The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we explore the problem of providing selective read/write access to the outsourced data for clients using mobile devices in an environment that supports users from multiple domains and where attributes are generated by multiple authorities. We consider Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme as it can provide access control on the encrypted outsourced data. One limitation...
We present a method of generation of one-time keys (OTK) for single line authentication using zero knowledge (ZK) computation as undertaken by an authentication client application on a mobile device and a registration server. The method comprises initiation of an activation process on the authentication client by a user associated with the mobile device, a ZK computation sequence on the authentication...
Patient health records that can be retained on portable devices, require secure and efficient access control. This work presents Proof Carrying Authorization(PCA) for accessing a mobile based health card, which provides an efficient method for data security. Access control over resources is a mechanism by which each client's request is granted access by scrutinizing against the logic of application...
The current security models on mobile devices do not provide the level of protection required to handle sensitive data, such as protected healthcare information. In this paper, we introduce a Distributed Android Security Framework (DASF). DASF is a custom security framework for Android-based mobile devices that allows the enforcement of dynamic security policies on an application's privileges and...
The trend of adapting BYOD or "Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are able to use the mobile device which is comfortable and convenient for them. However, BYOD deployment brings serious security...
Outsourcing data to the cloud for computation and storage has been on rise in recent years. In this paper we investigate the problem of supporting write operation on the outsourced data for clients using mobile devices. We consider the Attribute-based Encryption (ABE) scheme as it is well suited to support access control in outsourced cloud environment. Currently there is a gap in the literature on...
In this paper, we propose a new Attribute-Based Encryption (ABE) scheme applicable to mobile cloud environments. A key issue in mobile cloud environments is how to reduce the computational cost on mobile devices and delegate the remaining computation to cloud environments. We also consider two additional issues: an efficient key revocation mechanism for ABE based on a concept of token-controlled public...
By moving data storage and processing from lightweight mobile devices to powerful and centralized computing platforms located in clouds, Mobile Cloud Computing (MCC) can greatly enhance the capability of mobile devices. However, when data owners outsource sensitive data to mobile cloud for sharing, the data is outside of their trusted domain and can potentially be granted to untrusted parties which...
In large organizations, handling personnel authorization for access to various sites within the building has always proved to be a challenge for security departments. In this work, we develop a prototype that utilizes an identity-based identification scheme to provide access control for incoming and outgoing personnel from the building, as well as their activities within. Our prototype is built using...
Modern Wi-Fi network has been a convinced way to connect to internet and widely accepted by people. Base on the Wi-Fi infra-structure, we can provide location-based services which could help to increase customers' experience and engagement in the services or activities provided by area owners. In this paper, we present a Wi-Fi hot zone based Location-Aware services which can dynamically cognize user's...
In this paper, we propose a fine-grained privacy-preserving location-based service (LBS) framework, called FINE, for mobile devices. It adopts the data-as-a-service (DaaS) model, where the LBS provider publishes its data to a third party (e.g., cloud server) who executes users' LBS queries. The proposed FINE framework employs a ciphertext-policy anonymous attribute-based encryption technique to achieve...
Nowadays, the authentication methods of physical access control such as key, smart card, and OTP (One Time Password) card require extra hardware, and it is not easy to be aware of if they are lost because of the low using rate. Nowadays, mobile phone is one of the most common used and carry-on device. It would be detected in a shorter time when a mobile phone is lost because it was frequently used...
Identity authentication and access control are the most important aspects of internet security. The traditional method to implement them is achieved through an API between the authentication and access control service provider with an application strengthened with one-time password. These methods do not meet the security demands and a new identification mechanism is required. We present a multilevel...
Many novel location-based services (LBS) such as a friend finder service require knowledge about the positions of mobile users. Usually, location services are used to manage these positions, and for providing basic functionality like spatial range queries or spatial events to the LBS. Managing and using the positions of mobile users raises privacy issues, in particular, if the providers of LBS and...
Radio-frequency identification (RFID) technology is widespread developed and common for vehicle management in intelligent community. However, smart card used as the sole certificate of identification could also be impersonated by criminals when the card is lost or stolen. In this paper, an improvement design to the current widely-used vehicle monitoring systems, which utilize the RFID technology to...
The location information is critical for many location-aware applications and services. Recent efforts have resulted in a plethora of techniques to localize wireless devices. However, with the availability of the location information, privacy concerns are raised: by whom and when should the location information be accessed? In order to provide trusted access to the location information, in this work,...
This paper proposes a secure mobile content delivery architecture in an integrated, hybrid network environment. Its design comprises device discovery, asynchronous content delivery, secure access control and virtual file system with dynamic reference mapping mechanisms, which are able to alleviate several inherent limitations in wireless and mobile networks. It thus enables mobile handheld devices...
As NETWORK attackers become more and more sophisticated and wireless communications make the potential risks in data protection more serious, we come to need much stronger authentication and access control systems. In this paper, we propose a combined authentication method including biometric and access control system based on attribute-wise encryption in wireless environment for ubiquitous computing...
This demonstration will present policies and scenarios from selected W3C Policy Language Group use cases. The flexibility of the KAoS ontology-based policy services framework will be demonstrated by modeling the very diverse policies described in the use cases. The integration of the KAoS policy decision point (Guard) with the JBoss server will be shown. One of the use cases requires spatial reasoning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.