The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the implementation of IoT technology development has been growing rapidly. One of IoT applications is smart home system. In this system, in-home hardwares are connected to the internet. Thus, residents can access them using any internet-connected devices, such as mobile phones. Since the main concern of the IoT system is communication, the design of an efficient and secure communication...
Cloud Computing is one of the rapidly growing fields in today's scenario. It can be defined as virtual pooled servers that provide application, infrastructure, and platform based application and other facilities. The major aim of this computing technology is that the clients uses only what they need and pay according to their usage. But a large amount of data, of individuals and organizations are...
Online Voting System (OVS) Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place, The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the...
Cryptography plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can only be decrypted by party those possess the associated key. Keys play the most important role in ensuring security of those algorithms. A two keys based method which uses AES as core algorithm is proposed here. This improved...
The advent of mobile phones and the spread of the internet have caused a substantial increase in the utilization of these technologies for personal communication. A wide range of mobile applications exist, most of which use their own proprietary protocol. Reports of snooping attacks have prompted the parent organizations and users to guarantee that the encrypted data sent over a public network is...
Numerous distributed file systems have been implemented for individuals and companies still users continue to face problems in using these systems and it is a still a big challenge for the researchers. In this paper, a novel Fault Tolerant Distributed File System (FTDFS) with multiple levels of fault tolerance is presented. At first level we are trying to filter faulty nodes/clients before they enter...
Cloud computing is an emerging computing model in which resources of the computing communications are provided as services over the Internet. Privacy and security of cloud storage services are very important and become a challenge in cloud computing due to loss of control over data and its dependence on the cloud computing provider. While there is a huge amount of transferring data in cloud system,...
In the recent years internet technologies has become the backbone of any business organization. These organizations use this facility to improve their efficiency by transferring data from one location to another. But, there are number of threats in transferring critical organizational data as any culprit employee may public this data. This problem is known as data leakage problem. In the proposed...
The explosive growth of the information over the internet makes a crucial task to make network safe and secure with many users hits and connectivity. Geo location based network provides context-aware services that help associate location with users and content. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based...
Personal Health Record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. Researches had been taken up in enhancing the security of the out sourced PHRs by implementing the Attribute Based Encryption (ABE) to assure the patients control over their PHRs. Yet, most of the attribute based encryption...
After analyzing SRTP (Secure Real-time Transport Protocol) and SIP(session initiation protocole), we identified the need to secure VoIP(Voice over IP) network. Ourstudy assesses the risk of attacks on the VoIP network. Additionally, it offers solutions to the existing VoIP network vulnerabilities while issuing Instant Messages. Using cryptography, we present a general proposal for secure VoIP instant...
Cloud computing is the recent emergent technology of IT industry. Almost every enterprise application is moved to cloud which raised the concern about the integrity and privacy of data of client as well as enterprise officials. The main goal of cloud compting is how to secure, protect the data and process. AES Algorithm is of the out sourced data in cloud enviroment the "effective automatic data...
Securing computer systems has become of vital importance especially with the sophistication and advancement of attacking tools and techniques. Therefore, it is critical to apply security mechanisms that are capable of protecting systems in a way that ensures and provides major security services. However, providing a system with security services comes at the expense of system performance. The resource-intensive...
This paper deals with the problem of collaboratively secure document editing in cloud environment. Using cloud document editing service, several users can create and edit a document collaboratively. However, as the cloud service provider is not trusted to guarantee the confidentiality of these documents, existing methods encrypt the documents before uploading them to the cloud. While these approaches...
T Subjects such as knowledge engineering, pervasive computing, unified communication, ubiquitous sensing and actuation and situation awareness are gaining the most critical and crucial attention from information technology (IT) professionals and pundits across the globe these days in order to accomplish the vision of ambient intelligence (AmI). It is all about effective and round-the-clock gleaning...
The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of...
White box cryptography is the new technique against attacks on white box attack environments. In white box attack model, the attacker is even stronger than in black box attack model, and the attacker can monitor all intermediate values. Therefore, safety algorithms are needed against all operation steps being exposure. Chow introduced secure white box cryptography with AES DES implementations against...
This paper discusses problems about video security based on H.264 video compression encoding standard, puts forward a design scheme of encryption about video meeting. The video encryption system combines with AES (Advanced Encryption Standard) algorithm, H.264 and the chaos encryption. In this scheme, AES is used in encrypting DCT Coefficients and motion vector symbol sequence of H.264. The protection...
The massive deployment of RFID tag to various systems raises some issues regarding security and privacy. RFID system without trust enhancement poses security threat because secret data can be easily revealed to adversary system by due to unverified platform. Numerous works revealed that the unverified RFID platform can be compromised either by malicious codes or man in the middle attack. For such...
The attacker can access the RFID systems illegally because authentication operations on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because these utilize Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the low-cost RFID authentication protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.