service of choices. However, VoIP can be exploited by an attacker using method such as eavesdropping, hijacking and etc. To ensure confidentiality and integrity of the conversation or messages sent in the network, a more secure protocol is needed. This research proposes a solution to enhance the security of VoIP...
This paper presents a system that allows the secure remote configuration of an FPGA, which is assumed to be the only device in the secure zone. This means that no security critical information passes over the borders of the FPGA chip, reducing the opportunities for an attacker to break the system. In particular, bitstream compression in combination with partial reconfiguration is used to avoid the...
White box cryptography is the new technique against attacks on white box attack environments. In white box attack model, the attacker is even stronger than in black box attack model, and the attacker can monitor all intermediate values. Therefore, safety algorithms are needed against all operation steps being exposure. Chow introduced secure white box cryptography with AES DES implementations against...
Many research and development efforts have been devoted towards the design of dependable storage systems, but the effort in evaluating and comparing different designs for widely distributed environment is limited. In this paper, we develop models to evaluate the availability, security, and access performance of various storage designs for the cloud environment where storage resources are offered by...
When someone is providing a service, he or she also is likely to have an incentive to get compensation from the users of the service for the efforts invested in the service. This calls for proper accounting mechanisms. However, if there is a party that disputes the correctness of this procedure, one needs to be able to present evidence about the incurred costs. In this paper, we investigate secure...
Web browsers are promising candidates for the OPC's SOAP-HTTP WS-SC UA XML StackProfile to execute visualization solutions. First tests could demonstrate the applicability of native web browsers without any plugins but the required cryptographic algorithms cause unacceptable response times. The enormous performance improvement of JavaScript engines lets expect an adequate reduction of operating times;...
Service discovery is an essential element in pervasive computing environment. The involvement of only the needed users and service providers for a service discovery in pervasive computing environment is challenging. To protect their privacy, neither side is willing to expose their information first. A incrementally progressive exposure approach is used to solve the problem in this paper. In the approach...
This encryption algorithm is mainly designed for having a secure file transfer in the low privilege servers and as well as in a secured environment too. This methodology will be implemented in the data center and other important data transaction sectors of the organisation where the encoding process of the software will be done by the database administrator or system administrators and his trusted...
Peer to peer (P2P) botnets are a growing occurrence in the malware community. The Waledac botnet represents a new, more challenging trend in the P2P botnet evolution. The Waledac infrastructure has evolved key aspects of the P2P architecture and devolved others. This evolution/devolution has resulted in a more formidable botnet. As a result, the Waledac botnet is harder to infiltrate and harder to...
Web service security is essential for SOA-based applications. Based on the analysis of the two existing authentications of REST-style Web services, Basic HTTP Authentication and HTTP Digest Authentication, we propose an extended UsernameToken-based approach for REST-style Web service. In this approach, the WS-Security UsernameToken and secondary password are added into the HTTP header. By this way,...
Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software...
Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a task that can be delegated to a remote proxy server. This server has to engage the user in a challenge-response mechanism that does not require him to disclose his password to the local machine; if the user responds correctly,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.