Results (14)
Search Parameters:
Keyword: Access ControlA Novel Blockchain-Based Authentication and Access Control Model for Smart Environment
With the increase of smart factories and smart cities following the recent 4th industrial revolution, internal user authentication and authorization have become an important issue. The user authentication model using the server-client structure has a problem of forgery of the access history caused by the log manipulation of the administrator and unclearness of the responsibility.…
Read MoreUsing Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign
eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…
Read MoreHolistic Access Control and Privacy Infrastructure in Distributed Environment
This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MorePower Saving MAC Protocols in Wireless Sensor Networks: A Performance Assessment Analysis
Wireless sensor networks are an emerging technology that is used to monitor points or objects of interest in an area. Despite its many applications, this kind of network is often limited by the fact that it is difficult to provide energy to the nodes continuously, forcing the use of batteries, which restricts its operations. Network…
Read MoreNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MoreReview on security issues in RFID systems
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…
Read MoreCall Arrival Rate Prediction and Blocking Probability Estimation for Infrastructure based Mobile Cognitive Radio Personal Area Network
The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power…
Read MoreBlockchain-Based Decentralized Digital Self-Sovereign Identity Wallet for Secure Transaction
Blockchain (BC) as the widespread innovations in the 21st century has recognized itself to be immutable, tamper-resistant, decentralize and secure. This emerging technology is used as a functional technology for refining present technology and forming new applications for its robustness and disintermediation. Decentralized Digital Self-Sovereign Identity (DDSSI) is an identity mapped with individual identity information…
Read More
