The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
Nowadays the easiest way to connect with people is chatting by using Mobile Chatting Applications which offers us a lot of helpful facilities. Though different Chat Applications offers different security to users but leads to increase in vulnerabilities & risks of attack on data. Not only for business conversations also for normal conversations our data must be secured because, someone's data...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
PUFs or Physically Unclonable Functions are emerging hardware security primitives that offer a lightweight alternative to standard security for highly restricted devices like RFIDs. PUFs, however, have been found to be vulnerable to modeling attacks and as such PUF-based authentication protocols had to employ cryptographic primitives to establish reliable security. We introduce a novel lightweight,...
The ubiquity of the Internet and email, have provided a mostly insecure communication medium for the consumer. During the last few decades, we have seen the development of several ways to secure email messages. However, these solutions are inflexible and difficult to use for encrypting email messages to protect security and privacy while communicating or collaborating via email. Under the current...
In spite of the availability of digital password lockers and advanced door locks, hacking the lock code by an unauthorized person has become a plain-sailing task. Various electronic locks are currently available in the market based on Password, RFID, Biometrics, OTP, Cryptography, Wireless and IoT. Every system has its own advantages and disadvantages where one system overcomes the limitations of...
as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will lose privacy if we exchange information without data encryption and communication mechanism security. To protect data from hacking, we can use Asymmetric...
The Cloud Computing is a developing IT concept that faces some issues, which are slowing down its evolution and adoption by users across the world. The lack of security has been the main concern. Organizations and entities need to ensure, inter alia, the integrity and confidentiality of their outsourced sensible data within a cloud provider server. Solutions have been examined in order to strengthen...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
In recent times, cloud computing has become a boon for data storage in information technology. In parallel, data storage also undergoes major issues in confidentiality. Lot of techniques are in use for ensuring confidentiality of data. The available techniques are not in a position to fully protect data. And here comes the obfuscation techniques to handle the malicious hackers. These obfuscation techniques...
Cloud is a virtual environment which provides huge amount of storage to cloud users. It is more useful to small and medium scale enterprises for their initial startup. It simplifies the work burden in maintaining the server and storage from users' side. Cloud has serious dispute in securing the data from unauthorized access. If users' sensitive data are stored in cloud then it must be secured. Security...
Counterfeiting is a major issue plaguing global supply chains. In order to mitigate this problem, a wireless authentication tag is presented that implements a cryptographically secure pseudorandom number generator and authenticated encryption modes. The tag uses Keccak, the cryptographic core of SHA3, to update keys before each protocol invocation, limiting side-channel leakage. Power-glitch attacks...
The cloud computing offers high scalability, confidentiality and the easy accessibility of the information over the Internet. Though the conventional encryption system provides security, the most concerned issue is the regular side channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM can extract all information...
The IT world these days is migrating to cloud computing as the matter of fact that cloud providers provide IT resources on demand over the Internet. These resources vary from highly available instances to variety of storage types, all over demand and the pay as you use concept fascinates the enterprises to move to cloud. But as the individuals and enterprises are now inclined towards these services,...
The main aim of the proposed work is to design a secure cloud storage and data distribution platform for the open cloud (public cloud). This platform offers the secure communication among client and server during the data transmission from the client device. In addition of that it also provides the secure technique to share and transfer the file from one user to another. Therefore to secure the entire...
For information systems in which the server must operate on encrypted data (which may be necessary because the service provider cannot be trusted) solutions need to be found that enable fast searches on that data. In this paper we present an approach for encrypted database indexes that enable fast inequality, i.e., range searches, such that also prefix searches on lexicographically ordered but encrypted...
Searchable encryption schemes allow to query on encrypted data in a secure way. In this work we present different techniques that achieve range queries in searchable encryption, thus enhancing performance and reducing the leakage of information. We focus on the case of one and two-dimensional range queries to an encrypted geo-referenced database in a client-server architecture.
Cryptography plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can only be decrypted by party those possess the associated key. Keys play the most important role in ensuring security of those algorithms. A two keys based method which uses AES as core algorithm is proposed here. This improved...
Cloud storage is getting popular as it offers flexible service with appealing benefits of on-demand data outsourcing. Putting away files remotely instead of locally boasts an array of preferences for both home and professional clients. In this paper we are trying to secure all kind of private data into cloud by providing some security levels which includes encryption, digital signature and visual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.