A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Doc-Trace: Tracing Secret Documents in Cloud Computing via Steganographic Marking
2017
IEICE transactions on information and systems
In this paper, we present a novel scheme, called Doc-Trace, to provide an end-to-end traceability for the secret documents by inserting steganographic pattern into unused regions of the secret documents ...
In spite of the various security benefits of cloud-based infrastructure, there are still challenges to prevent the secret document leakage incidents. ...
Therefore, malicious user will not be able to evade the trace. Composition of this paper is as follows. In Sect. 2, we discuss the details about analyzed contents of filesystem to utilize Doc-Trace. ...
doi:10.1587/transinf.2016inl0002
fatcat:quzhcsetpvgalfnllrhwuc2nui
Assessing Insider Attacks and Privacy Leakage in Managed IoT Systems for Residential Prosumers
2021
Energies
In this regard, we provide an overview of the best practices and outline possible privacy leakages risks along with a list of correlated attacks. ...
The transition towards the massive penetration of Renewable Energy Resources (RESs) into the electricity system requires the implementation of the Smart Grid (SG) paradigm with innovative control systems ...
The malicious patterns are stored in a Database (DB).
Table 1 . 1 Possible privacy leakage carried by an insider attack. ...
doi:10.3390/en14092385
doaj:93a9b64c709946dda48b38e3d2914841
fatcat:sdud45xhwzeqjgvskvlgivq74m
Design of Function for Tracing Diffusion of Classified Information for IPC on KVM
2016
Journal of Information Processing
We also report the evaluation results including the traceability and performance of the proposed function. ...
Because IPC with an outside computer might cause information leakage, tracing the IPCs enables the detection of such a leakage. ...
I-BOX [9] prevents information leakage by untrusted input method editor (IME) apps. It also intercepts and analyzes the user's input data. ...
doi:10.2197/ipsjjip.24.781
fatcat:ajh3mz7azvbqxkp6qx4ocq7r3u
Privacy as an Integral Part of the Implementation of Cloud Solutions
2014
Computer journal
Bridging the gap between design and implementation stages has been a major concern of designers, analysts and developers of information systems and a major aspiration of a number of Information System ...
Also it indicates a number of implementation techniques that can assist developers in assuring the respective properties. Privacy as an integral part of the implementation of cloud solutions ...
Regulatory Compliance
Data Location
Insufficient Investigate
Support
Traceability
x
Data Loss
Data Breaches
Malicious Insiders
Regulatory Compliance
Data Location
Table 3 . 3 Matching ...
doi:10.1093/comjnl/bxu118
fatcat:emwpkppysneipdi2pnesjrpgjq
Empirical Detection Techniques of Insider Threat Incidents
2020
IEEE Access
The objective of this paper is to enhance researchers' efforts in the domain of insider attack by systemizing the detection techniques in comparable manner. ...
The nature of insider threats is more challenging than external threats, as insiders have a privileged access to sensitive assets of an organization. ...
ACKNOWLEDGMENT The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research group no. RG-1441-401. ...
doi:10.1109/access.2020.2989739
fatcat:75osjvhbvvcxdbfpm23p5f7wdq
Towards a secure behavior modeling for IoT networks using Blockchain
[article]
2020
arXiv
pre-print
Finally, in the evaluation phase we analyze various IoT devices data that is infected by Mirai attack. ...
We defined a custom Behavior Monitor and implement on a selected node that can extract the activity of each device and analyzes the behavior using deep machine learning strategy. ...
This research work is our first step towards classification of devices in IoT-Blockchain framework by means of deep learning. ...
arXiv:2001.01841v1
fatcat:jlfg33hjzzbm7ouv5pyabl372m
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
2014
Computer Standards & Interfaces
Although, typical security and privacy concerns, such as data protection, unauthorised access, data handling and traceability, are the same as in traditional distributed systems, but the solutions required ...
aimed to analyze and design secure cloud based systems. ...
Malicious insiders, shared technology issues and data loss or leakage are the threats related to this issue. ...
doi:10.1016/j.csi.2013.12.010
fatcat:zmmyjlgt75atrhjm6raln2x3cq
Secure Information Sharing in an Industrial Internet of Things
[article]
2016
arXiv
pre-print
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). ...
The paper also outlines a long term solution for protecting IIoT devices with fine-grained access control for sharing data between external entities that would support cloud-based data storage. ...
by analyzing the network packets. ...
arXiv:1601.04301v1
fatcat:fcgpyzm3trf2lpn4av6cnb46ly
Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications
[article]
2019
arXiv
pre-print
Concretely, we propose Onionchain, featuring a suite of protocols, offering both traceability and privacy. As the term implies, our Onionchain is inspired by Onion routing. ...
We advocate the Blockchain community to adopt Onionchain with the regards of privacy and traceability. ...
[7] show that an attacker may disclosure the real identity of a given victim by analyzing his public transaction history. Efforts have been made to counter these attacks. ...
arXiv:1909.03367v2
fatcat:6tfwrlrrevahrhf44zhr4t2lkq
An RFID-based technology for electronic component and system Counterfeit detection and Traceability
2015
2015 IEEE International Symposium on Technologies for Homeland Security (HST)
Testing for device provenance, detection of counterfeit integrated circuits/systems, and traceability are challenging issues to address. ...
In this paper, we develop a novel RFID-based system suitable for electronic component and system Counterfeit detection and System Traceability called CST. ...
By protecting the RF channel with a secure protocol [20] [21] [22] , it is impossible for the malicious reader to intercept data communicated by or overwrite secret data stored in the tag. ...
doi:10.1109/ths.2015.7225279
fatcat:bd7xslz55fh7tbdqa6m5yulokm
An Analytical Survey on Data Access Control Mechanism in Cloud using Blockchain
2019
Zenodo
As the bit towards this paper also proposed to handle data integrity effectively by the usage of block chain and bilinear pairing mechanism together to provide the best solution for data access control ...
The other threat to the data arises during the process of accessing these data through various forms like by auditors, other users, data owners and some time by cloud owner itself. ...
There is a huge risk of privacy leakage of data owners because of the increasing amount of personal data, including location information, web-searching behavior, user calls, user preference which is collected ...
doi:10.5281/zenodo.3609753
fatcat:js4qqyk3cvftnosafaxc6vpgiq
Blockchain-based Smart-IoT Trust Zone Measurement Architecture
2019
Proceedings of the International Conference on Omni-Layer Intelligent Systems - COINS '19
Finally, in evaluation we analyze three IoT devices data that is infected by mirai attack. ...
Behavior monitor extracts the activity of each device and analyzes the behavior using deep auto-encoders. ...
the applications inside enclave is neither tampered nor interrupted by any node in BC. • Make sure the application and execution results are valid, and not tampered or fabricated by any malicious node ...
doi:10.1145/3312614.3312646
dblp:conf/coins/AliSAKM19
fatcat:jxuftz6hznaenly5sjgyomu3bu
Design of an Information Security Service for Medical Artificial Intelligence
2022
Computers Materials & Continua
We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to ...
However, it has been difficult to solve these problems due to data resource issues. ...
This can involve direct transmission from inside the hospital by using designated equipment to access the data stored and processed in personal health records. ...
doi:10.32604/cmc.2022.015610
fatcat:qaae3ybyozgrdfbzrwkrlkxyri
A Survey on Secure Data Analytics in Edge Computing
2019
IEEE Internet of Things Journal
In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing ...
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are generated by IoT devices. ...
Malicious insiders usually abuse their privileges and utilize their knowledge to steal user private data [14] . ...
doi:10.1109/jiot.2019.2897619
fatcat:fqmkiuse4vgafhiexe4ymqtx6m
Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey
2020
Computers & security
Due to the popularity of blockchain, there have been many proposed applications of blockchain in the healthcare sector, such as electronic health record (EHR) systems. ...
We also identify a number of research challenges and opportunities. ...
Acknowledgements We thank the anonymous reviewers for their valuable comments and suggestions which helped us to improve the content and presentation of this paper. ...
doi:10.1016/j.cose.2020.101966
pmid:32834254
pmcid:PMC7362828
fatcat:ymwetk2kajhddm4wu2p6lagqzm
« Previous
Showing results 1 — 15 out of 374 results