The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
Recently, the implementation of IoT technology development has been growing rapidly. One of IoT applications is smart home system. In this system, in-home hardwares are connected to the internet. Thus, residents can access them using any internet-connected devices, such as mobile phones. Since the main concern of the IoT system is communication, the design of an efficient and secure communication...
Recently, as the advances of ICT, many people use a cloud service. Furthermore, searchable encryption schemes begin to be used in the cloud from the security perspective. However, most of these have the risk of frequency analysis. We propose a new method that keep a search keyword secret against frequency analysis by using false positive which is one of the features of Bloom filter. This method makes...
In the era of big data processing, it is desirable to manage large volumes of data with high scalability, confidentiality protection, and flexible types of search queries. In this paper, we propose a design to store encrypted data on a cluster of distributed servers while supporting secure and authorized Boolean queries. In particular, the data owner encrypts the database with encrypted searchable...
Nowadays cloud services have become a cost-effective platform for sharing data and performing large scale computations. As outsourcing data to a third party involves security and privacy concerns, data should be sent to the cloud in encrypted form. To handle access control on encrypted cloud data, Ciphertext-Policy Attribute-based Encryption (CP-ABE) has become very popular. In this scheme data can...
We consider the problem of a client efficiently, privately and securely delegating the computation of multiple group exponentiations to a computationally more powerful server (e.g. a cloud server). We provide the first practical and provable solutions to this batch delegation problem for groups commonly used in cryptography, based on discrete logarithm and RSA hardness assumptions. Previous results...
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent...
In the recent years, we have observed the development of several connected and mobile devices intended for daily use. This development has come with many risks that might not be perceived by the users. These threats are compromising when an unauthorized entity has access to private big data generated through the user objects in the Internet of Things. In the literature, many solutions have been proposed...
As the use of IoT devices is explosively increasing in everyday life, OCF has tried to make a specification to give interoperability between IoT devices. In this paper, we propose a new packet format and a new GATT service definition to support CoAP messages over BLE transmission for the OCF specification. Also, OCF resources in the CoAP packets can be exchanged between OCF devices via BLE-GATT protocol...
Attribute-based encryption schemes provide read access to data based on users' attributes. In these schemes, user privacy is compromised as the access policies are visible. This privacy issue has been addressed in literature by enabling the data owner to obfuscate the policy in a setting where a single authority generates decryption keys. However, a single authority can figure out the hidden access...
These days each data moves toward becoming hard-ware and put away as Databases, which thusly may encase most levered private, monetary, and administration truths. As the information have important resources for the clients, it additionally most extreme foreseen to the mean adversaries and in this way, to secure in inconsistency of every single potential adversary activities is basic. These days the...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
The article is devoted to the search for ways to protect the data privacy for Internet of things. Different technologies and algorithms of privacy protection are considered, their computing and energy intensity is investigated. Prototyping is performed on the FPGA of the Internet of things. Searching for ways to minimize energy consumption and computing costs of the Internet of things with algorithms...
HTTPS has become a vital component of the WWW ecosystem. However, today's application-layer middleboxes in the cloud are largely “blind” to HTTPS traffic. We propose a novel system infrastructural solution, called CloudEye, that allows middleboxes to selectively manipulate HTTPS traffic. A key design philosophy of CloudEye is to hide all the complexity from client and server applications (thus being...
Nowadays the easiest way to connect with people is chatting by using Mobile Chatting Applications which offers us a lot of helpful facilities. Though different Chat Applications offers different security to users but leads to increase in vulnerabilities & risks of attack on data. Not only for business conversations also for normal conversations our data must be secured because, someone's data...
We often send our confidential information such as passport, credit card, social security numbers over email without concern about the security of email services. Existing network security mechanisms provide adequate security from external malicious adversaries and eavesdroppers, but they don't guarantee that the email service providers (ESPs) wouldn't or can't access our email data themselves, which...
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth. We introduce a new client-side deduplication protocol, called DICE (Dual Integrity Convergent...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
Consumer data, such as documents and photos, are increasingly being stored in the cloud. To ensure confidentiality, the data is encrypted before being outsourced. However, this makes it difficult to search the encrypted data directly. Recent approaches to enable searching of this encrypted data have relied on trapdoors, locally stored indexes, and homomorphic encryption. However, data communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.