The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent...
Combining data analytics with homomorphic encryption is an interesting topic, which finds several applications in the healthcare domain because it enables clients with low computational and/or storage capacity to outsource the analysis of potentially large datasets to the cloud while protecting sensitive data from unwanted access. In this work, we propose a framework for evaluating k-means clustering...
Data deduplication is a technique that removes redundancy of data on the storage. For cloud storage services, enabling deduplication over encrypted data is of vital importance to achieve both cost savings and keeping data confidentiality simultaneously. Recently proposed solutions are not sufficient because of lacking desired level of security and efficiency. In this paper, we propose SEED, a novel...
When private data or sensitive information is stored in the database, a typical way to protect the data is to encrypt the data before storing it. For efficiently retrieving the data, an effective search mechanism is needed that works over the encrypted data smoothly. When data is encrypted the performance of querying the database is degraded. In this paper we are going through the various search techniques...
Nowadays, more and more corporate and private users outsource their data to cloud service provider. It is provide lots of services to the users. Due to the large amount of data stored by multiple users on cloud one critical problem must be faced by users. In this large amount of data there are so many copies of repeated data. Data duplication is compress repeated data. We can use this technique To...
In ubiquitous computing environment it is common that a user owns and uses multiple computing devices, but managing cryptographic keys in those devices is a complicated matter. If certificate-based cryptography (PKI) is used such that each device has independent certificate, then user has to be involved in multiple certificate issuing processes with certification authorities (CA) and has to keep multiple...
The threat that attacks cyberspace is known as malware. In order to infect the technologic devices that are attacked, malware needs to evade the different antivirus systems. To avoid detection, an obfuscation technique must be applied so malware is updated and ready to be performed. No obstant, the technique implementation presents difficulties in terms of its required ability, evasion tests and infection...
Communication plays a major role in the day to day activities of the world. Communication can be a gesture, phone call or by e-mail. This why most of the governments pay more attention to communication patterns and what people communicate with each other. In modern day information technology plays a major role in private and public sector events. It's better to be having implement security in to the...
Cloud computing nothing but the sharing of resources and pay as per we use. The use of cloud is increasing daily. But the problem with cloud computing is every day data is get uploaded on the cloud. The increasing similar data. So deduplication is best method to reduce the used size of cloud and with the help deduplication of data approach duplicate data is removed from cloud storage. To exclude the...
In this paper we propose a novel technique for detecting HTTP botnet traffic “N-gram based HTTP bot traffic detection” that makes use of Deep Packet Inspection (DPI) of network packets to detect hosts infected with a bot. Botnet is a collection of compromised hosts or computers (bots) which are remotely controlled by its originator (botmaster) under a common command and control (C&C) infrastructure...
Intrusion detection can decide whether there are dangerous user behaviors. It can also timely detect network security vulnerabilities of inner attacks, and it can make quick response and improve network security. Therefore, it is necessary to research about the intrusion detection in land and resources information systems. For the security status of land and resources network, we place the security...
With the continuous advancement in technical field many technologies are evolving day by day, cloud computing is one of them. With the help of cloud computing user can easily share, store and retrieve their data from anywhere. Cloud computing provides hardware, software and infrastructural storage to many users at a time. As many users share their data on a cloud the main question is about security...
Numerous distributed file systems have been implemented for individuals and companies still users continue to face problems in using these systems and it is a still a big challenge for the researchers. In this paper, a novel Fault Tolerant Distributed File System (FTDFS) with multiple levels of fault tolerance is presented. At first level we are trying to filter faulty nodes/clients before they enter...
In order to prevent user's data leaked when they submit their data to the cloud server, we use fully homomorphic encryption. We encrypt the data and submit it to the cloud server. The server processes the data, and then returned to the user. This paper introduces the principle of homomorphic encryption, then analyses some homomorphic encryption scheme and its improved algorithm used in cloud computing.
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore how to provide cloud users with more controls so that they could ensure confidentiality of their data without using extensive public key encryption in cloud networking or sharing...
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
A security bug in the OpenSSL library, codenamed Heartbleed, allowed attackers to read the contents of the corresponding server's memory, effectively revealing passwords, master keys, and users' session cookies. As long as the server memory contents are in the clear, it is a matter of time until the next bug/attack hands information over to attackers. In this paper, we investigate the applicability...
Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection...
Cloud computing is one of the upcoming technologies that will upgrade generation of Internet. The data stored in the smart phones is increased as more applications are deployed and executed. If the phone is damaged or lost then the information stored in it gets lost. If the cloud storage can be integrated for regular data backup of a mobile user so that the risk of data lost can be minimized. The...
Single sign-on (SSO) is an identity management technique that provides users the ability to use multiple Web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot access Web services, even if the services are operating normally. Therefore, enabling continuous use is important in single sign on. In this paper, we present security framework...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.