The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The open nature and outsourced model of cloud computing, coupled with increasing sophistication of cyber attackers and rapid advancement in quantum computing, mandates a more adaptive and flexible approach to cloud data security. In this paper, we introduce a secure cloud storage system which can be layered transparently on existing public & private cloud infrastructure. Our approach combines...
Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be...
Decentralized storage system for accessing data with anonymous authentication provides more secure user authentication, user revocation and prevents replay attacks. Access control is processed on decentralized KDCs it is being more secure for data encryption. Generated decentralized KDC's are then grouped by (KGC). Our system provides authentication for the user, in which only system authorized users...
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed...
Mobile Ad Hoc Networks (MANETs) are a spontaneous network of mobile devices that do not rely on any kind of fixed infrastructure. In these networks, all the network operations are carried out by nodes themselves. The self-organizing nature of MANETs makes them suitable for many applications and hence, considerable effort has been put into securing this type of networks. Secure communication in a network...
By combining cloud computing and Peer-to-Peer computing, a P2P storage cloud can be formed to offer highly available storage services, lowering the economic cost by exploiting the storage space of participating users. However, since cloud severs and users are usually outside the trusted domain of data owners, P2P storage cloud brings forth new challenges for data security and access control when data...
In a Peer-To-Peer (P2P) systems, establishing trust among the peers help to minimize the malicious attack made by other peers. Peer creates the trusted relationship with other peers based on past interaction. In a self-organizing trust model that uses distributed algorithm to reason about the peers that deserve the trust and services. However, the formation of trustworthy relationship and confidence...
This work concentrates on the design of an efficient and scalable group rekey method for P2P IPTV DRM system where the minimal division of right is a program. Our group rekey scheme is efficient in two aspects, less number of encryption and less individual transmission. We divide the members into three categories, namely, the fresh members, the rejoined members, and the remaining members, according...
To enable secure content trade between peers with good scalability and efficiency in Peer-to-Peer (P2P) file-sharing systems, we propose a decentralized authorization scheme for Digital Rights Management (DRM). Based on proxy re-encryption mechanism, our scheme deploys authorization functions on semi-trusted authorization proxy peers who re-encrypt the ciphertext of content keys and issue licenses...
In this work, we present an efficient fine-grained sharing approach of encrypted files. A concept named safe capsule (SC) is proposed as the organization unit for files. By using safe capsule, user can provide one of the fine-grained access permissions of their own data to others, such as read-only. Data are encrypted(decrypted) transparently when writing(reading) to keep its privacy.
This paper presents a simple but resilient method to suppress copyright violations among the content uploaded onto peer-to-peer (P2P) video sharing services, and is especially designed for consumer generated media (CGM). Encryption is a good way to block the circulation of illegal content. However, if the encryption key is caught by a malicious node in the P2P network, the ''denial of deletion'' ability...
Compared with traditional static Client/Server architecture, the P2P architecture is more suitable for anonymous communication systems because it is more flexible and can keep load balance better. However, in order to make the system usable and reliable, some system designs make tradeoffs between anonymity and performance such as reliability, latency and throughput. Tradeoffs are sometimes unavoidable...
Developing P2P programs should be simplified further and the security and controllability of P2P applications should be strengthen. We design a P2P-oriented secure service platform which consists of three modules: Control Center Overlay Network (CCON), Tracker Overlay Network (TON) and Sharing Server Clusters (SSC). CCON and TON are organized by Distribute Hash Table (DHT) and SSC is hided behind...
Ad hoc networking is considered as an inexpensive solution for easy and fast wireless network coverage. However, for real service deployment, security and availability in such networks are still under research even though some experimentation has shown its viability. Additionally, peer-to-peer (P2P) networking has emerged as a key technology to enable resource sharing among users. As a result, the...
The purpose of this article is to discuss an authentication method for peer to peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks...
Tycho was conceived in 2003 in response to a need by the GridRM [1] resource-monitoring project for a ldquolight-weightrdquo, scalable and easy to use wide-area distributed registry and messaging system. Since Tycho's first release in 2006 a number of modifications have been made to the system to make it easier to use and more flexible. Since its inception, Tycho has been utilised across a number...
In the present paper a novel system and its architecture is presented. The aim of this system is to enable personalized view, scalable, seamless and trusted multimedia content delivery, while protecting content from unauthorized access. Moreover, the system aims to keep bandwidth requirements low and increase the perceived quality of service (PQoS). This content delivery is done through multiple kinds...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.