The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
The quantity of data that is captured, collected, and stored by a wide variety of organizations is growing at an exponential rate. The potential for such data to support scientific discovery and optimization of existing systems is significant, but only if it can be integrated and analyzed in a meaningful way by a wide range of investigators. While many believe that data sharing is desirable, there...
Secure multiparty computation allows multiple parties to participate in a computation. SMC (secure multiparty computation) assumes n parties where n>1. All the parties jointly compute a function. Privacy preserving data mining has become an emerging field in the secure multiparty computation. Privacy preserving data mining preserves the privacy of individual's data. Privacy preserving data mining...
Privacy preservation is an important area of the data mining because it allows the sharing of data between multiple parties. Various techniques are available to give privacy between multiple parties. In recent years, privacy preserving data mining has become more important because of the increasing ability to store personal data on the internet. In this paper, we discuss a novel protocol to compute...
In this paper, we describe a man-in-the-middle attack against one of the high confidence and efficient privacy RFID protocols recently proposed by Santi and Megda. The attack, during which an intruder can impersonate a valid reader or a tag and forge a set of messages to communicate with the honest agents, destroys the assumed authentication of the protocol, one of the important properties of secure...
Several protocols of secure processing of user's information in Location Based Service (LBS) have been raised up. Kohlweiss et al constructed a secure framework protecting for both the user's location information and user's usage profiles using oblivious transfer and homomorphic encryption. However, an intermediate proxy was introduced in the protocol to interact between the server and the user, which...
The remote attestation mechanism serves to prove the trusted state of remote platform to a local user, and TPM is always the bottleneck of remote attestation efficiency. There are some improvement methods on remote attestation scalability at present. However, the existing methods have the problems such as lack of privacy protection, vendor discrimination, and marked increase of communication load...
Protection of privacy has become an important problem in data mining. In this paper, we present a new scheme to privacy-preserving collaborative data mining based on the homomorphic encryption and ElGamal encryption system in distributed environment. This scheme can be used to compute the k-nearest neighbor search. Our scheme is provable secure and efficient and can prevent colluded attacker. Comparing...
Secure multi-party computation (SMC) deals with the problem of secure computation among participants who are not trusted by others. Privacy preserving computational geometry is a special area in SMC and has been applied to various of areas such as military, commerce and governments et al. In this paper, we will propose an efficient secure protocol, which is based on numerical computation, for the...
Research on secure multi-party computation is of great interest in the field of information security. To determine convex hull algorithm for planar point set or polygons may be applied in a large number of research fields, and at present, there are a lot of methods to solve this problem. In this paper, a protocol is schemed out to determine a line by two secret points. The method is applied to determine...
A protocol is secure if the parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's party data. During computation of inputs, we had considered the factor, what if trusted third parties are malicious? Considering...
Private-preserving shared dot product protocol is an important protocol of many secure multi-party computation problems. It has been the main building block of various data mining algorithms with privacy concerns, and providing fundamental security guarantee for many privacy-preserving data mining algorithms. In this paper, we construct a privacy-preserving two-party shared dot product protocol based...
Privacy-preserving data mining aims at securely extracting knowledge from two or more parties' private data. Secure multi-party computation is the paramount approach to it. In this paper, we study privacy-preserving add and multiply exchanging technology and present three new different approaches to privacy-preserving add to multiply protocol. After that, we analyze and compare the three different...
Due to the well-developed technology, the radio frequency identification (RFID) is widely used in all areas. For some applications, the RFID system simply worked as a memory card without security mechanism. However, in many applications, the RFID systems need security mechanism for authentication. In scenario such as e-passport, the RFID systems even need mechanism to protect userpsilas privacy. In...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Current fashion systems to interconnect large software architectures are moving toward SOA based solutions. This new paradigm for designing system can be improved, in our opinion, by using semantics. Semantics can a play a main role in boosting interoperability thanks to current technologies to express knowledge and to describe semantic Web services (SWS). This paper tackles the provision of a Software...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.