The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attribute-based encryption schemes provide read access to data based on users' attributes. In these schemes, user privacy is compromised as the access policies are visible. This privacy issue has been addressed in literature by enabling the data owner to obfuscate the policy in a setting where a single authority generates decryption keys. However, a single authority can figure out the hidden access...
Spatial crowdsourcing engages individuals to collect and process social, environmental and other information with spatio-temporal features, making the data collection and analysis efficient, scalable and smart. The quality of task fulfillment strongly depends on the set of recruited workers. The more suitable workers are engaged, the better results may be obtained, meanwhile, the more privacy of workers...
Existing data management and searching system for Internet of Things uses centralized database. For this reason, security vulnerabilities are found in this system which consists of server such as IP spoofing, single point of failure and Sybil attack. This paper proposes data management system is based on blockchain which ensures security by using ECDSA digital signature and SHA-256 hash function....
There are different research communities in Kenyan universities and research institutes that required advanced research infrastructures and access to highperformance computing and grid-computing. Examples are research communities in computational modelling and materials science, bioinformatics, computational biology and chemistry, and engineering and computer science. Research infrastructures allow...
The Address Resolution Protocol (ARP) provides the link between layer 3 IPv4 addresses and layer 2 (MAC) addresses. ARP has no facilities for authenticating the communicating parties and is therefore vulnerable to spoofing attacks. Observing that in modern networks the use of the DHCP server to allocate both static and dynamic addresses is more or less taken for granted, we propose to use the DHCP...
Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology. Biometric technology is a concept that allows people to doing an digitally authentication using their bodies, for example by using their fingerprint. Now, fingerprint biometric technology system was available in some smartphone product, so that...
Electronic transaction signing is an important process as the volume and value of electronic transactions is increasing. There is a need for a secure yet convenient process to authorize the electronic transaction. On the other hand, current solutions often have complex deployment requirements, inclusive of a predefined communication channel to be established between the signer client and the signature...
A new method of proxy re-encryption using rectangular integer matrices as the private keys is described. The technique uses modular arithmetic to limit the size of the elements of the key matrices and also to provide resistance to cryptanalysis attack.
This work presents security solutions related to multi-sensor closed-loop artificial pancreas (AP) systems. The proposed AP system is built on a heterogeneous platform incorporating a smartphone, activity sensors, a glucose monitor, an insulin pump, a laptop hosting the multi-variable control algorithm and a cloud server. Developing a secure AP system is essential for mass adoption among diabetes...
The security of almost any real-world distributed system today depends on the participants having some "reasonably accurate" sense of current real time. Indeed, to name one example, the very authenticity of practically any communication on the Internet today hinges on the ability of the parties to accurately detect revocation of certificates, or expiration of passwords or shared keys.,,However,...
In this paper we explore the problem of providing selective read/write access to the outsourced data for clients using mobile devices in an environment that supports users from multiple domains and where attributes are generated by multiple authorities. We consider Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme as it can provide access control on the encrypted outsourced data. One limitation...
A service may be implemented over several servers, and those servers may become compromised by an attacker, e.g. through software vulnerabilities. When this happens, the service manager will remove the vulnerabilities and re-instate the server. Typically, this will involve regenerating the public key by which clients authenticate the service, and revoking the old one. This paper presents a scheme...
The ubiquity of the Internet and email, have provided a mostly insecure communication medium for the consumer. During the last few decades, we have seen the development of several ways to secure email messages. However, these solutions are inflexible and difficult to use for encrypting email messages to protect security and privacy while communicating or collaborating via email. Under the current...
One of the major limitations of index based encrypted string search on big dataset is the inherent problem of big index generation, maintenance and update which stops it from being dynamic in a sense that one could not modify data or add or remove keywords. Also for a resource constraint client, to generate an index linear in the size of big dataset is difficult. In this paper, we provide an efficient...
The Internet of Things (IoT) is more vulnerable to targeted cyber-attacks than an ordinary Information Technology (IT) infrastructure, where these cyber-attacks operate on subsequent identification (i.e., port scan and exploitation of device's vulnerabilities). Port scans can be rendered useless by applying Port Knocking (PK) as information is transmitted across closed network ports by using a common...
DNS provides a global-scale distributed lookup service to retrieve data of all types for a given name, be it IP addresses, service records, or cryptographic keys. This service has proven essential in today's operational Internet. Our experience with the design and development of Named Data Networking (NDN) suggests the need for a similar always-on lookup service. To fulfill this need we have designed...
In public key encryption with keyword search (PEKS) framework, see Figure 1(a), the cloud server stores index Iw and verifies the equivalence whether w = w′ or not on receiving a keyword search request through a trapdoor Tw′. Aside from the traditional secrecy concerns over index, a new threat called inner keyword guessing attack which addressed the secrecy of trapdoors against off-line brute force...
In order to ensure the security of mobile ad hoc networks (MANETs), the research on certificateless key management scheme is attracting more and more attention. The certificateless key management scheme can well resist the key escrow problem and it is very suitable for MANET, which is source-constrained and has no public key infrastructure. In this paper, we give an overview of some recent certificateless...
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, an inherent limitation of this approach (assuming low-entropy passwords are used) is that the user's password is exposed if this server is ever compromised. To address this issue, it has been suggested to share a user's password...
In this paper, a mutual authentication protocol based on ECC is designed for RFID systems. This protocol is described in detail and the performance of this protocol is analyzed. The results show that the protocol has many advantages, such as mutual authentication, confidentiality, anonymity, availability, forward security, scalability and so on, which can resist camouflage attacks, tracking attacks,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.