The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud services are the most widely used services. From different services of cloud, data storage service is the most popular one. Generally, in traditional way data stored on cloud and user can fetch data from cloud but if data can be stored in encrypted format security of data will get increased. We are using encryption algorithm for this purpose. Our aim is to secure the data as well as we don’t...
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separating identity authentication and behavior authentication in open network environments, this paper proposes an access control method based on the analysis of user behavior in Web browsing...
The primary issues of data storage in cloud are the data authentication and confidentiality accessing the data. A direct solution to data privacy by encrypting the data before outsourcing the data in the untrusted server of cloud. This proposes the Privacy and Access Control for Security of Credit Card Records in the cloud using Partial Shuffling. Three components in privacy of records, Initially...
When private data or sensitive information is stored in the database, a typical way to protect the data is to encrypt the data before storing it. For efficiently retrieving the data, an effective search mechanism is needed that works over the encrypted data smoothly. When data is encrypted the performance of querying the database is degraded. In this paper we are going through the various search techniques...
In response to increasing threats of malicious activity and data loss on servers, we propose a different and practical strategy for access control modeled after flight plans for pilots, which mixes existing role-based, object-based, and intention-based access models; it supports much finer grained, real-time, sequence-oriented anomaly detection. Users are required to declare their intended “flight...
The smart mobile terminals and mobile broadband communications become more and more popular. Access control systems using traditional mechanical lock, IC card authentication and password authentication technology exposes more and more security issues. This paper describes the design and implementation of server authentication module. The server system used JAVA language development and JDBC technology...
Web of Things (WoT) can be considered as a merger of newly emerging paradigms of Internet of Things (IoT) and cloud computing. Rapidly varying, highly volatile and heterogeneous data traffic is a characteristic of the WoT. Hence, the capture, processing, storage and exchange of huge volumes of data is a key requirement in this environment. The crucial resources in the WoT are the sensing devices and...
Existing key distribution scheme based on key derivation has security default in cloud scenarios. The scheme distributes decryption keys to users through tags stored on cloud server. If the tag is destroyed by cloud server intentionally or unintentionally, the key distribution is destroyed too. Besides the above case, if all related tags are stored on client operated by user, the storage burden is...
Due to the latest trends on cloud and multi-cloud computing, the lack of interoperability raised a few issues that have been tackled with open standards and integration frameworks. However, the development of web applications adds a few more issues when accessing, managing, combining and orchestrating cloud resources in the application's logic. This paper proposes an extensible platform architecture...
Cloud-based object storage is provided as a cost-efficient, scalable, and durable service for accessing and storing objects through web technologies. With years of development and successful deployment, it has been widely adopted by individuals and organizations. Besides its advantages, there are several major concerns, such as, manageability, operation performance from a user perspective, convenience...
The Internet-based Electrical Engineering Lab (iEELab) of Zhejiang University is a hybrid network laboratory which provides users with both physical and virtual experimental mode. For the further integration of iEELab's platform resources, a management system is designed to unify the physical and virtual experiment platforms. The management system is structured in a layered pattern, and implemented...
eGovernment deploys governmental information and services for citizens and general society. As the Internet is being used as underlying platform for information exchange, these services are exposed to data tampering and unauthorised access as main threats against citizen privacy. These issues have been usually tackled by applying controls at application level, making authentication stronger and protecting...
Recently, the amount of personal medical information online is increasing exponentially, opening up new avenues for hackers to expose personal data that, unlike financial information, can result in a permanent violation of privacy. To protect the privacy of patient data, such as electronic health records (EHRs), access control was used before and attributed-based encryption is used recently. These...
Nowadays Electronic Health Records (EHRs) is a preferred method to store patients' health records. The emergence of cloud computing services provides users with flexible access, large storage capability and low costs, which motivate EHR maintainers to consider migrating EHR data from their own storage to the cloud. However, securing EHRs in cloud is a major challenge. Several security properties need...
Database as a Service (DaaS) is a common service mode in Cloud Computing. Based on Feldman (t,n) VSS protocol and ElGamal homomorphism property, we proposed a privacy-preserving access control protocol for DaaS. Using Secret Sharing, we can protect the security of data owner's dataset, based on ElGamal homomorphism property, the data requester's query combining with the proxy servers' access control...
In database outsourcing service, the data owners store their databases at the servers which belong to potentially untrusted service providers. It is necessary to protect outsourced data from unauthorized access. However, by using existing access control mechanisms, data owners are incapable of controlling access to individual sensitive attributes of their data. In this paper, we propose an Efficient...
A flexible access control mechanism with user authentication is required for campus wireless LAN roaming. In general, VLAN tagging and firewall are adopted to realize it. However, the scalability of the conventional VLAN mechanism is low for a large system. An OpenFlow-based system was proposed to solve the problem. In this paper, we point out some limitations of the conventional system, and propose...
Cloud computing is a cutting edge technology. eHealth is one promising application of this technology. In this paper, we describe a prototype implementation of an HL7-based eHealth application on the cloud. The system is secured with a risk-aware task-based access control. We demonstrate that our access control technique is more effective for preventing unauthorized access of medical information when...
The paper analyzed from the existing security problems of the traditional coarse granularity to database access mechanism, introduced the necessity of fine granularity access control mechanism into the development process of WEB technology, also described the Oracle Virtual Private Database (VPD) access control policy based on predicate method, and gave the performance optimization methods of data...
Aiming at the independent distribution units of multi-access system, a remote door access management system is researched and designed based on Ethernet. The system uses MSP430F149, together with W5100, to be the control core of every access system unit, and to achieve real time data communication between the access controller and the upper monitor based on TCP/IP protocols. The communication mode...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.