The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a company grows, its infrastructure naturally must grow to support it. The resulting mountains of infrastructure metadata contain valuable information on the health and wellbeing of a company's systems. For example, an abnormally low disk write rate to a file server may indicate that a regularly scheduled task has failed to start. The hypothesis of this case study is that such metadata streams...
Privacy and confidentiality in communication with a public entity, especially when this communication is about issues related to security (i.e. reporting criminal activity is paramount. The guarantees that the reporting system can provide to end users directly contribute to the overall success of the system while of utmost importance, that can greatly influence whether the system is used or not is...
Cloud Computing is one of the rapidly growing fields in today's scenario. It can be defined as virtual pooled servers that provide application, infrastructure, and platform based application and other facilities. The major aim of this computing technology is that the clients uses only what they need and pay according to their usage. But a large amount of data, of individuals and organizations are...
The integration of cloud computing and Internet of Things (loT) is quickly becoming the key enabler for the digital transformation of the healthcare industry by offering comprehensive improvements in patient engagements, productivity and risk mitigation. This paradigm shift, while bringing numerous benefits and new opportunities to healthcare organizations, has raised a lot of security and privacy...
The keys generated by (symmetric or asymmetric) have been still compromised by attackers. Cryptography algorithms need extra efforts to enhance the security of keys that are transferring between parities. Also, using cryptography algorithms increase time consumption and overhead cost through communication. Encryption is very important issue for protecting information from stealing. Unfortunately encryption...
In this paper, we investigate the problem of integrity auditing for cloud deduplication storage. Specifically, in addition to the outsourced data confidentiality, we also aim to ensure the integrity of the deduplicated cloud storage. With the existing works based on Provable Data Possession (PDP)/Proof of Retrievability (PoR), we are either required to rely on a fully trusted proxy server or inevitably...
Matrix inverse computation is one of the most fundamental mathematical problems in large-scale data analytics and computing. It is often too expensive to be solved in resource-constrained devices such as sensors. Outsourcing the computation task to a cloud server or a fog server is a potential approach as the server is able to perform large-scale scientific computations on behalf of resource-constrained...
Internet of things is promising to change the world to a better one with its tremendous applications in our daily lives where all physical objects will be connected to each other including humans. One major category of Internet of Things applications falls in the health industry, where sensors collect and register critical measurements such as updates about pressure and glucose. Encryption is a crucial...
Decentralized multi-authority attribute-based encryption (ABE) has been adopted to protect outsourced data. However, there are some security issues. Firstly, the user's attributes information is leaked to the authorities and secondly, the access structure being sent along with ciphertext violates its privacy. To address these issues, an efficient decentralized attribute-based encryption scheme with...
Ransomware is a malware that stealthily gets installed in your device and holds your files or operating system functions for ransom. It restricts you from using your PC or mobile device, by encrypting your files. Paying ransom (through Bitcoins) however, does not guarantee that you'll get your files back. Prevention is still way better than allowing yourself to be infected and then trying to find...
With the pervasiveness of mobile devices and the development of biometric technology, biometric identification, which can achieve individual authentication relies on personal biological or behavioral characteristics, has attracted widely considerable interest. However, privacy issues of biometric data bring out increasing concerns due to the highly sensitivity of biometric data. Aiming at this challenge,...
End-to-end encryption seemingly signifies the death of caching, because current methods ensure that no two sessions are alike. In this paper, we show that servers can reuse encrypted content between sessions, thereby rejuvenating caching. The main idea of our technique is to allow interim nodes to cache content based on pseudo-identifiers instead of real file identities. This enables caching of reusable...
The public key encryption scheme with conjunctive keyword search (PECKS) is one of the most important techniques used for sensitive users' data outsourced to the third party, especially the cloud storage. However, most existing PECKS schemes need to construct a secure channel, which is usually costly. To solve this problem, some scholars have proposed several secure channel-free PECKS schemes, however,...
In this paper we present and describe all theexperiments and results that are done on "Ambiguous Multi-Symmetric Cryptography" (AMSC). We compare AMSC tosymmetric and asymmetric conventional algorithms includingAES and RSA. We explain AMSC core methods in detailsalong with the experimental setup and execution. Furthermore, we design and implement a real time application as a proofof concept...
Several vulnerabilities were detected in the open SSL connection versions 1.0.1 and 1.0.1f. Usually, in the previous versions of SSL/TLS, once an SSL connection is established between a client and a server, the connection will stay until the client or server is idle for a certain amount of time, after which the connection will be dropped. The idea of keeping the session connected was proposed in 2012...
An enciphered method to sufficiently increase the security and privacy of data transmission applied in radio frequency identification system (RFID) was proposed. In this provided approach, a structure utilized suitably in electronic product code (EPC) compliant class-1 generation-2 system was studied to enable resistance to intruder aggression and attack by means of creating two-stage codes and virtual...
Thanks to their high availability, scalability, and usability, cloud databases have become one of the dominant cloud services. However, since cloud users do not physically possess their data, data integrity may be at risk. In this paper, we present a novel protocol that utilizes crowdsourcing paradigm to provide practical data integrity assurance in key-value cloud databases. The main advantage of...
Short Message Service (SMS) is one of the most popular services in the Global System for Mobile (GSM) and many challenges for security arise from the development of message transmission among the broadband network. Recently, an interesting technique called signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented, with better...
Virtual Private Networks (VPN) are an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are set up in hardware appliances,...
Authentication and encryption within an embedded system environment using cameras, sensors, thermostats, autonomous vehicles, medical implants, RFID, etc. is becoming increasing important with ubiquitious wireless connectivity. Hardware-based authentication and encryption offer several advantages in these types of resource-constrained applications, including smaller footprints and lower energy consumption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.