Domain name system is among the core part of TCP/IP protocol suite and the standard protocol used by the Internet. The domain name system consists of mapped website names with Internet protocol, which facilitates brow...
详细信息
ISBN:
(纸本)9781509025367
Domain name system is among the core part of TCP/IP protocol suite and the standard protocol used by the Internet. The domain name system consists of mapped website names with Internet protocol, which facilitates browsing by not requiring users to remember numeric notation addresses. The nature of the system, which involves transferring information in plain text, makes it vulnerable to security attacks. The domain name system suffers from spoofing and cache poisoning attacks that are intended to steal the private information of users. In this paper, a scheme is proposed to prevent the aforementioned attacks by using an asymmetric cipher to encrypt the important information in messages and to protect these messages from manipulation. The proposed scheme is examined and implemented using Linux platform and C programming language. The proposed scheme protects DNS against spoofing and poisoning attacks while the results show small fraction of delay in time comparing with the applied DNS. There are also additional commercial benefits since it does not result in additional costs.
Within the IoT-cloud, security has a very significant role to play. One of the best means by which the security and privacy of an image may be safeguarded confidentially is through encryption. However, this methodolog...
详细信息
ISBN:
(纸本)9781509032068
Within the IoT-cloud, security has a very significant role to play. One of the best means by which the security and privacy of an image may be safeguarded confidentially is through encryption. However, this methodological process engenders a disadvantage in that it is difficult to search through encrypted images. A number of different means by which encrypted image can be searched have been devised, however, certain security solutions may not be used for smart devices within an IoTcloud due to the fact that such solutions are not lightweight. We present a lightweight scheme that is able to provide a content-based search through images that have been encrypted. More specifically, images are represented using local features. A similar methodology further described in [1] is also used for image similarity discrimination. In addition, we use a hashing method concerning a locality sensitive hash (LSH) so that the searchable index can be devised. The use of the LSH index means that the proficiency and effectiveness of the system is increased, which allows the retrieval of only relevant images with a minimum number of distance evaluations. Refining vector techniques are used to refine relevant results efficiently and securely. Our index construction process ensures that stored data and trapdoors are kept private.
Within the IoT-cloud, security has a very significant role to play. One of the best means to safeguard confidentially, security and privacy of a biometric image is through encryption. However, looking through encrypte...
详细信息
ISBN:
(纸本)9781509027095
Within the IoT-cloud, security has a very significant role to play. One of the best means to safeguard confidentially, security and privacy of a biometric image is through encryption. However, looking through encrypted data is a difficult process. A number of different techniques for searching encrypted data have been devised, but certain security solutions may not be used for smart devices within an IoT-cloud, and this is due to the fact that such solutions are not lightweight. In this paper, we present a lightweight scheme that provides the privacy-preserving biometric image search, which is a special case of content-based image retrieval (CBIR). A fusion of homomorphic encryption, cosine similarity and garbled circuit-based approaches are adopted in our scheme to achieve the best performance while simultaneously ensuring the privacy of the biometric image, and protection of any data access patterns and the user's input query. We conduct several empirical analyses on real image collections to demonstrate the performance and security of our work.
In-memory clustercomputing systems based MapReduce, such as Spark, have made a great impact in addressing all kinds of big data problems. Given the overuse of memory speed, which stems from avoiding the latency cause...
详细信息
Summary The nonuniform memory access (NUMA) architecture has been used extensively in data centers. Most of the previous works used single-threaded multiprogrammed workloads to study the performance of NUMA systems, w...
详细信息
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app&#...
详细信息
ISBN:
(纸本)9781450336239
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app's permissions at runtime. A fundamental requirement for such permission manager is that the granted or revoked permissions should be enforced faithfully. However, we discover that none of existing permission managers meet this requirement due to permission leaks. To address this problem, we propose CICC, a finegrained, semantic-aware, and transparent approach for any permission managers to defend against the permission leaks. Compared to existing solutions, CICC is fine-grained because it detects the permission leaks using call-chain information at the component instance level, instead of at the app level or component level. The fine-grained feature enables it to generate a minimal impact on the usability of running apps. CICC is semantic-aware in a sense that it manages call-chains in the whole lifecycle of each component instance. CICC is transparent to users and app developers, and it requires minor modification to permission managers. Our evaluation shows that CICC incurs relatively low performance overhead and power consumption. Copyright 2015 ACM.
Recently, security issues are obstructing the development and using of cloud computingservices. Authentication and integrity play an important role in the cloud security, and numerous concerns have been raised to rec...
详细信息
It is a huge challenge to deploy a cloud computing system in large-scale data centers. In order to help resolve this issue, we propose an automatic cloud system deployment approach with the characteristics of reliabil...
详细信息
Recently, security issues are obstructing the development and using of cloud computingservices. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unaut...
详细信息
Recently, security issues are obstructing the development and using of cloud computingservices. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unauthorized users to access the entities' resources (sender and receiver) within the cloud environment. Existing solutions are based on one-time authentication scheme, in which a user's password is applicable only for one login session. However, none of the proposed schemes are sufficiently secure to prevent known forms of attack. In addition, these schemes often suffer from significant overhead in the key management. For this reason, we propose a robust one-time authentication scheme based on a non-interactive one-time biometric key to generate one-time login request message. The key used in our scheme has two strong building blocks, that is, it is biometrically based on the extraction of features from the entities' irises, and cryptographically based on the strong key-based message authentication code MAC-SHA-512 and Rivest Cipher 4. The proposed scheme exhibits several important security attributes, such as key agreement, biometric key management, a single authentication request for each user's login, mutual authentication, invulnerability, and efficiency.
Outsourced data in cloud and computation results are not always trustworthy because data owners lack physical possession and control over the data as a result of virtualization, replication, and migration techniques. ...
详细信息
暂无评论