The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work presents security solutions related to multi-sensor closed-loop artificial pancreas (AP) systems. The proposed AP system is built on a heterogeneous platform incorporating a smartphone, activity sensors, a glucose monitor, an insulin pump, a laptop hosting the multi-variable control algorithm and a cloud server. Developing a secure AP system is essential for mass adoption among diabetes...
With the Extension and application of cloud computing, users are more inclined to store data in the cloud. Hence the user data privacy protection have become important issues to be solved urgently. Encryption is an effective way to protect privacy, but encryption has a great impact on the performance of data processing. Encrypted data are often lost maneuverability. To cope with this problem, in this...
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious one is represented by the fact that the technological innovations are prone to various categories of threats. Making sure that information stays safe, unaltered and secret is an integral part of providing...
From the perspective of services to the population, with vast social implications, in which the security, confidentiality, and access to personal data represents a critical region, the medical services and information systems that are on the base of the strategic management in health care systems, are a theme of maximum interest and rather less approached. In particular, the prospect of at-home health...
Rising technologies as wireless technologies, Sensing technologies and Communication technologies transformed the Internet into an integrated network of things termed as Internet-of-Things (IoT). IoT is a network of things connected over by Internet, all the pros and cons of internet are also inherited to IoT applications. Hence, security and privacy of user data is a serious issue in IoT. In this...
An insider contributes maximum to the leakage ofsensitive information knowingly or unknowingly in an enterprise. Therefore, the need for persistent protection of such informationis critical. At the same time, enterprise friendly features forrights and ownership management are of great importance to adigital rights management (DRM) system considering thedynamism of enterprise workforce in a large enterprise...
In this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recommendations for system security and usability to go...
Encryption of sensitive data is commonly used to preserve confidentiality and integrity. The problem with encrypting data is we have to decrypt it for applying operations on files such as altering a word document or querying a statistical database containing financial data. Decrypting the data will leave it vulnerable. If we want to perform conditional based search queries in an encrypted data entire...
Cloud computing is a model that offers on-demand computational resources to clients as services. In this concept, users are charged based on a pay-per-use business model. Therefore, it dramatically reduces operating costs associated with the maintenance of the local data center. Recently, database is provided as a service to fulfill clients' demand. Following this, companies can rely on a remote database...
Due to the continuous growth of technology, we can easily transfer data from one place to another. At the same time the data is more likely to be hacked by the attacker. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. Data is the most valuable thing today from an individual to an organization because...
Information Mining has wide applications in various sector, like bank sector, medical field and various research centers. Cloud computing has most used in now a days. Request is one of the usually used assignments as a piece of data mining applications. Security is the main part of the cloud computing and it has difficult to handle. Two fields now a day has most useful. As far back as decade, because...
Cryptography plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can only be decrypted by party those possess the associated key. Keys play the most important role in ensuring security of those algorithms. A two keys based method which uses AES as core algorithm is proposed here. This improved...
In cloud computing the security features still remains a big problem during its deployment. The security threats are under research proposing several techniques for overcoming the threats. Focusing on security issues the cloud computing gives rise to several independent features which paves way for security observations, techniques and frameworks. The paper summarizes the security benefits in deploying...
Wireless security data is one of the challenges in wireless network. Because of the less and weak authentication and frequently changes, strong security mechanism are difficult to implement in such network. This paper presents a novel architecture for Image based authentication for wireless channel which is noise resilient and tampers proof. The server database stores set of images and a symmetric...
This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is proposed to be used where in the user, after inserting...
The increasing use of networked sensor systems and networked databases has led to an increased interest in incorporating encryption directly into sensor algorithms and database analytics. Matlab is the dominant tool for rapid prototyping of sensor algorithms and has extensive database analytics capabilities. The advent of high level and high performance Galois Field mathematical environments allows...
Cloud computing is a collection of computing resources provided with the help of internet. Cloud has various benefits such as broad area network access; cost reduction, ease of use, time saving, on-demand delivery of its services and all device support which has internet connection. However, data migration within clouds is a challenging task. This paper proposes a migration approach that provides...
Database maintenance has become an important issue in today's world. Addition or alteration of any field to an existing database schema cost high to a corporation. Whenever new data types are introduced or existing types are modified in a conventional relational database system, the physical design of the database must be changed accordingly. For this reason, it is desirable that a database should...
Privacy-preserving comparisons over encrypted database is a hot topic in the current academic research. Recently, Furukawa [7] introduced a new primitive called request-based comparable encryption (comparable encryption for short) to achieve this target. Howver, one disadvantage of comparable encryption is that huge of the token and cipher text are required in the scheme and thus the computation and...
The major benefit in cloud computing is low maintenance, which benefits both the provider and the requester. The service is made available to the requestor either by a single owner or a multiowner group. In single owner group, the process of maintenance, monitoring, availability is done by a single person known as group manager. The manager is over headed with the security work, maintenance etc. Now...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.