首页 > 最新文献

Information Security Journal: A Global Perspective最新文献

英文 中文
The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan IT治理在公司治理机制、业务连续性和透明度与披露之间的中介作用:基于约旦新冠肺炎疫情的实证研究
Pub Date : 2022-03-16 DOI: 10.1080/19393555.2022.2053001
Faozi A. Almaqtari, Najib H. S. Farhan, A. Yahya, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim
ABSTRACT The present study aims to assess the mediating role of IT governance between corporate governance mechanisms and business continuity, and transparency & disclosure during the pandemic of Covid-19 in Jordan. The study uses a sample of 232 questionnaires retrieved from different firms of different sectors. The sample includes a survey response from board members, senior executives, auditors, IT experts, and other practitioners. Factor analysis and structural equation modeling were conducted to estimate the results. The results indicate that IT governance exhibits a statistically significant positive effect on business continuity and transparency & disclosure. Further, the results reveal that corporate governance mechanisms are less efficient in their influence on business continuity and transparency & disclosure in the absence of the mediating effect of IT governance during the pandemic. The current study’s findings provide insight and empirical evidence to the importance of IT governance and its role in business continuity and transparency & disclosure in constraining the negative effects during any crisis. The current study provides a novel contribution as it links corporate governance, transparency, and IT governance in the context of Covid-19 in an emerging country.
本研究旨在评估约旦2019冠状病毒病大流行期间IT治理在公司治理机制与业务连续性、透明度和披露之间的中介作用。本研究从不同行业的不同企业中抽取了232份问卷。样本包括来自董事会成员、高级管理人员、审计员、IT专家和其他实践者的调查回应。采用因子分析和结构方程模型对结果进行估计。结果表明,IT治理对业务连续性和透明度和信息披露具有统计学上显著的正向影响。此外,研究结果表明,在疫情期间缺乏IT治理的中介作用的情况下,公司治理机制对业务连续性和透明度与披露的影响效率较低。当前的研究结果为IT治理的重要性及其在业务连续性、透明度和披露方面的作用提供了见解和经验证据,以限制任何危机期间的负面影响。本研究将新冠疫情背景下新兴国家的公司治理、透明度和it治理联系起来,做出了新的贡献。
{"title":"The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan","authors":"Faozi A. Almaqtari, Najib H. S. Farhan, A. Yahya, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim","doi":"10.1080/19393555.2022.2053001","DOIUrl":"https://doi.org/10.1080/19393555.2022.2053001","url":null,"abstract":"ABSTRACT The present study aims to assess the mediating role of IT governance between corporate governance mechanisms and business continuity, and transparency & disclosure during the pandemic of Covid-19 in Jordan. The study uses a sample of 232 questionnaires retrieved from different firms of different sectors. The sample includes a survey response from board members, senior executives, auditors, IT experts, and other practitioners. Factor analysis and structural equation modeling were conducted to estimate the results. The results indicate that IT governance exhibits a statistically significant positive effect on business continuity and transparency & disclosure. Further, the results reveal that corporate governance mechanisms are less efficient in their influence on business continuity and transparency & disclosure in the absence of the mediating effect of IT governance during the pandemic. The current study’s findings provide insight and empirical evidence to the importance of IT governance and its role in business continuity and transparency & disclosure in constraining the negative effects during any crisis. The current study provides a novel contribution as it links corporate governance, transparency, and IT governance in the context of Covid-19 in an emerging country.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cryptographic pointers for fine-grained file access security 用于细粒度文件访问安全性的加密指针
Pub Date : 2022-02-28 DOI: 10.1080/19393555.2022.2033365
L. Lopriore
ABSTRACT We present a paradigm for fine-grained access security in a protection environment featuring files and records. Files are allocated at increasing addresses in a virtual space whose size is extremely large, so that virtual space reuse is never necessary. A record is a portion of a file. A subject certifies possession of an access privilege for a given object, file, or record, by presenting a cryptographic pointer (c-pointer) referencing that object. The c-pointer includes a key, and the composition of the access privilege expressed in terms of the two access rights, to read and to write. The c-pointer is valid if the key descends from a master key indicated in the c-pointer, by application of a universally known, symmetric algorithm. Records can be encrypted, and the key is specific to the given record. A set of security primitives forms the user interface of the security system. The resulting environment is evaluated from a number of viewpoints that include key proliferation, weakening and revocation, selective encryption, file directories, and robustness against security attacks aimed at c-pointer forging.
我们提出了一种在以文件和记录为特征的保护环境中实现细粒度访问安全的范例。文件在虚拟空间中按递增地址分配,虚拟空间的大小非常大,因此不需要重用虚拟空间。记录是文件的一部分。主体通过提供引用该对象的加密指针(c-pointer)来证明拥有对给定对象、文件或记录的访问权限。c指针包括一个键,以及用读和写这两种访问权限表示的访问权限的组合。如果密钥来自c指针中指示的主密钥,通过应用普遍已知的对称算法,则c指针是有效的。记录可以加密,密钥是特定于给定记录的。一组安全原语构成了安全系统的用户界面。由此产生的环境从多个角度进行评估,包括密钥扩散、弱化和撤销、选择性加密、文件目录以及针对c指针伪造的安全攻击的健壮性。
{"title":"Cryptographic pointers for fine-grained file access security","authors":"L. Lopriore","doi":"10.1080/19393555.2022.2033365","DOIUrl":"https://doi.org/10.1080/19393555.2022.2033365","url":null,"abstract":"ABSTRACT We present a paradigm for fine-grained access security in a protection environment featuring files and records. Files are allocated at increasing addresses in a virtual space whose size is extremely large, so that virtual space reuse is never necessary. A record is a portion of a file. A subject certifies possession of an access privilege for a given object, file, or record, by presenting a cryptographic pointer (c-pointer) referencing that object. The c-pointer includes a key, and the composition of the access privilege expressed in terms of the two access rights, to read and to write. The c-pointer is valid if the key descends from a master key indicated in the c-pointer, by application of a universally known, symmetric algorithm. Records can be encrypted, and the key is specific to the given record. A set of security primitives forms the user interface of the security system. The resulting environment is evaluated from a number of viewpoints that include key proliferation, weakening and revocation, selective encryption, file directories, and robustness against security attacks aimed at c-pointer forging.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116248989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A privacy-preserving multisubset data aggregation scheme with fault resilience for intelligent transportation system 基于故障恢复的智能交通系统多子集数据聚合方案
Pub Date : 2022-02-25 DOI: 10.1080/19393555.2022.2036879
S. Ogundoyin
ABSTRACT In Intelligent transportation system (ITS) applications, such as road safety and traffic monitoring, useful information is frequently gathered and transmitted to the management center for analysis, to provide a wide range of control, communication, and management measures. However, privacy of users must be preserved, since data transmitted by users may reveal sensitive private information such as location, travel route, etc. In this paper, we propose a privacy-preserving data aggregation scheme for ITS applications. The proposed scheme employs the combination of modified Paillier cryptosystem, Chinese Remainder theorem, Boneh short signature, and hash function operations not only to aggregate data of heterogeneous vehicles into one but also to provide fault resilience in a scenario when some devices are malfunctioning and not reporting to the management center. In the proposed scheme, each vehicle collects its data and computes a one-time secret key shared with the gateway to mask its data. We develop a hash function-based technique to ensure the authenticity and integrity of the aggregated encrypted data without revealing the individual data. Security analysis shows that the proposed scheme is secure, privacy-preserving, and supports conditional traceability. Extensive performance analysis and comparison demonstrate that the scheme is significantly more efficient than the related schemes.
在智能交通系统(ITS)的应用中,如道路安全、交通监控等,需要频繁地收集有用的信息并传输到管理中心进行分析,从而提供广泛的控制、通信和管理措施。但是,必须保护用户的隐私,因为用户传输的数据可能会泄露敏感的私人信息,如位置、旅行路线等。在本文中,我们提出了一种用于ITS应用的隐私保护数据聚合方案。该方案采用改进的Paillier密码系统、中国剩余定理、Boneh短签名和哈希函数运算相结合的方法,不仅可以将异构车辆的数据聚合为一个,而且可以在某些设备出现故障而不向管理中心报告的情况下提供故障恢复能力。在提出的方案中,每辆车收集其数据并计算与网关共享的一次性密钥来掩盖其数据。我们开发了一种基于哈希函数的技术,以确保聚合加密数据的真实性和完整性,而不会泄露单个数据。安全性分析表明,该方案具有安全性、保密性和条件可追溯性。大量的性能分析和比较表明,该方案的效率明显高于相关方案。
{"title":"A privacy-preserving multisubset data aggregation scheme with fault resilience for intelligent transportation system","authors":"S. Ogundoyin","doi":"10.1080/19393555.2022.2036879","DOIUrl":"https://doi.org/10.1080/19393555.2022.2036879","url":null,"abstract":"ABSTRACT In Intelligent transportation system (ITS) applications, such as road safety and traffic monitoring, useful information is frequently gathered and transmitted to the management center for analysis, to provide a wide range of control, communication, and management measures. However, privacy of users must be preserved, since data transmitted by users may reveal sensitive private information such as location, travel route, etc. In this paper, we propose a privacy-preserving data aggregation scheme for ITS applications. The proposed scheme employs the combination of modified Paillier cryptosystem, Chinese Remainder theorem, Boneh short signature, and hash function operations not only to aggregate data of heterogeneous vehicles into one but also to provide fault resilience in a scenario when some devices are malfunctioning and not reporting to the management center. In the proposed scheme, each vehicle collects its data and computes a one-time secret key shared with the gateway to mask its data. We develop a hash function-based technique to ensure the authenticity and integrity of the aggregated encrypted data without revealing the individual data. Security analysis shows that the proposed scheme is secure, privacy-preserving, and supports conditional traceability. Extensive performance analysis and comparison demonstrate that the scheme is significantly more efficient than the related schemes.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"421 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure key issuing scheme in ID-based cryptography with revocable ID 具有可撤销ID的基于ID加密的安全密钥发布方案
Pub Date : 2022-02-12 DOI: 10.1080/19393555.2022.2033366
Sarvesh Tanwar, Anil Kumar
ABSTRACT Recently security plays a crucial part throughout the communication framework. In the most recent decade, organizations have endeavored to move from a paper-concentrated environment to a sans paper environment where data security is one of the essential issues, and any weakness in this respect can have crushing impacts. Security implies the assurance of the data from any unauthorized access or manipulation through spying or scientific or probabilistic calculations and different strategies. For the security of information, researchers are doing more work on ID-based Cryptography (IDC). However, it has two limitations: one suffers from an inherent key escrow problem, and the second is how to revoke the misbehavior/compromised user. Tseng and Tsai have proposed a novel Revocable ID-Based Encryption (RIBE). Yet, they have not considered the key escrow problem. This paper proposed an approach in which secure key issuance is done only for non-revocable ID. This will reduce the key escrow problem as multiple entities rather than one Private Key Generator (PKG) issue the key. It will reduce the possibility of compromised PKG as the private key is cooperatively issued by PKG and multiple Key Privacy Authorities (KPAs).
近年来,安全在整个通信框架中起着至关重要的作用。在最近的十年中,组织一直在努力从纸张集中的环境转移到无纸张的环境,在这种环境中,数据安全是基本问题之一,在这方面的任何弱点都可能产生毁灭性的影响。安全意味着保证数据不受任何未经授权的访问或通过间谍或科学或概率计算和其他策略的操纵。为了保证信息的安全,研究人员对基于id的加密技术(IDC)进行了更多的研究。然而,它有两个局限性:一是存在固有的密钥托管问题,二是如何撤销行为不当/受损的用户。Tseng和Tsai提出了一种新颖的可撤销的基于id的加密(RIBE)。然而,他们没有考虑到关键的托管问题。本文提出了一种仅对不可撤销ID进行安全密钥颁发的方法。这将减少密钥托管问题,因为多个实体而不是一个私钥生成器(PKG)发布密钥。由于私钥是由PKG和多个密钥隐私机构(key Privacy authority, KPAs)合作颁发的,因此可以减少PKG被泄露的可能性。
{"title":"Secure key issuing scheme in ID-based cryptography with revocable ID","authors":"Sarvesh Tanwar, Anil Kumar","doi":"10.1080/19393555.2022.2033366","DOIUrl":"https://doi.org/10.1080/19393555.2022.2033366","url":null,"abstract":"ABSTRACT Recently security plays a crucial part throughout the communication framework. In the most recent decade, organizations have endeavored to move from a paper-concentrated environment to a sans paper environment where data security is one of the essential issues, and any weakness in this respect can have crushing impacts. Security implies the assurance of the data from any unauthorized access or manipulation through spying or scientific or probabilistic calculations and different strategies. For the security of information, researchers are doing more work on ID-based Cryptography (IDC). However, it has two limitations: one suffers from an inherent key escrow problem, and the second is how to revoke the misbehavior/compromised user. Tseng and Tsai have proposed a novel Revocable ID-Based Encryption (RIBE). Yet, they have not considered the key escrow problem. This paper proposed an approach in which secure key issuance is done only for non-revocable ID. This will reduce the key escrow problem as multiple entities rather than one Private Key Generator (PKG) issue the key. It will reduce the possibility of compromised PKG as the private key is cooperatively issued by PKG and multiple Key Privacy Authorities (KPAs).","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115010366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Issues in Cloud and Mobile cloud: A Comprehensive Survey 云和移动云中的安全问题:综合调查
Pub Date : 2022-02-09 DOI: 10.1080/19393555.2022.2035470
G. Srikanth, Lijetha. C. Jaffrin
ABSTRACT Cloud computing is one of the rapidly growing technologies in computing. It includes many benefits such as improved reliability, enormous scalability, decreased costs, portability, enhanced geographic coverage with fastest time, less infrastructure investment though it has challenges such as data security, insufficient resources, skill, etc. For past few years, cloud computing has grown considerably in information technology. Safety of information is a great concern as enormous information of individuals and companies was being stored in cloud. Many software giants such as Microsoft joined hands to build cloud services. The growth of cloud computing had been affected by data security issues, which leads to complexity with data privacy and protection. The objective of this work is to study and analyze the security issues in cloud computing. The security issues pertaining to network, data, application, storage, and information in cloud domain with the algorithms and tools deployed were addressed and reviewed elaborately.
云计算是计算领域发展最快的技术之一。它包括许多好处,如提高可靠性,巨大的可扩展性,降低成本,可移植性,以最快的时间增强地理覆盖范围,减少基础设施投资,尽管它存在数据安全,资源不足,技能等挑战。在过去的几年里,云计算在信息技术领域有了长足的发展。随着个人和企业的大量信息被存储在云端,信息安全成为人们关注的焦点。许多软件巨头,如微软,联手打造云服务。云计算的增长受到数据安全问题的影响,这导致数据隐私和保护的复杂性。本工作的目的是研究和分析云计算中的安全问题。详细讨论了云环境下网络、数据、应用、存储和信息的安全问题,以及所部署的算法和工具。
{"title":"Security Issues in Cloud and Mobile cloud: A Comprehensive Survey","authors":"G. Srikanth, Lijetha. C. Jaffrin","doi":"10.1080/19393555.2022.2035470","DOIUrl":"https://doi.org/10.1080/19393555.2022.2035470","url":null,"abstract":"ABSTRACT Cloud computing is one of the rapidly growing technologies in computing. It includes many benefits such as improved reliability, enormous scalability, decreased costs, portability, enhanced geographic coverage with fastest time, less infrastructure investment though it has challenges such as data security, insufficient resources, skill, etc. For past few years, cloud computing has grown considerably in information technology. Safety of information is a great concern as enormous information of individuals and companies was being stored in cloud. Many software giants such as Microsoft joined hands to build cloud services. The growth of cloud computing had been affected by data security issues, which leads to complexity with data privacy and protection. The objective of this work is to study and analyze the security issues in cloud computing. The security issues pertaining to network, data, application, storage, and information in cloud domain with the algorithms and tools deployed were addressed and reviewed elaborately.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"65 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid steganography technique based on RR, AQVD, and QVC 基于RR、AQVD和QVC的混合隐写技术
Pub Date : 2022-02-02 DOI: 10.1080/19393555.2021.1912219
R. Sonar, Gandharba Swain
ABSTRACT Pixel value differencing (PVD) steganography techniques suffer with “fall off boundary problem ,” and adaptive PVD (APVD) steganography techniques suffer with “unused blocks” problem. To avoid these problems, this research article describes a new steganography technique based on remainder replacement (RR), adaptive quotient value differencing (AQVD), and quotient value correlation (QVC). It performs embedding and extraction operation on 3-by-3 disjoint pixel blocks. From the 3-by-3 size pixel block two new blocks are derived: (i) the remainder block and (ii) the quotient block. Each remainder in 3-by-3 remainder block is decimal equivalent of two binary bits, so it is substituted by decimal equivalent of two secret bits. Each quotient in 3-by-3 quotient block is decimal equivalent of six binary bits. AQVD procedure is used to conceal data in four corner quotients of the quotient block. In three quotients of the middle row of the 3-by-3 quotient block, QVC embedding procedure is applied to hide the secret bits. The average hiding capacity is 3.21 bits per byte and the average peak signal-to-noise ratio is 35.27dB. Furthermore, regular-singular and pixel difference histogram attacks could not detect this technique.
像素值差分(PVD)隐写技术存在“边界脱落问题”,而自适应PVD (APVD)隐写技术存在“未使用块”问题。为了避免这些问题,本文提出了一种基于余数替换(RR)、自适应商值差分(AQVD)和商值相关(QVC)的隐写技术。它对3 × 3不相交的像素块进行嵌入和提取操作。从3 × 3大小的像素块派生出两个新的块:(i)余数块和(ii)商块。3 × 3余数块中的每个余数都是两个二进制位的十进制等价物,因此用两个秘密位的十进制等价物代替。3 × 3商块中的每个商是六个二进制位的十进制等价物。采用AQVD方法隐藏商块四角商中的数据。在3 × 3商块中间行的三个商中,采用QVC嵌入程序隐藏秘密位。平均隐藏容量为3.21比特/字节,平均峰值信噪比为35.27dB。此外,正则奇异和像素差直方图攻击无法检测到该技术。
{"title":"A hybrid steganography technique based on RR, AQVD, and QVC","authors":"R. Sonar, Gandharba Swain","doi":"10.1080/19393555.2021.1912219","DOIUrl":"https://doi.org/10.1080/19393555.2021.1912219","url":null,"abstract":"ABSTRACT Pixel value differencing (PVD) steganography techniques suffer with “fall off boundary problem ,” and adaptive PVD (APVD) steganography techniques suffer with “unused blocks” problem. To avoid these problems, this research article describes a new steganography technique based on remainder replacement (RR), adaptive quotient value differencing (AQVD), and quotient value correlation (QVC). It performs embedding and extraction operation on 3-by-3 disjoint pixel blocks. From the 3-by-3 size pixel block two new blocks are derived: (i) the remainder block and (ii) the quotient block. Each remainder in 3-by-3 remainder block is decimal equivalent of two binary bits, so it is substituted by decimal equivalent of two secret bits. Each quotient in 3-by-3 quotient block is decimal equivalent of six binary bits. AQVD procedure is used to conceal data in four corner quotients of the quotient block. In three quotients of the middle row of the 3-by-3 quotient block, QVC embedding procedure is applied to hide the secret bits. The average hiding capacity is 3.21 bits per byte and the average peak signal-to-noise ratio is 35.27dB. Furthermore, regular-singular and pixel difference histogram attacks could not detect this technique.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Id-PC: An Identification Scheme based on Polar Codes 基于极性码的Id-PC识别方案
Pub Date : 2022-01-11 DOI: 10.1080/19393555.2021.2023239
Reza Hooshmand, Alireza Jafari, G. Karamali
ABSTRACT In this paper, two polar code-based identification schemes are proposed in which the polar codes are used instead of random codes. The security of the proposed identification schemes is based on the hardness of coding problems such as general decoding problem (GDP) and syndrome decoding problem (SDP). By exploiting the properties of polar codes in the proposed identification schemes, it does not need to save the parity check or generator matrix of polar codes completely as a public data. Therefore, the public data size of the proposed identification schemes is reduced up to 90% in comparison with the Stern and Veron identification schemes. Also, by using the efficient techniques of seed generation and compression, it is shown that the communication costs of the proposed identification schemes are reduced up to 53% compared to the Stern and Veron identification schemes. Moreover, security analyses show that the proposed identification schemes have low cheating probability and also have proper resistance against information set decoding attack.
摘要本文提出了两种基于极性码的识别方案,采用极性码代替随机码。所提出的识别方案的安全性基于一般解码问题(GDP)和综合征解码问题(SDP)等编码问题的硬度。通过利用极性码的特性,本文提出的识别方案不需要将极性码的奇偶校验或生成器矩阵完全保存为公共数据。因此,与Stern和Veron识别方案相比,所提出的识别方案的公共数据大小减少了90%。此外,通过使用有效的种子生成和压缩技术,与Stern和Veron识别方案相比,所提出的识别方案的通信成本降低了53%。此外,安全性分析表明,所提出的身份识别方案具有较低的欺骗概率和较好的抗信息集解码攻击能力。
{"title":"Id-PC: An Identification Scheme based on Polar Codes","authors":"Reza Hooshmand, Alireza Jafari, G. Karamali","doi":"10.1080/19393555.2021.2023239","DOIUrl":"https://doi.org/10.1080/19393555.2021.2023239","url":null,"abstract":"ABSTRACT In this paper, two polar code-based identification schemes are proposed in which the polar codes are used instead of random codes. The security of the proposed identification schemes is based on the hardness of coding problems such as general decoding problem (GDP) and syndrome decoding problem (SDP). By exploiting the properties of polar codes in the proposed identification schemes, it does not need to save the parity check or generator matrix of polar codes completely as a public data. Therefore, the public data size of the proposed identification schemes is reduced up to 90% in comparison with the Stern and Veron identification schemes. Also, by using the efficient techniques of seed generation and compression, it is shown that the communication costs of the proposed identification schemes are reduced up to 53% compared to the Stern and Veron identification schemes. Moreover, security analyses show that the proposed identification schemes have low cheating probability and also have proper resistance against information set decoding attack.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115122547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling 美国医疗保健行业数据泄露分析:多样性、趋势和风险概况
Pub Date : 2021-12-22 DOI: 10.1080/19393555.2021.2017522
In Lee
ABSTRACT As healthcare information technology (HIT) advances, major stakeholders in the healthcare industry such as healthcare providers, health plan organizations, and business associates are generating and exchanging enormous amounts of patient data throughout the healthcare supply chain. Along with the explosive growth of electronic patient data, these stakeholders have experienced an increasing number of data breaches. Despite the significant consequences of the data breaches such as the loss of client privacy, regulatory penalty, and financial loss, there is a lack of studies on sector level trend analysis and risk profiling. This study develops a diversity index that can be used to compare the distribution of data breaches between three sectors of the healthcare industry. To enhance the understanding of the data breaches, this study utilizes a temporal aggregation of the data breaches, analyzes data breach risks, and develops a data-driven risk profile. The findings of this study can be used to improve the cybersecurity management of healthcare organizations.
随着医疗保健信息技术(HIT)的进步,医疗保健行业的主要利益相关者,如医疗保健提供者、健康计划组织和商业伙伴,正在整个医疗保健供应链中生成和交换大量的患者数据。随着电子患者数据的爆炸式增长,这些利益相关者经历了越来越多的数据泄露。尽管数据泄露会造成客户隐私泄露、监管处罚和财务损失等严重后果,但缺乏对行业层面趋势分析和风险分析的研究。本研究开发了一个多样性指数,可用于比较医疗保健行业三个部门之间数据泄露的分布。为了加强对数据泄露的理解,本研究利用数据泄露的时间聚合,分析数据泄露风险,并开发数据驱动的风险概况。本研究结果可用于改善医疗机构的网络安全管理。
{"title":"An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling","authors":"In Lee","doi":"10.1080/19393555.2021.2017522","DOIUrl":"https://doi.org/10.1080/19393555.2021.2017522","url":null,"abstract":"ABSTRACT As healthcare information technology (HIT) advances, major stakeholders in the healthcare industry such as healthcare providers, health plan organizations, and business associates are generating and exchanging enormous amounts of patient data throughout the healthcare supply chain. Along with the explosive growth of electronic patient data, these stakeholders have experienced an increasing number of data breaches. Despite the significant consequences of the data breaches such as the loss of client privacy, regulatory penalty, and financial loss, there is a lack of studies on sector level trend analysis and risk profiling. This study develops a diversity index that can be used to compare the distribution of data breaches between three sectors of the healthcare industry. To enhance the understanding of the data breaches, this study utilizes a temporal aggregation of the data breaches, analyzes data breach risks, and develops a data-driven risk profile. The findings of this study can be used to improve the cybersecurity management of healthcare organizations.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multimodal biometric system based on fusion techniques: a review 基于融合技术的多模态生物识别系统研究进展
Pub Date : 2021-12-20 DOI: 10.1080/19393555.2021.1974130
N. Bala, Rashmi Gupta, Anil Kumar
ABSTRACT Biometric allude to an automatic procedure of acknowledging an individual utilizing their behavioral or physical characteristics. The biometric framework, which utilizes one cue for authentication is termed as unimodal biometric. The unimodal biometric framework confronts numerous snags like dearth of distinctiveness, universality intra-class similarity and multimodal biometric is one of best options to conquer these issues, which is a framework that utilizes two or more cues for authentication. This study presents the overview of multimodal biometric recognition systems. Multimodal biometric recognition systems augment the security and concealment of digital information. From last two decades, there are a lot of research work on information fusion. We have discussed recent trends in multimodal biometric depending upon the type of fusion scheme and the level of fusion i.e. sensor level or feature level fusion, decision level fusion, score level fusion and hybrid fusion level. The types of fusion are conversed in detail with their individual merits and demerits. In addition to that, the methodologies, employed databases and accuracy results of the existing works are presented to showcase the profound usage of multimodal biometric design. The paper is targeted toward presenting a comprehensive review of different fusion schemes in combining various biometric modalities.
生物识别指的是利用个体的行为或身体特征来识别个体的自动过程。利用单一线索进行身份验证的生物识别框架称为单峰生物识别。单模态生物识别框架面临着许多障碍,如缺乏独特性,普遍性类内相似性和多模态生物识别是克服这些问题的最佳选择之一,它是一个利用两个或多个线索进行身份验证的框架。本研究概述了多模态生物识别系统。多模态生物识别系统增强了数字信息的安全性和隐蔽性。近二十年来,人们对信息融合进行了大量的研究。我们讨论了基于融合方案类型和融合水平的多模态生物识别的最新趋势,即传感器级或特征级融合、决策级融合、评分级融合和混合融合水平。详细讨论了各种类型的融合及其各自的优缺点。除此之外,还介绍了现有工作的方法,所使用的数据库和准确性结果,以展示多模态生物识别设计的深刻应用。本文的目的是对结合各种生物识别模式的不同融合方案进行全面回顾。
{"title":"Multimodal biometric system based on fusion techniques: a review","authors":"N. Bala, Rashmi Gupta, Anil Kumar","doi":"10.1080/19393555.2021.1974130","DOIUrl":"https://doi.org/10.1080/19393555.2021.1974130","url":null,"abstract":"ABSTRACT Biometric allude to an automatic procedure of acknowledging an individual utilizing their behavioral or physical characteristics. The biometric framework, which utilizes one cue for authentication is termed as unimodal biometric. The unimodal biometric framework confronts numerous snags like dearth of distinctiveness, universality intra-class similarity and multimodal biometric is one of best options to conquer these issues, which is a framework that utilizes two or more cues for authentication. This study presents the overview of multimodal biometric recognition systems. Multimodal biometric recognition systems augment the security and concealment of digital information. From last two decades, there are a lot of research work on information fusion. We have discussed recent trends in multimodal biometric depending upon the type of fusion scheme and the level of fusion i.e. sensor level or feature level fusion, decision level fusion, score level fusion and hybrid fusion level. The types of fusion are conversed in detail with their individual merits and demerits. In addition to that, the methodologies, employed databases and accuracy results of the existing works are presented to showcase the profound usage of multimodal biometric design. The paper is targeted toward presenting a comprehensive review of different fusion schemes in combining various biometric modalities.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks 车辆自组织网络中黑洞节点识别与隔离的跨层方法
Pub Date : 2021-12-07 DOI: 10.1080/19393555.2021.2007316
Naib Rabiaa, A. C. Moussa, B. H. Sofiane
ABSTRACT Vehicular Ad-hoc Network (VANET) is a set of intelligent vehicles that communicate without a fixed infrastructure. The communication between each source/destination pair is done by using routing protocols. On-demand multipath distance vector (AOMDV) is one of the most known ad-hoc multipath routing protocols used in VANETs. The decentralized nature of VANET makes this type of network vulnerable to various attacks, such as blackhole attack. In such attack, the malicious vehicle aims to make the communication unavailable. To achieve this goal, the malicious vehicle persuades the source to send its data packets through it because it has the fresher route toward the destination. This is done by forging routing information. After receiving the data packets, the malicious vehicle deletes them instead of forwarding them to their intended destinations. This paper introduces a new Cross-Layer method (CRAOMDV) where information is shared between MAC and network layers to detect and ignore the malicious vehicles in VANETs. Our experiments used the simulator NS2 and SUMO for the generation and simulation of real mobility scenarios. The evaluation results demonstrate the efficiency of CRAOMDV compared to AOMDV under blackhole attack in terms of improving the packet delivery and reducing the average end-to-delay and the routing overhead.
车辆自组织网络(VANET)是一组在没有固定基础设施的情况下进行通信的智能车辆。每个源/目标对之间的通信是通过使用路由协议完成的。按需多路径距离矢量(AOMDV)是vanet中使用的最著名的自组织多路径路由协议之一。VANET的分散性使得这种类型的网络容易受到各种攻击,例如黑洞攻击。在这种攻击中,恶意车辆的目的是使通信不可用。为了实现这一目标,恶意车辆说服源通过它发送数据包,因为它有通往目的地的最新路由。这是通过伪造路由信息来实现的。在收到数据包后,恶意车辆会将其删除,而不是将其转发到预定的目的地。本文介绍了一种新的跨层方法(CRAOMDV),该方法在MAC层和网络层之间共享信息,以检测和忽略vanet中的恶意车辆。我们的实验使用模拟器NS2和SUMO来生成和模拟真实的移动场景。评价结果表明,在黑洞攻击下,CRAOMDV比AOMDV在提高分组传输速度、减少平均端到端延迟和路由开销等方面具有更高的效率。
{"title":"A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks","authors":"Naib Rabiaa, A. C. Moussa, B. H. Sofiane","doi":"10.1080/19393555.2021.2007316","DOIUrl":"https://doi.org/10.1080/19393555.2021.2007316","url":null,"abstract":"ABSTRACT Vehicular Ad-hoc Network (VANET) is a set of intelligent vehicles that communicate without a fixed infrastructure. The communication between each source/destination pair is done by using routing protocols. On-demand multipath distance vector (AOMDV) is one of the most known ad-hoc multipath routing protocols used in VANETs. The decentralized nature of VANET makes this type of network vulnerable to various attacks, such as blackhole attack. In such attack, the malicious vehicle aims to make the communication unavailable. To achieve this goal, the malicious vehicle persuades the source to send its data packets through it because it has the fresher route toward the destination. This is done by forging routing information. After receiving the data packets, the malicious vehicle deletes them instead of forwarding them to their intended destinations. This paper introduces a new Cross-Layer method (CRAOMDV) where information is shared between MAC and network layers to detect and ignore the malicious vehicles in VANETs. Our experiments used the simulator NS2 and SUMO for the generation and simulation of real mobility scenarios. The evaluation results demonstrate the efficiency of CRAOMDV compared to AOMDV under blackhole attack in terms of improving the packet delivery and reducing the average end-to-delay and the routing overhead.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115497261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Information Security Journal: A Global Perspective
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1