The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth. We introduce a new client-side deduplication protocol, called DICE (Dual Integrity Convergent...
A new method of proxy re-encryption using rectangular integer matrices as the private keys is described. The technique uses modular arithmetic to limit the size of the elements of the key matrices and also to provide resistance to cryptanalysis attack.
An effective storage and management of file systems is very much essential now a days to avoid the wastage of storage space provided by the cloud providers. Data de-duplication technique has been used widely which allows only to store a single copy of a file and thus avoids duplication of file in the cloud storage servers. It helps to reduce the amount of storage space and save bandwidth of cloud...
This paper presents the development of encrypted near field communication data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We present a method of checking the genuine product into four major categories: Concept, infrastructure, development and applications. The results show that the passive NFC-forum type 2 tag can be configured...
Recently, research and development on connected vehicles using road-to-vehicle and inter-vehicle communications systems have been positively performed. For communications between roadside infrastructures and in-vehicle devices, not only the development of technologies to realize the communications, such as the establishment of a communication channel, but also the development of technologies to ensure...
In this paper we present and describe all theexperiments and results that are done on "Ambiguous Multi-Symmetric Cryptography" (AMSC). We compare AMSC tosymmetric and asymmetric conventional algorithms includingAES and RSA. We explain AMSC core methods in detailsalong with the experimental setup and execution. Furthermore, we design and implement a real time application as a proofof concept...
Virtual Private Networks (VPN) are an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are set up in hardware appliances,...
Programmable Logic Controllers (PLCs) are the key components of SCADA systems, controlling different industrial processes, while handling the communication with other systems via different communication protocols, which are subject to security attacks. The introduction of cryptography at the PLC's application level could represent a first step in providing the needed security for such systems. However,...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Cloud is a virtual environment which provides huge amount of storage to cloud users. It is more useful to small and medium scale enterprises for their initial startup. It simplifies the work burden in maintaining the server and storage from users' side. Cloud has serious dispute in securing the data from unauthorized access. If users' sensitive data are stored in cloud then it must be secured. Security...
Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the organization are changing their storage server to cloud server without any botheration. It is a great challenge for the cloud service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy...
Encryption of sensitive data is commonly used to preserve confidentiality and integrity. The problem with encrypting data is we have to decrypt it for applying operations on files such as altering a word document or querying a statistical database containing financial data. Decrypting the data will leave it vulnerable. If we want to perform conditional based search queries in an encrypted data entire...
In this paper, we propose a privacy preserving protocol for cloud system utilization based on extreme learning machine (ELM). The purpose is to implement aware agents (A-agents) on portable/wearable computing devices (P/WCD). The proposed protocol is useful to reduce the calculation cost on the P/WCD. The basic idea of the protocol is to divide an ELM-based A-agent into two parts, one containing the...
We present VTTLS, a vulnerability-tolerant communication protocol. There are often concerns about the strength of some of the encryption mechanisms used in SSL/TLS channels, with some regarded as insecure at some point in time. VTTLS is our solution to mitigate the problem of secure communication channels being vulnerable to attacks due to unexpected vulnerabilities in encryption mechanisms. It is...
Secure Socket Layer (SSL) protocol was introduced in 1994 and was later renamed as transport layer security (TLS) protocol for securing transport layer. SSL/TLS protocol is used for securing communication on the network by ensuring data confidentiality, data integrity and authenticity between the communicating party. Authentication of the communicating party and securing transfer of data is done through...
Cloud computing has becoming the hotspot in the area of information technology. However, when indulging into its convenience and strong ability of the data processing, we also find that the great challenges also appear in terms of data security and privacy information protection. In this paper, on the one hand, the summary on the current security and privacy information challenges have been surveyed...
Data sharing is a significant functionality in cloud storage. These cloud storage provider are answerable for keeping the data obtainable and available in addition to the physical environment protected and running. Here we can securely, efficiently, and flexibly share data with others in cloud storage. A new public-key cryptosystems is planned which create constant-size cipher texts such that efficient...
With the prosperity of network applications, traffic classification serves as a crucial role in network management and malicious attack detection. The widely used encryption transmission protocols, such as the Secure Socket Layer/Transport Layer Security (SSL/TLS) protocols, leads to the failure of traditional payload-based classification methods. Existing methods for encrypted traffic classification...
The use of remote services offered by cloud providers have been popular in the last lustrum. Services allow users to store remote files, or to analyze data for several purposes, like health-care or message analysis. However, when personal data are sent to the Cloud, users may lose privacy on the data-content, and on the other side cloud providers may use those data for their own businesses. In this...
Cryptography plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can only be decrypted by party those possess the associated key. Keys play the most important role in ensuring security of those algorithms. A two keys based method which uses AES as core algorithm is proposed here. This improved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.