374 Hits in 3.4 sec

Doc-Trace: Tracing Secret Documents in Cloud Computing via Steganographic Marking

Sang-Hoon CHOI, Joobeom YUN, Ki-Woong PARK
2017 IEICE transactions on information and systems  
In this paper, we present a novel scheme, called Doc-Trace, to provide an end-to-end traceability for the secret documents by inserting steganographic pattern into unused regions of the secret documents  ...  In spite of the various security benefits of cloud-based infrastructure, there are still challenges to prevent the secret document leakage incidents.  ...  Therefore, malicious user will not be able to evade the trace. Composition of this paper is as follows. In Sect. 2, we discuss the details about analyzed contents of filesystem to utilize Doc-Trace.  ... 
doi:10.1587/transinf.2016inl0002 fatcat:quzhcsetpvgalfnllrhwuc2nui

Assessing Insider Attacks and Privacy Leakage in Managed IoT Systems for Residential Prosumers

Giuseppe De Marco, Vincenzo Loia, Hadis Karimipour, Pierluigi Siano
2021 Energies  
In this regard, we provide an overview of the best practices and outline possible privacy leakages risks along with a list of correlated attacks.  ...  The transition towards the massive penetration of Renewable Energy Resources (RESs) into the electricity system requires the implementation of the Smart Grid (SG) paradigm with innovative control systems  ...  The malicious patterns are stored in a Database (DB). Table 1 . 1 Possible privacy leakage carried by an insider attack.  ... 
doi:10.3390/en14092385 doaj:93a9b64c709946dda48b38e3d2914841 fatcat:sdud45xhwzeqjgvskvlgivq74m

Design of Function for Tracing Diffusion of Classified Information for IPC on KVM

Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi
2016 Journal of Information Processing  
We also report the evaluation results including the traceability and performance of the proposed function.  ...  Because IPC with an outside computer might cause information leakage, tracing the IPCs enables the detection of such a leakage.  ...  I-BOX [9] prevents information leakage by untrusted input method editor (IME) apps. It also intercepts and analyzes the user's input data.  ... 
doi:10.2197/ipsjjip.24.781 fatcat:ajh3mz7azvbqxkp6qx4ocq7r3u

Privacy as an Integral Part of the Implementation of Cloud Solutions

Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
2014 Computer journal  
Bridging the gap between design and implementation stages has been a major concern of designers, analysts and developers of information systems and a major aspiration of a number of Information System  ...  Also it indicates a number of implementation techniques that can assist developers in assuring the respective properties. Privacy as an integral part of the implementation of cloud solutions  ...  Regulatory Compliance Data Location Insufficient Investigate Support Traceability x Data Loss Data Breaches Malicious Insiders Regulatory Compliance Data Location Table 3 . 3 Matching  ... 
doi:10.1093/comjnl/bxu118 fatcat:emwpkppysneipdi2pnesjrpgjq

Empirical Detection Techniques of Insider Threat Incidents

Rakan Alsowail, Taher Al-Shehari
2020 IEEE Access  
The objective of this paper is to enhance researchers' efforts in the domain of insider attack by systemizing the detection techniques in comparable manner.  ...  The nature of insider threats is more challenging than external threats, as insiders have a privileged access to sensitive assets of an organization.  ...  ACKNOWLEDGMENT The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research group no. RG-1441-401.  ... 
doi:10.1109/access.2020.2989739 fatcat:75osjvhbvvcxdbfpm23p5f7wdq

Towards a secure behavior modeling for IoT networks using Blockchain [article]

Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed
2020 arXiv   pre-print
Finally, in the evaluation phase we analyze various IoT devices data that is infected by Mirai attack.  ...  We defined a custom Behavior Monitor and implement on a selected node that can extract the activity of each device and analyzes the behavior using deep machine learning strategy.  ...  This research work is our first step towards classification of devices in IoT-Blockchain framework by means of deep learning.  ... 
arXiv:2001.01841v1 fatcat:jlfg33hjzzbm7ouv5pyabl372m

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts

Christos Kalloniatis, Haralambos Mouratidis, Manousakis Vassilis, Shareeful Islam, Stefanos Gritzalis, Evangelia Kavakli
2014 Computer Standards & Interfaces  
Although, typical security and privacy concerns, such as data protection, unauthorised access, data handling and traceability, are the same as in traditional distributed systems, but the solutions required  ...  aimed to analyze and design secure cloud based systems.  ...  Malicious insiders, shared technology issues and data loss or leakage are the threats related to this issue.  ... 
doi:10.1016/j.csi.2013.12.010 fatcat:zmmyjlgt75atrhjm6raln2x3cq

Secure Information Sharing in an Industrial Internet of Things [article]

Nils Ulltveit-Moe, Henrik Nergaard, László Erdödi, Terje Gjøsæter, Erland Kolstad, Pål Berg
2016 arXiv   pre-print
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT).  ...  The paper also outlines a long term solution for protecting IIoT devices with fine-grained access control for sharing data between external entities that would support cloud-based data storage.  ...  by analyzing the network packets.  ... 
arXiv:1601.04301v1 fatcat:fcgpyzm3trf2lpn4av6cnb46ly

Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications [article]

Yue Zhang, Jian Weng, Jiasi Weng, Ming Li, Weiqi Luo
2019 arXiv   pre-print
Concretely, we propose Onionchain, featuring a suite of protocols, offering both traceability and privacy. As the term implies, our Onionchain is inspired by Onion routing.  ...  We advocate the Blockchain community to adopt Onionchain with the regards of privacy and traceability.  ...  [7] show that an attacker may disclosure the real identity of a given victim by analyzing his public transaction history. Efforts have been made to counter these attacks.  ... 
arXiv:1909.03367v2 fatcat:6tfwrlrrevahrhf44zhr4t2lkq

An RFID-based technology for electronic component and system Counterfeit detection and Traceability

Kun Yang, Domenic Forte, Mark Tehranipoor
2015 2015 IEEE International Symposium on Technologies for Homeland Security (HST)  
Testing for device provenance, detection of counterfeit integrated circuits/systems, and traceability are challenging issues to address.  ...  In this paper, we develop a novel RFID-based system suitable for electronic component and system Counterfeit detection and System Traceability called CST.  ...  By protecting the RF channel with a secure protocol [20] [21] [22] , it is impossible for the malicious reader to intercept data communicated by or overwrite secret data stored in the tag.  ... 
doi:10.1109/ths.2015.7225279 fatcat:bd7xslz55fh7tbdqa6m5yulokm

An Analytical Survey on Data Access Control Mechanism in Cloud using Blockchain

Rushabh Rajendra Desarda, Nishant Ganesh Chavan, Amit Gunaji Chaure, Prof. S. E. Ingale, Pankaj Ramanlal Gandhi
2019 Zenodo  
As the bit towards this paper also proposed to handle data integrity effectively by the usage of block chain and bilinear pairing mechanism together to provide the best solution for data access control  ...  The other threat to the data arises during the process of accessing these data through various forms like by auditors, other users, data owners and some time by cloud owner itself.  ...  There is a huge risk of privacy leakage of data owners because of the increasing amount of personal data, including location information, web-searching behavior, user calls, user preference which is collected  ... 
doi:10.5281/zenodo.3609753 fatcat:js4qqyk3cvftnosafaxc6vpgiq

Blockchain-based Smart-IoT Trust Zone Measurement Architecture

Jawad Ali, Toqeer Ali, Yazed Alsaawy, Ahmad Shahrafidz Khalid, Shahrulniza Musa
2019 Proceedings of the International Conference on Omni-Layer Intelligent Systems - COINS '19  
Finally, in evaluation we analyze three IoT devices data that is infected by mirai attack.  ...  Behavior monitor extracts the activity of each device and analyzes the behavior using deep auto-encoders.  ...  the applications inside enclave is neither tampered nor interrupted by any node in BC. • Make sure the application and execution results are valid, and not tampered or fabricated by any malicious node  ... 
doi:10.1145/3312614.3312646 dblp:conf/coins/AliSAKM19 fatcat:jxuftz6hznaenly5sjgyomu3bu

Design of an Information Security Service for Medical Artificial Intelligence

Yanghoon Kim, Jawon Kim, Hangbae Chang
2022 Computers Materials & Continua  
We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to  ...  However, it has been difficult to solve these problems due to data resource issues.  ...  This can involve direct transmission from inside the hospital by using designated equipment to access the data stored and processed in personal health records.  ... 
doi:10.32604/cmc.2022.015610 fatcat:qaae3ybyozgrdfbzrwkrlkxyri

A Survey on Secure Data Analytics in Edge Computing

Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing  ...  Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are generated by IoT devices.  ...  Malicious insiders usually abuse their privileges and utilize their knowledge to steal user private data [14] .  ... 
doi:10.1109/jiot.2019.2897619 fatcat:fqmkiuse4vgafhiexe4ymqtx6m

Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey

Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
2020 Computers & security  
Due to the popularity of blockchain, there have been many proposed applications of blockchain in the healthcare sector, such as electronic health record (EHR) systems.  ...  We also identify a number of research challenges and opportunities.  ...  Acknowledgements We thank the anonymous reviewers for their valuable comments and suggestions which helped us to improve the content and presentation of this paper.  ... 
doi:10.1016/j.cose.2020.101966 pmid:32834254 pmcid:PMC7362828 fatcat:ymwetk2kajhddm4wu2p6lagqzm
« Previous Showing results 1 — 15 out of 374 results