The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As Big Data cloud storage servers are becoming popular the shortage of disk space in the cloud becomes a problem. Data deduplication is a method to control the explosion growth of data on the cloud and most of the storage providers are finding more secure and efficient methods for their sensitive data. Recently, an interesting technique called signcryption has been proposed, in which both the properties...
Programmable Logic Controllers (PLCs) are the key components of SCADA systems, controlling different industrial processes, while handling the communication with other systems via different communication protocols, which are subject to security attacks. The introduction of cryptography at the PLC's application level could represent a first step in providing the needed security for such systems. However,...
Data stores are typically accessed using a clientserver paradigm wherein the client runs as part of an application process which is trying to access the data store. This paper presents the design and implementation of enhanced data store clients having the capability of caching data for reducing the latency for data accesses, encryption for providing confidentiality before sending data to the server,...
The identity authentication system is based on multi-attribute and identity in broadcasting monitoring system. The scheme mainly uses the multi-attribute encryption Attribute-Based Encryption (ABE) as the core, draws Identity-Based Encryption (IBE) to generate the global unified Global Identifier (GID), and proposes the GID-Attribute-Based Encryption (GABE) encoded technology. The method is mainly...
Reversible data hiding in encrypted images (RDH-EI) is a new topic drawing more and more attention because of the privacy-preserving requirements from cloud data management. In this paper, a novel reversible data hiding scheme for encrypted image with large embedding capacity is proposed. And it is a client-free RDH-EI scheme in which the RDH algorithm used by the cloud is irrelevant with both the...
This paper presents a strategy for enabling speech recognition to be performed in the cloud whilst preserving the privacy of users. The approach advocates a demarcation of responsibilities between the client and server-side components for performing the speech recognition task. On the client-side resides the acoustic model, which symbolically encodes the audio and encrypts the data before uploading...
An insider contributes maximum to the leakage ofsensitive information knowingly or unknowingly in an enterprise. Therefore, the need for persistent protection of such informationis critical. At the same time, enterprise friendly features forrights and ownership management are of great importance to adigital rights management (DRM) system considering thedynamism of enterprise workforce in a large enterprise...
We propose an implementation of a secured content addressable memory (SCAM) based on homomorphic encryption (HE), where HE is used to compute the word matching function without the processor knowing what is being searched and the result of matching. By exploiting the shallow logic structure (XNOR followed by AND) of content addressable memory (CAM), we show that SCAM can be implemented with only additive...
Opportunistic Network (OppNet) is an emerging communication paradigm, by which nodes inside forward messages through personal contact opportunities. Recently, numerous studies have focused on predicting nodes meeting to promote routing efficiency and reduce transmission delay. However, individual privacy would likely be revealed to strangers or attackers during the execution of prediction. In this...
Multiple group setting schemes have recently become important for enabling deduplication for cloud servers. We consider a new primitive, cross-group deduplication, allowing the multiple groups by the group signature features. We propose a new framework DDUP-MUG (deduplication for the multiplegroup signature scheme) that allows one or more groups to accessa file such that the cloud storage server can...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Searchable symmetric encryption (SSE) enables us to search encrypted data with an arbitrarily chosen keyword without leaking information on the data and keyword. SSE is expected to be used in, for example, cloud computing and genome analyses. In particular, privacy of genome data must be guaranteed for long periods, and therefore unconditionally secure cryptographic protocols, rather than computationally...
Vehicular Ad-hoc Networks (VANETs) are formed by a huge number of vehicles which act as the network nodes and communicate with one another. This emerging paradigm has opened up new business opportunities and enables numerous applications ranging from road safety enhancement to mobile entertainment. A fundamental issue that impacts the successful deployment of VANET applications is the security and...
Cloud service enables users not only to save their data to an external server but also to process the data at the server. However, the data stored at could server may be stolen and tampered with by malicious party or administrator of the server. If user encrypts data before storing his data to the server to solve this problem, the data won't be leaked to the others. However, no operation can be performed...
Anonymous password-based authentication protocols are designed to provide not only password-based authentication but also client anonymity. In [10], Qian et al., proposed a simple anonymous password-based authentication (SAPAKE) protocol. In this paper, we revisit the SAPAKE protocol [10] by first showing that an outside attacker can specify which client has actually communicated with the server in...
In this paper, we present a framework for secure multiparty computation on smartphones. Our framework provides protocols, which are constructed by additively homo-morphic encryption, to guarantee security against semi-honest adversaries without collusion. The protocols made using our framework follow a client-server model, thus users of our framework can easily and jointly execute these protocols...
Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there...
Nowadays, access control and data security are two most critical problems with cloud computing. Access control can be defined as a procedure by which users can access data from the cloud server. At the time of accessing data, there are many problems, such as data security, high data accessing time, data lost, overhead, data redundancy, etc. In the first part of this paper, a brief discussion of fundamentals...
Distributed computing has turned into a reality which is capable of empowering overall population and associations to make utilization of colossal computational assets without capital interest in pay per utilize form. This new worldview permits clients who have so much computational assets to outsource their costly workloads related to computation which is in return connected to cloud as well as obtain...
Cloud computing has developed to be the most promising business model in recent times owing to access business applications or infrastructure resources at a negligible cost but the issue of security still lies as a question to be answered since storing and processing of data are done by a third-party data centers. Reversible data hiding in images guaranties security to data accumulated at a third-party...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.