privacy and security research has been very active concerning online social networks (OSN) as a vast amount of personal information is used and published (by users) within OSNs. However, most people do not pay attenti...
详细信息
ISBN:
(纸本)9781450356329
privacy and security research has been very active concerning online social networks (OSN) as a vast amount of personal information is used and published (by users) within OSNs. However, most people do not pay attention on what personal information they provide during registration. Depending on what information is provided in (public) OSN profiles, that data might be misused by attackers e.g., for cross-site profile cloning. this paper assesses data provided by the user during the registration of OSNs. therefore, it is investigated how OSN registration processes are typically modeled, which information is needed to create a profile in OSNs and which attack scenarios can occur based on the provided data. the results contribute to the understanding of OSN registration process design as well as requested data and to replicate and reuse processes for further privacy and security investigations.
While the control of individuals over their personal data is increasingly seen as an essential component of their privacy, the word "control" is usually used in a very vague way, both by lawyers and by compu...
详细信息
ISBN:
(纸本)9781450356329
While the control of individuals over their personal data is increasingly seen as an essential component of their privacy, the word "control" is usually used in a very vague way, both by lawyers and by computer scientists. this lack of precision may lead to misunderstandings and makes it difficult to check compliance. To address this issue, we propose a formal framework based on capacities to specify the notion of control over personal data and to reason about control properties. We illustrate our framework with social network systems and show that it makes it possible to characterize the types of control over personal datathat they provide to their users and to compare them in a rigorous way.
Cloud computing helps resource constraint customer to outsource their computations. this committed computing illustration inevitably brings in new privacy anxiety and contravention, just like input/output security and...
详细信息
ISBN:
(纸本)9781728113241
Cloud computing helps resource constraint customer to outsource their computations. this committed computing illustration inevitably brings in new privacy anxiety and contravention, just like input/output security and result verification. Constrained linear least-square (CLLS) is a quite common task in various scientific and engineering methods. this paper designs a tremendous protocol to make a secure, reliable and efficient outsourcing of CLLS to cloud. It applies some techniques to get an encrypted input for protecting privacy which will be sent to the cloud for computation. Both analytically and experimentally, it is proved that the proposed protocol fulfills the goals of cloud outsourcing like as security, result verifiability and efficiency.
the proceedings contain 80 papers. the topics discussed include: a deep learning approach to VNF resource prediction using correlation between VNFs;QoE-aware real-time multimedia streaming in SD-WANs;a TOSCA-oriented ...
ISBN:
(纸本)9781538693766
the proceedings contain 80 papers. the topics discussed include: a deep learning approach to VNF resource prediction using correlation between VNFs;QoE-aware real-time multimedia streaming in SD-WANs;a TOSCA-oriented software-defined security approach for unikernel-based protected clouds;an experimental evaluation of flow setup latency in distributed software defined networks;DPPx: a P4-based data plane programmability and exposure framework to enhance NFV services;a novel impact analysis approach for SDN-based networks;secure application-oriented network micro-slicing;a disaggregated MEC architecture enabling open services and novel business models;and machine learning-driven scaling and placement of virtual network functions at the network edges.
Bluetooth Low Energy is a ubiquitous technology, withapplications in the fitness, healthcare and smart home sectors, to name but a few. In this paper, we present an open-source Profiler for classifying the protection...
详细信息
ISBN:
(纸本)9781450356329
Bluetooth Low Energy is a ubiquitous technology, withapplications in the fitness, healthcare and smart home sectors, to name but a few. In this paper, we present an open-source Profiler for classifying the protection level of data residing on a BLE device. Preliminary results obtained by executing the tool against several devices show that some BLE devices allow unauthenticated reads and writes from third party devices. this could expose them to a number of attacks and compromise the privacy, or even the physical safety, of the device owner.
Companies are often motivated to evaluate their environmental sustainability, and to make public pronouncements about their performance with respect to quantitative sustainability metrics. Public trust in these declar...
详细信息
ISBN:
(纸本)9781450356329
Companies are often motivated to evaluate their environmental sustainability, and to make public pronouncements about their performance with respect to quantitative sustainability metrics. Public trust in these declarations is enhanced if the claims are certified by a recognized authority. Because accurate evaluations of environmental impacts require detailed information about industrial processes throughout a supply chain, protecting the privacy of input data in sustainability assessment is of paramount importance. We introduce a new paradigm, called privacy-preserving certification, that enables the computation of sustainability indicators in a privacy-preserving manner, allowing firms to be classified based on their individual performance without revealing sensitive information to the certifier, other parties, or the public. In this work, we describe different variants of the certification problem, highlight the necessary security requirements, and propose a provably-secure novel framework that performs the certification operations under the management of an authorized, yet untrusted, party without compromising confidential information.
the new emerging technologies have provided a way for a large amount of data generation. Secure storage of such a huge data is of prime importance. Hadoop is a tool used to store big data, where security of it is not ...
详细信息
Industrial control systems (ICS) are used to control and manage critical infrastructures and protecting these complex system and their interfaces, which can be exploited by internal and external attackers, are a vital...
详细信息
ISBN:
(纸本)9781450356329
Industrial control systems (ICS) are used to control and manage critical infrastructures and protecting these complex system and their interfaces, which can be exploited by internal and external attackers, are a vital security task. Sensors, as an interface device, are used by ICS to collect information about the physical environment and should be guarded against cyber attacks. this paper investigates how sensors can be used as a communication channel by hackers to send a malicious command and control into the ICS. Further, we examine how abusing sensory channel would lead to a data pattern, which can be detected by a proper signature-based intrusion detection system (IDS).
the mF2C project is building an open, secure and decentralized management platform for coordinating resource sharing between connected devices in the fog-to-cloud (F2C) environment. Safeguarding information security a...
详细信息
ISBN:
(纸本)9781728103594
the mF2C project is building an open, secure and decentralized management platform for coordinating resource sharing between connected devices in the fog-to-cloud (F2C) environment. Safeguarding information security and privacy in mF2C is a considerable challenge given the heterogeneous and autonomous nature of devices spanning the F2C spectrum. the recently introduced General data Protection Regulation (GDPR) raised the stake further by defining stringent security and privacy requirements on the processing of personal information. IaaS and PaaS providers falling in scope must demonstrate that they have implemented reasonable security mechanisms to ensure compliance or face significant financial penalties. In this paper, we present a prototype JAVA-based security library that addresses some of the datasecurity and privacy requirements of mF2C and GDPR. the prototype employs a PKI-based trust model to facilitate authentication and authorization. It uses policy to ensure dataprivacy and cryptography to deliver data confidentiality, integrity and non-repudiation. We also outline plans to enhance the mF2C security infrastructure withdata protection functionalities from the security library and to leverage blockchain technology to augment mF2C security and data protection capabilities.
Withthe increasing inter-connection of operation technology to the IT network, the securitythreat to the Industrial Control System (ICS) is increasing daily. therefore, it is critical to utilize formal verification ...
详细信息
ISBN:
(纸本)9781450356329
Withthe increasing inter-connection of operation technology to the IT network, the securitythreat to the Industrial Control System (ICS) is increasing daily. therefore, it is critical to utilize formal verification technique such as model checking to mathematically prove the correctness of security and safety requirements in the controller logic before it is deployed on the field. However, model checking requires considerable effort for regular ICS users and control technician to verify properties. this paper, provides a simpler approach to the model checking of temperature process control system by first starting withthe control module design without formal verification. Second, identifying possible vulnerabilities in such design. third, verifying the safety and security properties with a formal method.
暂无评论