5,516 Hits in 3.6 sec

Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems [chapter]

Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari
2012 Lecture Notes in Computer Science  
We improve upon existing solutions by securely preserving real-time collaboration for encrypted documents and facilitating self-containment of the metadata (an overhead of encryption) within the same document  ...  We present a flexible approach for achieving user-controlled privacy and integrity of documents that are collaboratively authored within web-based document-editing applications.  ...  The authors would like to thank the anonymous reviewers of ISC 2012 for many helpful comments and suggestions. The first author's work was partly supported by the Irish Research Council.  ... 
doi:10.1007/978-3-642-33383-5_13 fatcat:onwz773tuvck7pboakwgogteiu

A Flexible Encrypting Approach for Collaborative Document Editing

Xiao Lv, Xu Lu, Liangzhong Cui
2016 DEStech Transactions on Engineering and Technology Research  
This paper proposes a free-locking encrypting approach to preserve the security of collaborative document editing, which supports sufficient responsiveness to the collaborative workers and improves collaborative  ...  Traditional approaches mostly adopt central server for defining and enforcing the access control policies to ensure the security of document editing, which cannot provide harmonious human-computer interactions  ...  Remote operations need to be transformed with executed concurrent operations in the operation history, then executed after their transformations.  ... 
doi:10.12783/dtetr/iect2016/3734 fatcat:4ccownjngbhazafxaqaajmajo4

Cloud Computing Security with Collaborating Encryption

N. D. Jambhekar, Sanjay Misra, C. A. Dhawale
2016 Indian Journal of Science and Technology  
This paper elaborates the working of cloud computing and the collaborating source security system for the Big Data security.  ...  A collaborating encryption technique framework is proposed in this paper to meet the futures' faster encryption requirements.  ...  Security • User/Administrator Authentication: The registered users, guest, administrator authentication requires via preserving the metadata for them.  ... 
doi:10.17485/ijst/2016/v9i21/95293 fatcat:wfkylh575radjamdbbhezbz23a

Preventation of Data Content Leakage with Secured Encryption Algorithm

Mr. Sagar Prasad, Ms. Malti Nagle, Mr. Tarique Zeya Khan
2016 IJARCCE  
The system achieves good detection accuracy in recognizing transformed leaks. It implement a parallelized version of our algorithms in graphics processing unit to achieves high analysis data.  ...  For instance, when personal information undergoes analysis processes that produce new facts about users' shopping patterns, hobbies, or preferences, these facts could be used in recommender systems to  ...  Fig 1 . 1 Secured Data retrieval system  ... 
doi:10.17148/ijarcce.2016.51267 fatcat:gnuhrm7hdfcnlgz42jc7vqfpha

New Directions in RFID Security [chapter]

Erik-Oliver Blass, Refik Molva
2009 IFIP Advances in Information and Communication Technology  
Current research in RFID security focuses on basic authentication protocols between a tag and a reader.  ...  In multi-tag security, multiple tags try to jointly compute an information while using the reader either as the focal point of all communication or as a relay for tag-to-tag communication.  ...  Thus, the design of secure and privacy-preserving authentication and identification protocols for RFID systems has recently been a very attractive field for security research.  ... 
doi:10.1007/978-3-642-05437-2_7 fatcat:2d3grvjwefebvnvdoerywy4eii

Privacy-enhanced architecture for smart metering

Félix Gómez Mármol, Christoph Sorge, Ronald Petrlic, Osman Ugus, Dirk Westhoff, Gregorio Martínez Pérez
2012 International Journal of Information Security  
use asymmetric cryptography for authentication of key exchange, symmetric encryption for confidentiality and message authentication codes for message integrity.  ...  keiko; 23.04.2013 keiko; 23.04.2013 Homomorphic Encryption Scheme (2) • Privacy preserving -k24 k25 Folie 15 k24 An encryption algorithm is malleable if it is possible for an adversary to  ...  with a unique nonce in each period. • Applying arithmetic operations on pseudorandom numbers results in a pseudo-random result.  ... 
doi:10.1007/s10207-012-0181-6 fatcat:bqrq3tin3faulkqrpv22siptii


Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
Many of these tools are based on Operational Transforms (OT), which guarantee that the views of different clients onto a document remain consistent over time.  ...  preserving encryption, and (3.) requires only a modern browser without any extra software installation or browser extension.  ...  NOVEL TREE-BASED ENCRYPTED OPERATIONAL TRANSFORMS In this section, we present our novel approach of combining tree-based operational transforms with structure-preserving encryption.  ... 
doi:10.1145/3052973.3052982 dblp:conf/ccs/FelschMMS17 fatcat:pxyyl6bf3rbjrlcl2fh53f52bq

Collaborative Outsourced Data Mining for Secure Cloud Computing

Yila Huang, Qiwei Lu, Yan Xiong
2014 Journal of Networks  
Though the existing model of cloud computing consists of multiple data owners, there is little consideration for the collaboration between them.  ...  Data mining is becoming an increasingly important technology for the information society.  ...  SIMPLE FRAMEWORK FOR COLLABORATIVE OUTSOURCING MINING We note that the crux of collaborative outsourcing mining is the establishment of the identical encryption transformations among different data owners  ... 
doi:10.4304/jnw.9.10.2655-2664 fatcat:yaf4lzgp3vfqvaucuzva3vgk6i

THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

Cagatay Karabat, Mehmet Sabir Kiraz, Hakan Erdogan, Erkay Savas
2015 EURASIP Journal on Advances in Signal Processing  
We prove security and privacy preservation capability of the proposed system in the simulation-based model with no assumption.  ...  during the authentication stage.  ...  The authors would like to thank the EU for the financial support and the partners within the consortium for a fruitful collaboration.  ... 
doi:10.1186/s13634-015-0255-5 fatcat:eaobpmjsnvck3biufmmw6yfuim

From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing

Zihao Shao, Huiqiang Wang, Yifan Zou, Zihan Gao, Hongwu Lv, Stelvio Cimato
2021 Security and Communication Networks  
For remote regions, based on a more realistic distance calculation mode, we design a Paillier Encryption Data Coding (PDC) privacy-preserving method that realizes the secure computation for users' location  ...  More specifically, for popular regions, based on the edge servers and the k-anonymity algorithm, we propose a Coordinate Transformation and Bit Commitment (CTBC) privacy-preserving method that effectively  ...  Finally, for remote regions, the edge layer collaborates with the sensing platform.  ... 
doi:10.1155/2021/5855745 fatcat:beeydrrqzvd5lgvxr3h6jvxp6e

PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs

Sagar Sharma, Keke Chen
2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)  
This demonstration exhibits a prototype system for privacy-preserving spectral analysis framework for large graphs in public clouds (PrivateGraph) that allows data owners to collect graph data from data  ...  algorithms that work over encrypted data, and the outcome of an important application of spectral analysis -spectral clustering.  ...  Each of the privacy-preserving algorithms of Lanczos and Nyström operates collaboratively between client and cloud.  ... 
doi:10.1109/icdcs.2017.189 dblp:conf/icdcs/SharmaC17 fatcat:nbnmyrpbxnbzbbp6sx2kwbjscq


Nnaemeka Uchenna Ezeonyi, Alumona Theophilus Leonard, Okwara Nobert
2021 Zenodo  
Cloud computing systems provide various internet based data storage and services.  ...  Current Cloud computing systems poses serious limitation in protecting users' data confidentiality.  ...  Therefore, all users are required to perform authentication process and getting authorized by the system, before allowing them to perform any other operations.  ... 
doi:10.5281/zenodo.5674276 fatcat:27ovkwzgtvdhznnf7hvrem4dvi

Part VI: Cyber Physical Systems Preface

Gursel Serpen
2014 Procedia Computer Science  
Five papers in the CPS track address authentication, encryption for data confidentiality and privacy aspect of computing as they also would be applicable for a CPS.  ...  Authors propose an encryption scheme by combining both symmetric and asymmetric cryptographic algorithms which appear to provide strong data confidentiality while preserving secret key encryption functionalities  ... 
doi:10.1016/j.procs.2014.09.089 fatcat:3nly4fygsfdunhppnp3vritssy

[Paper] Security Enhancement of Secure Finger-vein Sensor Based on Compressed Sensing

Hiroyuki Suzuki, Lihao Shu, Takuya Urabe, Takashi Obi, Nagaaki Ohyama
2015 ITE Transactions on Media Technology and Applications  
be transformed into irreversible information by employing encryption or a one-way function 15) .  ...  In our previous work, we proposed a biometric authentication method using a secure imaging system that was based on compressed sensing.  ...  In our previous study, we proposed a CI system for capturing an encrypted finger-vein image and a biometric authentication scheme using this encrypted-measurement data, which represents the series of intensity  ... 
doi:10.3169/mta.3.245 fatcat:vbavxuzrojdnhkpj5tj7ul5ib4

The Challenges of Privacy and Access Control as Key Perspectives for the Future Electric Smart Grid

Anna Triantafyllou, Jose Antonio Perez Jimenez, Alejandro del Real Torres, Thomas Lagkas, Konstantinos Rantos, Panagiotis Sarigiannidis
2020 IEEE Open Journal of the Communications Society  
This study presents a comprehensive overview of the latest privacy-preserving mechanisms and policies in the ESG, while promoting the employment of modern access control techniques towards preventing personal  ...  Efficient categorization is provided regarding the proposed privacy preserving methods and characteristics, while focus is also given on the use of the Blockchain technology and the Multi Authority Access  ...  In parallel, Shi et al. utilized a lightweight symmetric encryption algorithm (SEA) to achieve privacy-preserving for Distributed IoT system.  ... 
doi:10.1109/ojcoms.2020.3037517 fatcat:2qhvityrlrdjvawlkx54wmpkna
« Previous Showing results 1 — 15 out of 5,516 results