The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In practice, search keywords have quite different importance when users take search operations. In addition, such keywords may have a certain grammatical relationship among them, which reflect the importance of keywords from the user’s perspective intuitively. However, the existing search techniques regard the search keywords as independent and unrelated. In this paper, for the first time, we take...
The article is devoted to the search for ways to protect the data privacy for Internet of things. Different technologies and algorithms of privacy protection are considered, their computing and energy intensity is investigated. Prototyping is performed on the FPGA of the Internet of things. Searching for ways to minimize energy consumption and computing costs of the Internet of things with algorithms...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
This paper proposes a secure retrieval scheme based on homomorphic encryption for the server-side structured database. With the advantage of this scheme, ciphertext in server under unreliable storage circumstance can be efficiently retrieved without exposition of plaintext. Users can also have detailed access to their data. In this paper, a data encryption and decryption algorithm based on homomorphic...
In this paper we present and describe all theexperiments and results that are done on "Ambiguous Multi-Symmetric Cryptography" (AMSC). We compare AMSC tosymmetric and asymmetric conventional algorithms includingAES and RSA. We explain AMSC core methods in detailsalong with the experimental setup and execution. Furthermore, we design and implement a real time application as a proofof concept...
Internet of things (IoT) is the prelude to new technological innovation. It expands with different applications such as smart home, smart city, smart grids, smart car, smart healthcare and smart retail. The application of IoT in Healthcare system brings high value for the elderly, victims of chronic disease and those who require constant supervision. But there are many security issues in such application...
Nowadays, the advancements and the fame of cloud computing are increasing which is actuating the data owners to keep their personal and professional data on public cloud servers like Google, Apple, Yahoo, Amazon, Microsoft etc with the help of data outsourcing the organizations can provide reliable and efficient services to their users. The other advantage of outsourcing the data over cloud servers...
With increase in deployment of the Internet of Things (IoT) devices, there has been an increasing concern regarding security issues with these IoT devices. The limited processing capabilities of these devices pose a serious limitation for the application of conventional security algorithms in these devices. This paper discusses a new Light Weight Transport Method (LWTM) which uses existing Advanced...
In recent years, Cloud computing has enjoyed a tremendous rise in popularity. It provides facilities for users to use cloud applications or platform without the need of any software installation and access the data or application from anywhere, with the help of internet. The cloud computing is divided into three fragments: Application, Service and Platform. Each of fragment provides different cloud...
Nowadays, data mining techniques are massively used via organizations intended for converting huge amount of data into information. Due to the advancement in database technology data are present at distributed sites consequently for carrying data mining analyzing in cost effective way we need to integrate these distributed data at one site. The predicament of anxiety here is that privacy of individual...
Voice over Internet Protocol (VoIP) has accomplished enormous growth in recent years due to its low cost and flexible service enhancement. Session Initiation Protocol (SIP) is a communication protocol for signaling and managing the media streams (voice, video and audio) over IP based network. The well-known contribution in securing a VoIP voice packet is Advanced Encryption Standard (AES) with a secret...
In order to solve the existing problem which H.264 video transmission encryption technology can not meet a good compromise between security and encryption efficiency, this paper puts forward a H.264 video transmission encryption technology based on Blowfish algorithm. The experimental results show that this encryption technology can obtain a good compromise between security and encryption efficiency...
The confidentiality and verification of customer's data at the cloud service provider (CSP) side becomes a critical issue in terms of both reliability (i.e., the trust aspect) and efficiency (i.e., the ease of performing such verifications). As data owners no longer physically possess their data storage, traditional cryptographic primitives for the purpose of data security protection cannot be directly...
In this paper we describe an efficient protocol for oblivious evaluation of a binary alphabet Deterministic Finite Automata (DFA) between the DFA owner (client) and the input text owner (server). The protocol requires only a single round of client-server communication. The number of server-side computations is linear to the text length and does not depend on the size of the DFA, and the number of...
By moving data storage and processing from lightweight mobile devices to powerful and centralized computing platforms located in clouds, Mobile Cloud Computing (MCC) can greatly enhance the capability of mobile devices. However, when data owners outsource sensitive data to mobile cloud for sharing, the data is outside of their trusted domain and can potentially be granted to untrusted parties which...
This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability...
In today's era VoIP system is globally accepted and popular communication system because of its rich features. VoIP system uses two signalling protocol: H323 and SIP (Session Initiation Protocol) for session initialization. Out of these SIP is popular amongst VoIP subscriber because of its light weight nature. SIP is vulnerable to various confidentiality threats because of its text nature and poor...
With the development and maturity of cloud computing technology, the demand for cloud storage is growing. Deduplication is a basic requirement for cloud storage to save storage space of cloud servers. And as clients are untrusted from the perspective of the server, the notion of Proofs of Ownership (PoWs) has been proposed in client-side deduplication. On the other hand, the clients cannot completely...
Cloud Computing provides an efficient way for sharing resources among cloud users with a low maintenance cost. Unfortunately sharing resources in a cloud may not be fully trusted by users, since cloud service providers will have complete control over the services on their computing infrastructure. Sharing data in a multi-proprietor manner with frequent change in their membership will always be a challenging...
Today's personalized and newfangled services and legal landscape put forward formidable challenges to personal data privacy security in cloud computing. In this paper, we propose an ABE-based secure document self-destruction (ADS) scheme, which is a novel integration of attribute-based encryption (ABE) algorithm with global-scale, decentralized distributed hash table (DHT) network. Specifically, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.