Pub Date : 2021-07-28DOI: 10.1504/ijics.2021.116941
Zhixing Lin, Jian Yu, Shunfa Liu
Network security situational awareness is one of the important issues in the research of network space security technology. In this paper, deep learning technology is applied to analyse and learn network data, generate counter network by classification for sample amplification, use sparse noise reduction autoencoder for feature selection, and then use LSTM for deep learning model of security situation prediction. After the experiment proved that the proposed model based on sparse noise reduction is not balanced since the encoder-LSTM network security situation prediction model can solve various level attacks against a small number, using the model prediction results accurately in predicting regional security situation has the advantage for a longer time. In order to solve the above problems, the network security management becomes passive to active, adapting measures in advance.
{"title":"The prediction of network security situation based on deep learning method","authors":"Zhixing Lin, Jian Yu, Shunfa Liu","doi":"10.1504/ijics.2021.116941","DOIUrl":"https://doi.org/10.1504/ijics.2021.116941","url":null,"abstract":"Network security situational awareness is one of the important issues in the research of network space security technology. In this paper, deep learning technology is applied to analyse and learn network data, generate counter network by classification for sample amplification, use sparse noise reduction autoencoder for feature selection, and then use LSTM for deep learning model of security situation prediction. After the experiment proved that the proposed model based on sparse noise reduction is not balanced since the encoder-LSTM network security situation prediction model can solve various level attacks against a small number, using the model prediction results accurately in predicting regional security situation has the advantage for a longer time. In order to solve the above problems, the network security management becomes passive to active, adapting measures in advance.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1504/ijics.2021.116931
Jianchao Zhao
To improve the security of network in big data era, the improved clustering algorithm is applied to carry out network security defence. Firstly, application of large data clustering algorithms in n...
为了提高大数据时代网络的安全性,采用改进的聚类算法进行网络安全防御。首先,大数据聚类算法在n…
{"title":"Research on network security defence based on big data clustering algorithms","authors":"Jianchao Zhao","doi":"10.1504/ijics.2021.116931","DOIUrl":"https://doi.org/10.1504/ijics.2021.116931","url":null,"abstract":"To improve the security of network in big data era, the improved clustering algorithm is applied to carry out network security defence. Firstly, application of large data clustering algorithms in n...","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1504/ijics.2021.116942
Parmod Kalia, D. Bansal, S. Sofat
In the present digital world, usage of the internet has increased many folds as users have become dependent on the cloud-based applications. The disclosure of personal information on such platforms becomes a prospective threat for an attack. Researchers have used randomised data distortion technique with addition of random noise to conceal the sensitive data from an unauthorised adversary. This perturbation technique has relevance for the numerical datasets only. In this paper, we propose a hybrid model of two phases encoding with additive random noise value for ensuring non-disclosure of private and sensitive information and maintaining an effective balance between data privacy and data utility. The proposed technique has been tested on different data sizes of the real estate industry in terms of efficiency and effectiveness in preserving privacy and data utility. The proposed algorithm has been evaluated in terms of privacy level and information loss. It has proved effective in comparison with other privacy-preserving techniques such as perturbation and encryption in terms of space complexity and efficiency.
{"title":"A hybrid approach for preserving privacy for real estate data","authors":"Parmod Kalia, D. Bansal, S. Sofat","doi":"10.1504/ijics.2021.116942","DOIUrl":"https://doi.org/10.1504/ijics.2021.116942","url":null,"abstract":"In the present digital world, usage of the internet has increased many folds as users have become dependent on the cloud-based applications. The disclosure of personal information on such platforms becomes a prospective threat for an attack. Researchers have used randomised data distortion technique with addition of random noise to conceal the sensitive data from an unauthorised adversary. This perturbation technique has relevance for the numerical datasets only. In this paper, we propose a hybrid model of two phases encoding with additive random noise value for ensuring non-disclosure of private and sensitive information and maintaining an effective balance between data privacy and data utility. The proposed technique has been tested on different data sizes of the real estate industry in terms of efficiency and effectiveness in preserving privacy and data utility. The proposed algorithm has been evaluated in terms of privacy level and information loss. It has proved effective in comparison with other privacy-preserving techniques such as perturbation and encryption in terms of space complexity and efficiency.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1504/ijics.2021.116940
Fengming Ma, Gang Sheng, Y. Ma
Privacy leakage is a major hidden danger for the healthy and orderly development of e-commerce. In this paper, we analyse the current situation of the information leakage. The main reason lies in that the customer information is stored and displayed in plaintext during the e-commerce process. We present a customer privacy protection platform on the basis of the analysis, where such technical measures as information segmentation, data encryption and access authorisation are taken. With the customer privacy protection platform, the customer information is not stored and displayed in plaintext any more, which is replaced with two-dimensional code or barcode. The traceability helps to prevent the leakage and abuse of the consumer information as much as possible. Thus, the traditional operation process of e-commerce is then reengineered and the customer information is only used on demand.
{"title":"E-commerce process reengineering for customer privacy protection","authors":"Fengming Ma, Gang Sheng, Y. Ma","doi":"10.1504/ijics.2021.116940","DOIUrl":"https://doi.org/10.1504/ijics.2021.116940","url":null,"abstract":"Privacy leakage is a major hidden danger for the healthy and orderly development of e-commerce. In this paper, we analyse the current situation of the information leakage. The main reason lies in that the customer information is stored and displayed in plaintext during the e-commerce process. We present a customer privacy protection platform on the basis of the analysis, where such technical measures as information segmentation, data encryption and access authorisation are taken. With the customer privacy protection platform, the customer information is not stored and displayed in plaintext any more, which is replaced with two-dimensional code or barcode. The traceability helps to prevent the leakage and abuse of the consumer information as much as possible. Thus, the traditional operation process of e-commerce is then reengineered and the customer information is only used on demand.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-28DOI: 10.1504/ijics.2021.116930
Ningning Du, Chongxu Chen
Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.
{"title":"Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing","authors":"Ningning Du, Chongxu Chen","doi":"10.1504/ijics.2021.116930","DOIUrl":"https://doi.org/10.1504/ijics.2021.116930","url":null,"abstract":"Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-09DOI: 10.1504/IJICS.2021.116306
Fagen Song, Tinghuai Ma
Differential privacy can provide provable privacy security protection. In recent years, a great improvement has been made, however, in practical applications, the utility of original data is highly susceptible to noise, and thus, it limits its application and extension. To address the above problem, a new differential privacy method based on smooth sensitivity has been proposed in this paper. Using this method, the dataset's utility is improved greatly by reducing the amount of noise that is added, and this was validated by experiments.
{"title":"High utility differential privacy based on smooth sensitivity and individual ranking","authors":"Fagen Song, Tinghuai Ma","doi":"10.1504/IJICS.2021.116306","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116306","url":null,"abstract":"Differential privacy can provide provable privacy security protection. In recent years, a great improvement has been made, however, in practical applications, the utility of original data is highly susceptible to noise, and thus, it limits its application and extension. To address the above problem, a new differential privacy method based on smooth sensitivity has been proposed in this paper. Using this method, the dataset's utility is improved greatly by reducing the amount of noise that is added, and this was validated by experiments.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-09DOI: 10.1504/IJICS.2021.116309
Shahrzad Sedaghat
Ubiquitous computing with smart mobile devices, internet of things, virtualisation, cloud, and fog is changing yesteryears' static networks to dynamic networks of mobile smart devices. Fog computing is a pattern which expands cloud computing and the provision of related services to the network edge. Therefore, fog computing was recently introduced to provide storage and network services between end users and traditional cloud computing data centres. The present study aimed to consider the structure, architecture and applications of fog computing and analyse its differences and similarities with cloud computing, examine forensics in these networks and finally, present a new approach in this regard. This paper describes how the emerging technology - software defined networking (SDN) can be deployed a single infrastructure and leveraged to provide scalable flexible forensic solutions in this diverse and service providers/IT in a deal with the dynamic nature of today's networks attacks.
{"title":"New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN","authors":"Shahrzad Sedaghat","doi":"10.1504/IJICS.2021.116309","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116309","url":null,"abstract":"Ubiquitous computing with smart mobile devices, internet of things, virtualisation, cloud, and fog is changing yesteryears' static networks to dynamic networks of mobile smart devices. Fog computing is a pattern which expands cloud computing and the provision of related services to the network edge. Therefore, fog computing was recently introduced to provide storage and network services between end users and traditional cloud computing data centres. The present study aimed to consider the structure, architecture and applications of fog computing and analyse its differences and similarities with cloud computing, examine forensics in these networks and finally, present a new approach in this regard. This paper describes how the emerging technology - software defined networking (SDN) can be deployed a single infrastructure and leveraged to provide scalable flexible forensic solutions in this diverse and service providers/IT in a deal with the dynamic nature of today's networks attacks.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121702633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-09DOI: 10.1504/IJICS.2021.116305
I. Kamil, S. Ogundoyin
In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wearable or implantable wireless sensors which generate and transmit physiological data to a medical server...
{"title":"A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network","authors":"I. Kamil, S. Ogundoyin","doi":"10.1504/IJICS.2021.116305","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116305","url":null,"abstract":"In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wearable or implantable wireless sensors which generate and transmit physiological data to a medical server...","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-09DOI: 10.1504/IJICS.2021.116304
Nour El Houda Senoussi, A. Bachir, A. Bouabdallah
We deal with the threats to user privacy in the context of wireless local networks. We focus on location privacy where an adversary tries to learn a user's past and current locations. The current Wi-Fi standard is vulnerable to location privacy and mobility profiling attacks due to the transmission of personally identifying information such as the MAC address in plain text. We provide a generic mathematical model to quantify and express the privacy and elaborate a decentralised algorithm that allows users to attain their desired levels of privacy while lowering its effect on the QoS perceived by them. We evaluate our proposal with numerical simulation and mobility traces collected from Wi-Fi users in an office environment. We show that higher privacy can be obtained with a variable effect on the throughput available to users.
{"title":"On QoS-aware location privacy in mobile networks","authors":"Nour El Houda Senoussi, A. Bachir, A. Bouabdallah","doi":"10.1504/IJICS.2021.116304","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116304","url":null,"abstract":"We deal with the threats to user privacy in the context of wireless local networks. We focus on location privacy where an adversary tries to learn a user's past and current locations. The current Wi-Fi standard is vulnerable to location privacy and mobility profiling attacks due to the transmission of personally identifying information such as the MAC address in plain text. We provide a generic mathematical model to quantify and express the privacy and elaborate a decentralised algorithm that allows users to attain their desired levels of privacy while lowering its effect on the QoS perceived by them. We evaluate our proposal with numerical simulation and mobility traces collected from Wi-Fi users in an office environment. We show that higher privacy can be obtained with a variable effect on the throughput available to users.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"312 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-25DOI: 10.1504/IJICS.2021.115345
Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala
Personal identification number (PIN) is a simple and effective mechanism for screen unlocking but is susceptible to a number of attacks. Scramble keypad is a method that can improve the security of PIN by changing the keypad layout in each PIN-entry process. However, scramble keypad has not been provided as a standard feature in Android and iOS. In this work, we conducted a security and usability analysis of scramble keypad through theoretical analysis and user studies. The security analysis shows that scramble keypad can perfectly defend smudge attacks and greatly reduce the threats of side-channel attacks. It also has a significantly better chance to defend shoulder surfing attacks than standard keypad. The compromising of usability of scramble keypad for the improved security was also investigated. The results suggest that it is worthy to provide scramble keypad as a standard option of mobile operating systems for unlocking PIN-protected smartphones.
{"title":"On the adoption of scramble keypad for unlocking PIN-protected smartphones","authors":"Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala","doi":"10.1504/IJICS.2021.115345","DOIUrl":"https://doi.org/10.1504/IJICS.2021.115345","url":null,"abstract":"Personal identification number (PIN) is a simple and effective mechanism for screen unlocking but is susceptible to a number of attacks. Scramble keypad is a method that can improve the security of PIN by changing the keypad layout in each PIN-entry process. However, scramble keypad has not been provided as a standard feature in Android and iOS. In this work, we conducted a security and usability analysis of scramble keypad through theoretical analysis and user studies. The security analysis shows that scramble keypad can perfectly defend smudge attacks and greatly reduce the threats of side-channel attacks. It also has a significantly better chance to defend shoulder surfing attacks than standard keypad. The compromising of usability of scramble keypad for the improved security was also investigated. The results suggest that it is worthy to provide scramble keypad as a standard option of mobile operating systems for unlocking PIN-protected smartphones.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}