Results (67)
Search Parameters:
Keyword: SecureLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreHiding Information in DNA Sequence Data using Open Reading Frame Guided Splicing
Encouraged by the huge publicly available genomic databases, research in the field of steganography was recently extended to utilize DNA sequence data to conceal secret information. As an extension of the work presented earlier by the author, this paper proposes an approach for a secure data communication channel between two parties. At one side of…
Read MoreEnhanced Data Transportation in Remote Locations Using UAV Aided Edge Computing
In recent years, the applications in the field of Unmanned Aerial Vehicle (UAV) systems has procured research interests among various communities. One of the primary factors being, thinking beyond the box of what could UAV system bring to the table other than military applications? Evidence to any answer for this question is the current day…
Read MoreOn the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project
Static Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development and security assessment poses various technical and managerial challenges. In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government…
Read MoreUsing Formal Methods to Model a Smart School System via TLA+ and its TLC Model Checker for Validation
Formal methods are one of the efficient tools to verify and validate designs for different kinds of systems. Smart systems are attracting researchers’ attention due to the rapid spread of new technologies all over the world. Modeling a smart system requires connecting heterogeneous subsystems together to build it. Our contribution to this work is in…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read MoreRecording of Student Attendance with Blockchain Technology to Avoid Fake Presence Data in Teaching Learning Process
University operational activities are a routine part of university operations and supervisory control and monitoring function. The low controlling and monitoring of operational activities can cause irrelevance in the teaching and learning process. A graduate may have a graduation document but has never attended the teaching and learning process. An official institution can issue this…
Read MoreAn Enhanced Conceptual Security Model for Autonomous Vehicles
Connected and self-driving cars have emerged over the last decade as a leading example of cyber-physical systems, which seek to considerably enhance traffic safety, reduce emissions, decrease costs, and improve efficiency. Google, TESLA, Uber ATG are becoming pioneers in the autonomous vehicles industry. Autonomous vehicles can have a large codebase and with a large volume…
Read MoreMulti-Model Security and Social Media Analytics of the Digital Twin
Digital twins act through application programming interfaces to their physical counterparts to monitor, model, and control them. Beyond these traditional functions of digital twins, they must also act to secure their physical counterparts. A multi-model scheme is presented to help digital twins towards the task of securing the physical system. Additionally, this work includes an…
Read MoreAn Overview on CryptDb and Word2vec Approaches
Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…
Read MoreComparative Study of Cryptocurrency Algorithms: Coronavirus Towards Bitcoin’s Expansion
The widespread presence of Coronavirus (COVID-19) is causing organizations and individuals major economics downsizing. The way this virus is transmitted from one individual to another is the real cause of the problem. For that, researchers in different fields started seriously looking for touch-less and contact-less exchange. Particularly in the finance world, cash transactions and keypad…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MoreIoT Based Human Activity Recognition System Using Smart Sensors
Internet of Things provides a virtual view of real-life things by guiding challenges faced by persons in daily life. It is reforming our world with trillions of sensors and other IoT enabled devices by creating a smart environment. Effective use of IoT sensors in various smart IoT applications is very important. After analyzing different sensor…
Read MoreSurvey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB
Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…
Read MoreComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreOntologic Design of Software Engineering Knowledge Area Knowledge Components
The article sets forth the solution of the educational resources semantic context knowledge components development task, based on the learning technology project-oriented concepts, graduate’s competency model and ontological; engineering. The being considered ontology model and knowledge display formalisms allow, firstly, relevantly image the educational resources semantic context in the support concepts ontology format, and their…
Read MoreA Novel Quantum No-Key Protocol for Many Bits Transfer with Error Correction Codes
In this paper, a novel quantum transmission protocol which are based on the quantum no-key protocol is proposed. First, the quantum no-key protocol is discussed to show its important and its non-efficient on data transmission over quantum channel. Then, we improve it to carry many data bits via transmission. In addition, the error correction code…
Read MoreSecuring Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model
In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…
Read MoreOptimal Flow Analysis of a Unified Energy System with Effects of P2G
The reformation of energy hubs has significantly augmented the apprehensions about the levels of dependency between different energy sources which often can also be discussed as independent systems conventionally. This research brings focus on the formulation and analysis of an integrated system with bi-directional energy conversions and its effects on the stability of the system…
Read MoreA Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment
The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read MoreNew Color Image Encryption for Medical Images Based on Three Dimensional Generalized Chaotic Cat Map and Combined Cellular Automata
Medical images are transmitted via the Internet or the hospital intranet which include many important information about the patient’s personal information. Medical image encryption is a technology that can effectively protect the information contained in these medical images. In this paper, we give a secure and trusty Combined Cellular Automata (CoCA) based medical image encryption…
Read MoreBiometric System Vulnerabilities: A Typology of Metadata
This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…
Read MoreEvaluation of Classroom Furniture Design for Ecuadorian University Students: An Anthropometry-Based Approach
It is widely known that students’ exposure to poor postures due to inappropriate classroom furniture design may contribute to the increase of the prevalence of musculoskeletal disorders symptoms that if not identified on time could lead to severe health issues. In this context, due to the unavailability of scientific studies related to this topic in…
Read More
