The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problems of privacy protection and the user revokes in social network, a multi-authority attribute-based encryption access control for social network is presented. In the proposed scheme, we utilizes the linear secret sharing scheme and the proxy re-encryption technique to achieve the user rights update and support flexible access control strategy. Multiple authorities jointly...
This paper addresses the users' need to trust the commercial cloud providers and the security issues related to data storage in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format represents a security threat. Thus, in this paper, we propose a method relying on the Identity Based Cryptography (IBE)...
In this paper we introduce Password Authenticated Keyword Search (PAKS), a cryptographic scheme where any user can use a single human-memorizable password to outsource encrypted data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure. PAKS ensures that only the legitimate user who knows the initially registered password can perform...
The ubiquity of the Internet and email, have provided a mostly insecure communication medium for the consumer. During the last few decades, we have seen the development of several ways to secure email messages. However, these solutions are inflexible and difficult to use for encrypting email messages to protect security and privacy while communicating or collaborating via email. Under the current...
One of the major limitations of index based encrypted string search on big dataset is the inherent problem of big index generation, maintenance and update which stops it from being dynamic in a sense that one could not modify data or add or remove keywords. Also for a resource constraint client, to generate an index linear in the size of big dataset is difficult. In this paper, we provide an efficient...
An effective storage and management of file systems is very much essential now a days to avoid the wastage of storage space provided by the cloud providers. Data de-duplication technique has been used widely which allows only to store a single copy of a file and thus avoids duplication of file in the cloud storage servers. It helps to reduce the amount of storage space and save bandwidth of cloud...
This paper proposes a secure retrieval scheme based on homomorphic encryption for the server-side structured database. With the advantage of this scheme, ciphertext in server under unreliable storage circumstance can be efficiently retrieved without exposition of plaintext. Users can also have detailed access to their data. In this paper, a data encryption and decryption algorithm based on homomorphic...
In public key encryption with keyword search (PEKS) framework, see Figure 1(a), the cloud server stores index Iw and verifies the equivalence whether w = w′ or not on receiving a keyword search request through a trapdoor Tw′. Aside from the traditional secrecy concerns over index, a new threat called inner keyword guessing attack which addressed the secrecy of trapdoors against off-line brute force...
While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data...
Internet of Things (IoT) has facilitated integration of wireless communication capabilities into sensing devices. IoT enables monitoring of many electrical, physical and environmental parameters. Electrical power consumption is one of such important parameters to be monitored. In literature, many power monitoring devices have been proposed for this purpose. But they are expensive, complex and lack...
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, an inherent limitation of this approach (assuming low-entropy passwords are used) is that the user's password is exposed if this server is ever compromised. To address this issue, it has been suggested to share a user's password...
In spite of the availability of digital password lockers and advanced door locks, hacking the lock code by an unauthorized person has become a plain-sailing task. Various electronic locks are currently available in the market based on Password, RFID, Biometrics, OTP, Cryptography, Wireless and IoT. Every system has its own advantages and disadvantages where one system overcomes the limitations of...
Cloud services are the most widely used services. From different services of cloud, data storage service is the most popular one. Generally, in traditional way data stored on cloud and user can fetch data from cloud but if data can be stored in encrypted format security of data will get increased. We are using encryption algorithm for this purpose. Our aim is to secure the data as well as we don’t...
Efficient multi-keyword fuzzy search over encrypted data is a desirable technology for data outsourcing in cloud storage. The current solutions can only support part of these goals. In this paper, we propose a novel encrypted data searching scheme that can support multiples keywords fuzzy search with high efficiency. To support fuzzy search, a new keyword-hash mapping function is designed to transform...
In-home IoT devices play a major role in healthcare systems as smart personal assistants. They usually come with a voice-enabled feature to add an extra level of usability and convenience to elderly, disabled people, and patients. In this paper, we propose an efficient and privacy-preserving voice-based search scheme to enhance the efficiency and the privacy of in-home healthcare applications. We...
Cloud storage service has been increasing in popularity as cloud computing plays an important role in the IT domain. Users can be relieved of the burden of storage and computation, by outsourcing the large data files to the cloud servers. However, from the cloud service providers' point of view, it is wise to utilize the data deduplication techniques to reduce the costs of running large storage system...
Security and privacy issues of the Internet of Things (IoT in short, hereafter) attracts the hot topic of researches through these years. As the relationship between user and server become more complicated than before, the existing security solutions might not provide exhaustive securities in IoT environment and novel solutions become new research challenges, e.g., the solutions based on symmetric...
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he...
Smartphones and other mobile platforms provide a low cost and easily accessible method of monitoring patient health, and aid healthcare professionals in early detection of disease. Immediate access to the gathered data is an essential factor in effective patient care. But the current processes used for patients' vital data collection is slow and error prone. This undermines the advantages of remote...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.