The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the past decade, the electronic healthcare (e-health) system has been evolved into a more patient-oriented service with smaller and smarter wireless devices. However, these convenient smart devices have limited computing capacity and memory size, which makes it harder to protect the user's massive private data in the e-health system. Although some works have established a secure session key...
Traditional deception-based cyber defenses often undertake reactive strategies that utilize decoy systems or services for attack detection and information gathering. Unfortunately, the effectiveness of these defense mechanisms has been largely constrained by the low decoy fidelity, the poor scalability of decoy platform, and the static decoy configurations, which allow the attackers to identify and...
The proposed model of a multi-agent environment for e-learning due to increase in the cybercrime was found to be susceptible to DOS attacks and personification attacks that is dealt by embedding the mitigation mechanism of IP filtering with the proposed model. Developing the e-learning environment in which an algorithm has been implemented to filter the spoofed IPs from the legitimate IPs. The multi-agent...
The identity authentication system is based on multi-attribute and identity in broadcasting monitoring system. The scheme mainly uses the multi-attribute encryption Attribute-Based Encryption (ABE) as the core, draws Identity-Based Encryption (IBE) to generate the global unified Global Identifier (GID), and proposes the GID-Attribute-Based Encryption (GABE) encoded technology. The method is mainly...
Malicious actors are increasingly using TLS to evade deep packet inspection (DPI). In response, vendors and enterprises have turned to man-in-the-middle (MITM) proxies to enable security monitoring of encrypted traffic. This approach not only breaks the end-to-end authentication component of TLS but requires clients to trust a root certificate that allows the proxy to masquerade as any domain. This...
Against the background of data explosion and cloud computing, this paper investigates a branch of the cloud computing technology which is known as VDI (virtual desktop infrastructure). Users can access data and information via cloud desktops with the endpoint devices. The paper studies OpenStack - a famous open-source cloud platform which has been widely used, and introduces a secure, optimized and...
By exploiting the ever-expanding amount of data on smart devices and transforming it to meaningful information, it may be possible to uniquely identify a person via user behavior while interacting with their own smart devices. In previous works, identification of users via biometric properties such as fingerprint, iris has been successfully employed to increase the security of access. However, with...
Hybrid cloud computing paradigm is gaining wide acceptance to multi-faceted IT organizations to meet the users' different sets of requirements for different types of applications. However, this can also create an array of issues, such as complex architectures, security, service provisioning in cases of resources failures/disaster, etc. To mitigate the impact and minimize trade-offs, we proposed an...
In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is...
Mobile device based academic monitoring system (AMS) are inherently open systems and thereby vulnerable to various attacks. This paper proposes a security and privacy framework for AMS, which is based on a security model with the tree permission hierarchy using bilinear pairing. The proposed framework supports privacy based on anonymity, untraceability, and security for confidentiality, integrity,...
Public computer lab is very common in college and university. The main cost for maintenance lab is the power cost. In our university, the public computer lab consume more than 40kWh per day. The earlier study found that most cost comes from a major part: Some users don't shut down the computer after their usage. In this study, we use a low-power single-board computer (Raspberry Pi 2) for interactive...
Since the cloud computing was proposed, the research of cloud instantaneously swept the world and all kinds of cloud products have appeared in public eyes. But if the cloud platform security is not guaranteed, companies or individuals will not run and store their own data in the cloud, especially since the Hollywood nude-picture scandal event put the cloud computing to the point of a struggle. So...
With the advent of cloud computing era, cloud security has become one of the core issues to focus on, especially the security risks caused by virtualization. This research combined with the trusted computing and cloud computing security, establish a credible system by using the authentication center (CA) and trusted platform module (TPM). The study take the CA as the root of trust cloud computing...
In the past years the progress on the mobile market has made possible an advancement in terms of telemedicine systems and definition of systems for monitoring chronic illnesses. The distribution of mobile devices in developed countries is increasing. Many of these devices are equipped with wireless standards including Bluetooth and the amount of sold Smartphones is constantly increasing. Our approach...
In the medical information services, there are some issues of inadequate sharing of medical service resources and the high cost of developing medical service resources. In this paper, we combines with the characteristics of medical information service industry to build medical open platform, which opens to third-party developers to develop their applications or services, thus it effectively promotes...
The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for...
This paper outlines the implementation of a secure data authentication model for the wireless body area network using a single private key exchanged during the time of configuration. The need for secure data exchange grows rapidly due the fact that the data exchanged are confined to the details of the ailing patient. Recent researchers have proposed a secure system for WBAN, but there is a huge demand...
Cloud computing enables the use of Internet services as - needed basis. An important issue in the cloud is assuring privacy for the data stored in the cloud. There is a great challenge in providing security for the data shared in cloud and also prevent leakage of confidential data. To overcome this problem we introduce a novel approach with more secured CIA framework. We introduce auditing mechanisms...
The aim of the simple heterogeneous inter-cloud manager (SHINCLOM) project is to develop a prototype web-based single sign-on inter-cloud management portal that gives users the ability to easily configure and launch inter-cloud VPCs, HPC clusters, and autonomic applications and services. We employ a model-based approach in which the various requirements of the project are mapped to the layers of a...
A Distributed Denial-of-Service attack is an attempt to make a computer resource unavailable to its intended users. Typically, a large number of bots are triggered by an attacker simultaneously to create a huge load on a web server and bring it down. However, when processing SQL queries on a web server, owing to huge resource requirements, even a small number of queries from smaller set of bots can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.