38 Hits in 3.2 sec

Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data [article]

Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra
2018 arXiv   pre-print
of non-sensitive data (in clear-text) and sensitive data (in encrypted form).  ...  QB maps a query to a set of queries over the sensitive and non-sensitive data in a way that no leakage will occur due to the joint processing over sensitive and non-sensitive data.  ...  The query processing using Arx as efficient as cleartext version due to using an index, e.g., β values for Arx are 1.4 on system A and 2.5 on system B.  ... 
arXiv:1812.09233v1 fatcat:epxyephd75f5pc7x5se7vnt3iu

Mersenne twister-based RFID authentication protocol

Mehmet Hilal ÖZCANHAN, Gökhan DALKILIÇ
2015 Turkish Journal of Electrical Engineering and Computer Sciences  
Next, we present a proposal that resists all of the known passive attacks. The proposal obeys the properties and rules of addition-rotation-XOR with constants systems.  ...  The proposed scheme inserts parts of advanced encryption standard S-boxes into the temperings of the Mersenne twister, which is used as a deterministic random number generator.  ...  This is because ARX systems can be considered as the building blocks of contemporary encryption algorithms, which use repeated combinations of shifting, substitution, and XOR operations.  ... 
doi:10.3906/elk-1212-95 fatcat:dsioh6hpuzcs5g3lx6rnga4dy4

Implementation of a bio-inspired two-mode structural health monitoring system

Tzu-Kang Lin, Li-Chen Yu, Chang-Hung Ku, Kuo-Chun Chang, Anne Kiremidjian
2011 Smart Structures and Systems  
For the micro-vibration mode, a two-tier auto-regression with exogenous (AR-ARX) process is used to extract the expression array from the recorded structural time history while an ARX process is applied  ...  A bio-inspired two-mode structural health monitoring (SHM) system based on the Naïve Bayes (NB) classification method is discussed in this paper.  ...  The optimal ARX configuration for earthquake excitation conditions was determined using the collected database.  ... 
doi:10.12989/sss.2011.8.1.119 fatcat:63oqv5lt2jchfkakhcy5wkalca

SoK: Cryptographically Protected Database Search

Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham
2017 2017 IEEE Symposium on Security and Privacy (SP)  
Index Terms-searchable symmetric encryption, property preserving encryption, database search, oblivious random access memory, private information retrieval • A provider, who provides and modifies the data  ...  and tools for transforming a protected search system into a protected database, including an open-source performance evaluation platform and initial user opinions of protected search.  ...  Arx is built on a NoSQL keyvalue store called mongoDB [63]. Arx reports a performance overhead of approximately 10% when used to replace the database of a web application (ShareLatex).  ... 
doi:10.1109/sp.2017.10 dblp:conf/sp/FullerVYSHGSMC17 fatcat:mnig3cecgjg5jiwpdwmx736uye

SoK: Cryptographically Protected Database Search [article]

Benjamin Fuller, and Mayank Varia, and Arkady Yerukhimovich, and Emily Shen, and Ariel Hamlin, and Vijay Gadepally, and Richard Shay, and John Darby Mitchell, Robert K. Cunningham
2017 arXiv   pre-print
and tools for transforming a protected search system into a protected database, including an open-source performance evaluation platform and initial user opinions of protected search.  ...  We find there are a small number of base operations that can be used and combined to support a large number of database paradigms. 2) An evaluation of the current state of protected search systems in implementing  ...  Arx is built on a NoSQL keyvalue store called mongoDB [63]. Arx reports a performance overhead of approximately 10% when used to replace the database of a web application (ShareLatex).  ... 
arXiv:1703.02014v2 fatcat:hev7mo27lnfspggsc4jtq4zrmy

The tao of inference in privacy-protected databases

Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov
2018 Proceedings of the VLDB Endowment  
We design, implement, and evaluate a new methodology for inferring data stored in such encrypted databases.  ...  To protect database confidentiality even in the face of full compromise while supporting standard functionality, recent academic proposals and commercial products rely on a mix of encryption schemes.  ...  Consider a database in which some columns have been encrypted using PRE, while the "sensitive" columns have been strongly encrypted or redacted.  ... 
doi:10.14778/3236187.3236217 fatcat:ejulkfgpwjdhxc3ckxua3vlkrq


Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
To mitigate recent inference attacks on encrypted database systems, EncKV protects the order information during range queries, and presents an interactive batch query mechanism to further hide the associations  ...  However, these systems do not guarantee to provide strong protection of data confidentiality, and as a result fall short of addressing serious privacy concerns raised from massive data breaches.  ...  RELATED WORK Encrypted database systems: To enable rich queries over encrypted data records, a line of encrypted database systems are implemented [24, 25, 27] (just to list a few).  ... 
doi:10.1145/3052973.3052977 dblp:conf/ccs/YuanGWWLJ17 fatcat:fwxip6qhfjfvxmud5eaimjh6q4

Black Box Attack of Simulation Secret Key using Neural-Identifier: هجوم الصندوق الأسود لمحاكاة أنظمة التشفير الانسيابي باستخدام المعرف العصبي

Khaled M. Alalayah - Khadija M. H. Alaidarous - Ibrahim M. G
2019 Mağallaẗ al-ʿulūm al-handasiyyaẗ wa-al-tiknūlūğiyā al-maʿlūmāt  
out the key from the provided plaintext-cipher to pair, while the second objective is to emulator construction a neuro-model for the target cipher system.  ...  These systems for cryptanalysis are changing radically to decrease cryptographic multifaceted nature. In this paper a point by point study has been directed.  ...  4-How system will be considered to work strongly on organizing intellect at the network edge?  ... 
doi:10.26389/ajsrp.u310119 fatcat:syt5mg3rdzgjjowxvvumjc2eu4

Encrypt-to-self: Securely Outsourcing Storage

J. Pijnenburg, B. Poettering
2020 Zenodo  
In the course of this paper we develop a formal model for encrypt-to-self systems, show that it solves the outsourced storage problem, propose surprisingly efficient provably secure constructions, and  ...  We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage.  ...  Implementation of Encrypt-to-Self We implemented three versions of the ETS primitive.  ... 
doi:10.5281/zenodo.4146853 fatcat:j6i3yb76lnenxdqcmckbdxs6ky

A flexible approach to distributed data anonymization

Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Klaus A. Kuhn
2014 Journal of Biomedical Informatics  
Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol.  ...  Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units.  ...  Here, execution times are much more strongly influenced by the total number of distinct data values per dataset.  ... 
doi:10.1016/j.jbi.2013.12.002 pmid:24333850 fatcat:cnyo2hoa3vd63omrbf7xbhfn3m

A Survey on Blockchain-based IoMT Systems: Towards Scalability

Amirhossein Adavoudi Jolfaei, Seyed Farhad Aghili, Dave Singelee
2021 IEEE Access  
To this end, they benefited from different cryptographic techniques, including ARX encryption scheme [127] , ring signatures [128] , and Diffie-Hellman key exchange [129] .  ...  Thus, in the cloud-based system, centralized data authorities must guarantee a reliable database in an untrusted network [26] . • Data manipulation: Patients' sensitive data might be manipulated and can  ... 
doi:10.1109/access.2021.3117662 fatcat:oaw35at76vhqhf7co3sf5ijb34

D2.5-Profiling Analytics and Privacy Methodological Foundations, Release II

Suite5, Frankfurt University, UBITECH, NTUA
2020 Zenodo  
COMPACT started as a database for past cases of missing persons that was turned into a case management system that is used in 21 districts.  ...  platform. • Framework database: A database which contains the PIIs of all the data subjects whose data disclosure is covered by the Regulatory Framework of Task 1.2. • Re-identification database: A database  ...  So, in case there is a legal police request, ChildRescue is able to provide the identity of the registered user.  ... 
doi:10.5281/zenodo.3709433 fatcat:urciji7wffhnrgjmlk3aph25nu

D2.4 Profiling Analytics and Privacy Methodological Foundations Release I

Suite5, Frankfurt University, UBITECH, NTUA
2018 Zenodo  
COMPACT started as a database for past cases of missing persons that was turned into a case management system that is used in 21 districts.  ...  The ARX Anonymisation Framework addresses the aforementioned requirements, while Public Key Infrastructure covers the needs for encryption of the data.  ... 
doi:10.5281/zenodo.2542731 fatcat:ecplhyb5hrapffb4amahnfr6ry

Adaptive and Flexible Smartphone Power Modeling

A. A. Nacci, F. Trovò, F. Maggi, M. Ferroni, A. Cazzola, D. Sciuto, M. D. Santambrogio
2013 Journal on spesial topics in mobile networks and applications  
We propose MPower, a power-sensing platform and adaptive power modeling platform for Android mobile devices.  ...  Protection tools, unfortunately, add an additional burden for the smartphone's battery power, which is a precious resource.  ...  To guarantee privacy, each file is encrypted with AES, zipped, and sent to the server, which unzip it and store the contained records into a database for subsequent asynchronous processing.  ... 
doi:10.1007/s11036-013-0470-y fatcat:vipuoqxngzhwlcpx4d5imgu6wq

D3.3 – Annual Report from TheFSM Software Components Integration and Testing

Danai Vergeti, Dimitris Ntalaperas, Iosif Angelidis
2021 Zenodo  
The current document provides a) the approach we follow in development regarding both the overall project and within component level, b) the technical verification of our pipeline.  ...  Relation to other deliverables The current document is strongly related to D3.1 where the functionalities and the components of the FSM platform are described at a conceptual level.  ...  YES Interoperability A system can exchange information with other systems YES and use the information that has been exchanged.  ... 
doi:10.5281/zenodo.4593679 fatcat:yj4zoyq6iffphmdj76qbjyosiq
« Previous Showing results 1 — 15 out of 38 results