The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the pretext of digital lifestyle in a Smart City, home security has become a prudent yet technically challenging area for players of this field. Home access system is a part of home security. In this paper, we present a smart locking and unlocking system for home door security. The proposed system controls the door lock through an Android App using Wi-Fi as the communication protocol, that communicates...
This is a fact already known by all many companies make large and important disbursements to keep their equipment and information safe from possible attacks and threats that are internal or external. Among the internal threats are the duplication of users, the change of credentials of access to the network, where fraud, sabotage and robberies through the network are actions that need to be faced with...
Although federated cloud computing has emerged as a promising paradigm, autonomous orchestration of resource utilization within the federation is still required to be balanced on the basis of workload assignment at a given time. Such potential imbalance of workload allocation as well as resource utilization may lead to a negative cloudburst within the federation. The analytical models found in the...
In recent times, the electronic health record (eHealth) system is regarded as one of the biggest developments in healthcare domains. An eHealth system needs to be agile, reliable, and sustainable. Although the existing Personally Controlled Electronic Health Record (PCEHR) systems are claimed to be fully controlled by the patients, there are ways where the healthcare professionals and the database/system...
Nowadays cloud services have become a cost-effective platform for sharing data and performing large scale computations. As outsourcing data to a third party involves security and privacy concerns, data should be sent to the cloud in encrypted form. To handle access control on encrypted cloud data, Ciphertext-Policy Attribute-based Encryption (CP-ABE) has become very popular. In this scheme data can...
In the recent years, we have observed the development of several connected and mobile devices intended for daily use. This development has come with many risks that might not be perceived by the users. These threats are compromising when an unauthorized entity has access to private big data generated through the user objects in the Internet of Things. In the literature, many solutions have been proposed...
Pervasive usage and wide-spread sharing of Electronic Health Records (EHRs) in modern healthcare environments has resulted in high availability of patients' medical history from any location and at any time, which has potential to make health care services both cheaper and of higher quality. However, EHRs contain huge amounts of sensitive information which should be protected from unauthorized accesses,...
Smart home user usually controls smart devices through smart application, which is managed by user's account. Thus, compromised account is possible and countermeasure to such attack can help protect both devices and data pertaining to them. In this paper, we propose a security countermeasure in case of compromised account in smart home system by introducing another layer of access control beyond the...
HTTPS has become a vital component of the WWW ecosystem. However, today's application-layer middleboxes in the cloud are largely “blind” to HTTPS traffic. We propose a novel system infrastructural solution, called CloudEye, that allows middleboxes to selectively manipulate HTTPS traffic. A key design philosophy of CloudEye is to hide all the complexity from client and server applications (thus being...
Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether,...
The use of cloud technology is continually expanding. Yet, in many scenarios the adoption of an external cloud service provider may be a worry for data confidentiality since it leads to a partially loss of control over data. One of the solutions for letting users put trust in a provider is the use of encryption to protect data. EncSwift [1] is a solution that provides transparent support for the encryption...
Service infrastructures operated by different operators with own policies are being federated to agglomerate various services. To join a federation, an operator must comply with a federation agreement. As a result, it takes time for the operator to check the consistency between own policies and the agreement, and to establish a network connection to federation's infrastructure. To ease these concerns,...
In this modern era of the digital world, the patient's medical records are electronically maintained and updated for the maintenance of the good health. The electronically stored patients' health status is termed as the Electronic Patient Record (EPR). The EPR service includes the accessing, storage, and maintenance by the authenticated users. However, in the emergency situation, the EPR can be required...
In this paper we explore the problem of providing selective read/write access to the outsourced data for clients using mobile devices in an environment that supports users from multiple domains and where attributes are generated by multiple authorities. We consider Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme as it can provide access control on the encrypted outsourced data. One limitation...
We propose a server-based approach to manage a general-purpose graphics processing unit (GPU) in a predictable and efficient manner. Our proposed approach introduces a GPU server task that is dedicated to handling GPU requests from other tasks on their behalf. The GPU server ensures bounded time to access the GPU, and allows other tasks to suspend during their GPU computation to save CPU cycles. By...
In order to solve the problems of privacy protection and the user revokes in social network, a multi-authority attribute-based encryption access control for social network is presented. In the proposed scheme, we utilizes the linear secret sharing scheme and the proxy re-encryption technique to achieve the user rights update and support flexible access control strategy. Multiple authorities jointly...
The passive multi-tags RFID hospital entry/exit detection system provides convenient, accurate and low-cost human access detection based on RFID with the data-mining methodology. Numerous methods based on other technologies, are easily effected by the unnecessary objects. In this paper, we developed a multi-tags RFID human access detection system, based on the passive RFID tags technology. 12 passive...
While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data...
Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first...
Cloud services are the most widely used services. From different services of cloud, data storage service is the most popular one. Generally, in traditional way data stored on cloud and user can fetch data from cloud but if data can be stored in encrypted format security of data will get increased. We are using encryption algorithm for this purpose. Our aim is to secure the data as well as we don’t...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.