3,002 Hits in 7.8 sec

Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges

Goiuri Peralta, Raul G. Cid-Fuentes, Josu Bilbao, Pedro M. Crespo
2019 Electronics  
in the cloud while maintaining data privacy.  ...  The introduction of the Internet of Things (IoT) is creating manifold new services and opportunities.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/electronics8080827 fatcat:qmo5zze6ozdtvfxokf73s3qavi

Peek-a-Boo: I see your smart home activities, even encrypted! [article]

Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac
2018 arXiv   pre-print
We evaluate the efficiency of the attack with real measurements from an extensive set of popular off-the-shelf smart home IoT devices utilizing a set of diverse network protocols like WiFi, ZigBee, and  ...  To protect against this privacy leakage, we also propose a countermeasure based on generating spoofed network traffic to hide the real activities of the devices.  ...  In the next sections, we evaluate the efficiency of our multistage privacy attack on network traffic data collected from 22 different off-the-shelf IoT devices used in smart homes. B.  ... 
arXiv:1808.02741v1 fatcat:dueeacwnozbavdosbv3nhx3j6a

SIT: A Lightweight Encryption Algorithm for Secure Internet of Things

Muhammad Usman, Irfan Ahmed, M. Imran, Shujaat Khan, Usman Ali
2017 International Journal of Advanced Computer Science and Applications  
The increased number of communication is expected to generate mountains of data and the security of data can be a threat.  ...  The Internet of Things (IoT) being a promising technology of the future is expected to connect billions of devices.  ...  To evaluate the performance in the real IoT environment we implemented the algorithm on ATmega 328 based Ardinuo Uni board as well.  ... 
doi:10.14569/ijacsa.2017.080151 fatcat:qjv357gopbfgrf3k3c2zhzedke

Designing for Tussle in (Encrypted) DNS [article]

Austin Hounsel, Paul Schmitt, Kevin Borgolte, Nick Feamster
2021 arXiv   pre-print
, including performance, resilience, and privacy.  ...  While the trend towards encryption is a positive development, the resulting centralization of the DNS has fomented tussles involving ISPs, browser and device vendors, content delivery networks, and users  ...  a fiber-to-the-home (FTTH) network of approximately 100 homes in Cleveland, OH to evaluate how different strategies might have implications for performance and privacy [1].  ... 
arXiv:2002.09055v2 fatcat:mtvudxo765dj5lpnrbdgej75me

Securing Fog Storage Nodes using an Attribute-based Encryption Scheme and Multi-Factor Authentication

2019 International Journal of Engineering and Advanced Technology  
In general, the cloud is a RAW data type which consists of any data format, hence respective on the data type the encryption conversion can be used.  ...  In order to evaluate the efficiency, the proposed protocol is implemented and tested in AVISPA and compared with the certificate-based schemes.  ...  Cipher text -Attribute Based Encryption (CP-ABE) is a generic one to many encryption scheme widely used in the IoT devices for attribute level encryption.  ... 
doi:10.35940/ijeat.f8413.109119 fatcat:m4mlblp775dnjm4vxt4me6yz2i

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions [article]

Runhua Xu, James Joshi
2020 arXiv   pre-print
Such privacy concerns have been instrumental in the creation of several regulations and acts to restrict the availability and use of privacy-sensitive data.  ...  in building many of the existing privacy-preserving approaches.  ...  Acknowledgment This work was performed while James Joshi was serving as a Program Director at NSF; and the work represents the authors' views and not that of NSF's.  ... 
arXiv:2011.06191v2 fatcat:t4iamavzovcrzblxtbkqedk4yi

Blockchain-based Multi-Party Authorization for Accessing IPFS Encrypted Data

Ammar Battah, Mohammad Madine, Hamad AlZaabi, Ibrar Yaqoob, Khaled Salah, Raja Jayaraman
2020 IEEE Access  
In [15] , a blockchain and trusted oracles based decentralized access control solution for the IoT data has been proposed. The trusted oracles are used to fetch data from the IoT devices.  ...  Once the database is requested for the data (based on the hash of the file), it provides the proxy with the encrypted symmetric key and encrypted data. • Proxy re-encryption servers: In our proposed solution  ... 
doi:10.1109/access.2020.3034260 fatcat:26srbecplfafvicpey572f3wci

Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams [article]

Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Sylvia Ratnasamy
2021 arXiv   pre-print
Droplet enables data owners to securely and selectively share their encrypted data while guaranteeing data confidentiality in the presence of unauthorized parties and compromised data servers.  ...  In this paper, we present Droplet's design, the reference implementation of Droplet, and the experimental results of three case-study applications deployed with Droplet: Fitbit activity tracker, Ava health  ...  This work was supported in part by the Swiss National Science Foundation Ambizione Grant, VMware, Intel, and the National Science Foundation under Grant No.1553747.  ... 
arXiv:1806.02057v3 fatcat:lfe3247sj5bb3kdpw33ywb2eny

EEIRI: Efficient Encrypted Image Retrieval in IoT-Cloud

2019 KSII Transactions on Internet and Information Systems  
One of the best means to safeguard the confidentiality, security, and privacy of an image within the IoT-Cloud is through encryption. However, looking through encrypted data is a difficult process.  ...  We propose a lightweight scheme that can perform a content-based search of encrypted images, namely EEIRI. In this scheme, the images are represented using local features.  ...  Overall, our plan denotes a significant advance towards pragmatic deployment of protection privacy information facilitated inside an IoT-Cloud server.  ... 
doi:10.3837/tiis.2019.11.023 fatcat:4mt2fusjrvei7ejrzifbrhatse

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT [article]

Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler
2020 arXiv   pre-print
JEDI encrypts and signs messages end-to-end, while conforming to the decoupled communication model typical of IoT systems. JEDI's keys support expiry and fine-grained access to data, common in IoT.  ...  the recipient of a message is not known in advance.  ...  We would also like to thank students from the RISE Security Group and BETS Research Group for giving us feedback on early drafts of this paper.  ... 
arXiv:1905.13369v2 fatcat:ztf2h7zw5vgglgcr3an7px64b4

What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

Ralf C. Staudemeyer, Henrich C. Pöhls, Marcin Wójcik
2019 Journal of Reliable Intelligent Environments  
Privacy requires more than just encryption of data before and during transmission. Privacy would actually demand hiding the sheer fact that communication takes place.  ...  We motivate the need for strong privacy protection in a smart home use case by highlighting the privacy issues that cannot be solved by confidentiality mechanisms like encryption alone.  ...  Bauer Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecomm, which permits unrestricted use  ... 
doi:10.1007/s40860-019-00075-0 fatcat:rdosuiurnfhuxilrrkr3xr63t4

A Multi Keyword Searchable Attribute-based Encryption Technique for Data Access Control in Cloud Storage

Prashant Mininath Mane
2020 International Journal of Advanced Trends in Computer Science and Engineering  
In this study, it includes a multi-keyword searchable attribute-based encryption technique with a cloud-based attribute update, which is a hybrid of the attribute-based encryption algorithm and multi-keyword  ...  Nonetheless, most of the preceding multi-authority attributebased models are just considered to be true in poor design or lack of user revocation performance.  ...  The author [33] addressed the security issues of protecting privacy in the Internet of Things (IoT) evaluating.  ... 
doi:10.30534/ijatcse/2020/104942020 fatcat:6pzotrjewzex3d6iulj6xpyo3q

SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System with Probabilistic Image Encryption

Jalaluddin Khan, Jian Ping Li, Bilal Ahamad, Shadma Parveen, Amin Ul Haq, Ghufran Ahmad Khan, Arun Kumar Sangaiah
2020 IEEE Access  
in the IoT enabled healthcare system.  ...  INDEX TERMS Secure surveillance, Internet of Things, privacy, security, image encryption.  ...  In addition, it performs the patient data without exposing any information, maintaining the privacy of the patient by only enabling approved users to decrypt. In another article, Valandar et al.  ... 
doi:10.1109/access.2020.2966656 fatcat:ytfqswmvovh65jn3jo3qso62ma

TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control [article]

Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, Sylvia Ratnasamy
2020 arXiv   pre-print
Our evaluation of TimeCrypt shows that its memory overhead and performance are competitive and close to operating on data in the clear.  ...  A growing number of devices and services collect detailed time series data that is stored in the cloud.  ...  This work was supported in part by the Swiss National Science Foundation Ambizione Grant, VMmware, Intel, and the National Science Foundation under Grant No.1553747.  ... 
arXiv:1811.03457v2 fatcat:u3bddqrprrffrd3m6rmvwxyvo4

A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT

Steve Moffat, Mohammad Hammoudeh, Robert Hegarty
2017 Proceedings of the International Conference on Future Networks and Distributed Systems - ICFNDS '17  
Innovative encryption schemes have been developed to address the challenges of data protection in the Cloud and having greater control over who should be accessing what data, one of which is Attribute-Based  ...  limitations of the mobile device to perform complex computation in support of encryption and decryption in ABE.  ...  Included in this data are the highly sensitive and there are growing concerns relating to the security and privacy of such data.  ... 
doi:10.1145/3102304.3102338 dblp:conf/icfnds/MoffatHH17 fatcat:5jls5fu3nrdybnmwotrcpsn6ai
« Previous Showing results 1 — 15 out of 3,002 results