773 Hits in 3.7 sec

Hindering data theft with encrypted data trees

Jorge Blasco, Juan E. Tapiador, Pedro Peris-Lopez, Guillermo Suarez-Tangil
2015 Journal of Systems and Software  
Data theft is a major threat for modern organizations with potentially large economic consequences.  ...  In this work, we propose a scheme that hinders unauthorized data extraction by modifying the basic file system primitives used to access files.  ...  A Data Chaining Tree DCT = {O 1 , . . . , O n } for M i is a regular tree where each node O j represents the encrypted version of a data element M j (along with its corresponding nonce N j ) and directed  ... 
doi:10.1016/j.jss.2014.11.050 fatcat:c4gl3vuxlzhytmkzvkhiy4nfma

Key Aggregation Cryptosystem and Double Encryption Method for Cloud-Based Intelligent Machine Learning Techniques-Based Health Monitoring Systems

Khalid K. Almuzaini, Amit Kumar Sinhal, Raju Ranjan, Vikas Goel, Rajeev Shrivastava, Awal Halifa, Arpit Bhardwaj
2022 Computational Intelligence and Neuroscience  
The industries outsource their data to cloud storage space to relieve themselves of the load of dealing with redundant data contents.  ...  This must be protected to prevent the theft of personal belongings, and privacy must be improved as well.  ...  Message M with the access tree T ′ can encrypt. On demand, normal forms get encrypted. A map between the nodes in T ′ and the universal access tree T are defined by ε.  ... 
doi:10.1155/2022/3767912 pmid:35498196 pmcid:PMC9050288 fatcat:4r2h5t2zl5hghppf3qu6xvvpty

eHealth Cloud Security Challenges: A Survey

Yazan Al-Issa, Mohammad Ashraf Ottom, Ahmed Tamrawi
2019 Journal of Healthcare Engineering  
This centralization of data (1) provides attackers with one-stop honey-pot to steal data and intercept data in-motion and (2) moves data ownership to the cloud service providers; therefore, the individuals  ...  As a result, security, privacy, efficiency, and scalability concerns are hindering the wide adoption of the cloud technology.  ...  In general, there are many security risks associated with the use of the cloud like failure to separate virtual users, identity theft, privilege abuse, and poor encryption are among the security concerns  ... 
doi:10.1155/2019/7516035 pmid:31565209 pmcid:PMC6745146 fatcat:gji22lxwfnfz3juhof57ttu34q

Access Control Enforcement on Query-Aware Encrypted Cloud Databases

Luca Ferretti, Michele Colajanni, Mirco Marchetti
2013 2013 IEEE 5th International Conference on Cloud Computing Technology and Science  
We propose a novel scheme that integrates data encryption with users access control mechanisms.  ...  It can be used to guarantee confidentiality of data with respect to a public cloud infrastructure, and to minimize the risks of internal data leakage even in the worst case of a legitimate user colluding  ...  Tenant data are encrypted through different encryption keys, and each user is provided with unique credentials that allows him to obtain all and only the encryption keys associated with his authorized  ... 
doi:10.1109/cloudcom.2013.172 dblp:conf/cloudcom/FerrettiCM13 fatcat:qupxypbvxzgwxos2xqlxcnsvfi

Engineering a Scalable and Bandwidth Elastic Next Generation PON

Stamatios V. Kartalopoulos, Andres Sierra
2007 OFC/NFOEC 2007 - 2007 Conference on Optical Fiber Communication and the National Fiber Optic Engineers Conference  
The next generation WDM/TDM-PON is scalable and delivers elastically ultra-high data rates to thousands of end-users, and therefore network security becomes particularly important.  ...  up to 16,000 end-users (at 2.5 Mbps per user) with protocol transparency meeting true triple play services.  ...  The hCT-PON has a hierarchical tolerant topology; a WDM point-to-point between OLT and ONU, a tree topology within the ONU, and a TDM point-tomultipoint or open ring topology between ONU and NTs.  ... 
doi:10.1109/ofc.2007.4348499 fatcat:i5k6altbyfchvahwyc2j3bcegy

Notarized federated ID management and authentication*

Michael T. Goodrich, Roberto Tamassia, Danfeng (Daphne) Yao
2008 Journal of Computer Security  
The authenticated dictionary data structure can be implemented using Merkle hash tree [20] .  ...  The data structure [14] used in STMS system is based on skip list, which is more efficient than a Merkle hash tree.  ... 
doi:10.3233/jcs-2008-0324 fatcat:naztm3abcfgzpnfqelpjpowwaa

Secure Cloud File Distribution System for Untrusted Network Environment

William Asiedu, University of Education, Winneba. College of Technology Education - Kumasi
2018 International Journal of Engineering Research and  
Our proposed scheme allows users anonymously share their files among members by using group signature and broadcast encryption techniques.  ...  Cloud computing provides reliable and efficient services for sharing data among cloud users at low maintenance cost.  ...  Although efficiently computable, the wide-spread adoption of BBS re-encryption has been hindered by considerable security risks.  ... 
doi:10.17577/ijertv7is070099 fatcat:gqbxdwcg45d3ho67ss65pua6pm

Privacy Detection and Protection for Intelligent Transportation Shared Travel Service

Hui Ma, Yong Zhang
2021 Converter  
This paper uses K anonymous protection technology, data encryption technology to achieve the protection of privacy data.  ...  In this paper, through the use of Hadoop project HBase tools, complete the data cleaning of privacy data, data desensitization operation.  ...  Generally, the structure of network security data is tree.  ... 
doi:10.17762/converter.14 fatcat:3ehjxnm74rb27jfjlbeiytbsvy

Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions

Sidra Aslam, Aleksandar Tošić, Michael Mrissa
2021 Journal of Cybersecurity and Privacy  
In some cases, addressing these issues requires blockchain data to be secured with mechanisms that allow on-demand (as opposed to full) disclosure.  ...  We provide a taxonomy of current attacks together with related countermeasures.  ...  -Countermeasures: To deal with wallet theft attack Weiqi et al.  ... 
doi:10.3390/jcp1010009 fatcat:narc2lqitbb75py56gg7equ36e

Fighting cybercrime: a review and the Taiwan experience

Wingyan Chung, Hsinchun Chen, Weiping Chang, Shihchieh Chou
2006 Decision Support Systems  
Table 4 indicates that countries have applied such technologies as intrusion detection, filtering, rating, data encryption and data decryption to cybercrime inves- Fighting cybercrime in Taiwan: a  ...  The lack of formal channels for Taiwan cybercrime investigators to communicate with other countries' law enforcement agencies hinders effective investigation.  ...  He received his PhD from Texas A&M University in 1984 with a major in computer and adult education. His research focuses on knowledge management, software engineering and distance learning.  ... 
doi:10.1016/j.dss.2004.06.006 fatcat:vkq4niiikzh3lf2pnh22vdrmkm

Research on Privacy Data Protection Based on Trusted Computing and Blockchain

Linkai Zhu, Sheng Peng, Zhiming Cai, Wenjian Liu, Chunjiang He, Weikang Tang, Jian Su
2021 Security and Communication Networks  
the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the  ...  Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with  ...  With the popularization of computers and networks, information security issues have become more prominent. e top 3 security threats are malicious code attacks, illegal information theft, and illegal data  ... 
doi:10.1155/2021/6274860 fatcat:t6uxfsmedveqpi2acicaee26la

Traceable Method for Personal Information Registration Based on Blockchain

Nan Jiang, Weiqi Wang, Jinchao Wu, Jian Wang
2020 IEEE Access  
In different scenarios, the user will send the encrypted personal information data or authorization file to the service provider.  ...  With this method, users can clearly understand which personal information has been delivered to which service providers.  ...  SP submits the transaction record encrypted with the record key to B, then sends the encrypted record key to T .  ... 
doi:10.1109/access.2020.2981175 fatcat:y6f43scjdvhqtmjp3hu4d6cdd4

Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA

Iuon-Chang Lin, Chin-Chen Chang, Yu-Sung Chang
2022 Symmetry  
In the industrial control field, many IoT devices upload data to the cloud for storage, but the upload process is easily tampered with, and centralized cloud services also have security concerns.  ...  security and data preservation.  ...  sibling Merkle tree subtree encSig Encrypted signature S(•) Sponge function payload MAM Trytes data start Merkle tree start index count Merkle tree count index Absorb(•) Sponge absorb function Table  ... 
doi:10.3390/sym14020237 fatcat:cgrwfsroqnednas3lviwrz52gi

Machine Learning Techniques for Securing IoT Environment

Lightweight encryption is emerging trend nowadays in which data is encrypted before send in the network.  ...  Poorly designed devices which can expose user data to theft by leaving data stream inadequate protected and in some cases people's health and safety can be put at risk. Fig. 2.  ... 
doi:10.35940/ijitee.d1209.029420 fatcat:gdovnd52czd3jpkmxgiwepnvbq

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
2019 IEEE Access  
with privacy regulations (e.g.  ...  To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of  ...  The user encrypts the data with the public NTRU key of the Tangle mixer service, and the service generates an encrypted response with the public NTRU key of the user containing the address to make the  ... 
doi:10.1109/access.2019.2950872 fatcat:kf2rl7onmrbvnozjudspxrcatu
« Previous Showing results 1 — 15 out of 773 results