首页 > 最新文献

Int. J. Inf. Comput. Secur.最新文献

英文 中文
A novel approach for query over encrypted data in database 数据库中加密数据查询的一种新方法
Pub Date : 2019-10-09 DOI: 10.1504/IJICS.2019.10020760
J. Al-Saraireh
Database management is considered an essential component of many information systems to store data. Some database system contains secure data; these data are protected by using encryption techniques. The query performance is affected by encryption techniques. Therefore; should be a balance between the security and performance. A new technique in this research work has been proposed to enhance the query performance over the encrypted fields in a database system. This technique is based on producing a unique hash value for each secure data and transforms the SQL query into an appropriate formula to be executed over the hash value fields. The proposed approach has eliminated any statistical relationship between encrypted and hash value fields. The time of execution encryption/decryption is reduced to enhance the performance of the query over encrypted secure data in the proposed technique. A set of experiments are carried out, and the results indicate that the performance of SQL-query is enhanced by reducing the average response time to 14 compared with others related approaches.
数据库管理被认为是许多信息系统存储数据的重要组成部分。有的数据库系统包含安全数据;这些数据通过使用加密技术加以保护。查询性能受加密技术的影响。因此;应该在安全性和性能之间取得平衡。本研究提出了一种提高数据库系统中加密字段查询性能的新技术。该技术的基础是为每个安全数据生成唯一的哈希值,并将SQL查询转换为适当的公式,以便在哈希值字段上执行。提议的方法消除了加密字段和哈希值字段之间的任何统计关系。该技术减少了加密/解密的执行时间,从而提高了对加密安全数据的查询性能。实验结果表明,与其他相关方法相比,sql查询的平均响应时间减少到14,性能得到了提高。
{"title":"A novel approach for query over encrypted data in database","authors":"J. Al-Saraireh","doi":"10.1504/IJICS.2019.10020760","DOIUrl":"https://doi.org/10.1504/IJICS.2019.10020760","url":null,"abstract":"Database management is considered an essential component of many information systems to store data. Some database system contains secure data; these data are protected by using encryption techniques. The query performance is affected by encryption techniques. Therefore; should be a balance between the security and performance. A new technique in this research work has been proposed to enhance the query performance over the encrypted fields in a database system. This technique is based on producing a unique hash value for each secure data and transforms the SQL query into an appropriate formula to be executed over the hash value fields. The proposed approach has eliminated any statistical relationship between encrypted and hash value fields. The time of execution encryption/decryption is reduced to enhance the performance of the query over encrypted secure data in the proposed technique. A set of experiments are carried out, and the results indicate that the performance of SQL-query is enhanced by reducing the average response time to 14 compared with others related approaches.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrivacyContext: identifying malicious mobile privacy leak using program context PrivacyContext:使用程序上下文识别恶意移动隐私泄漏
Pub Date : 2019-10-09 DOI: 10.1504/ijics.2019.10024486
Xiaolei Wang, Yuexiang Yang
Serious concerns have been raised about user's privacy leak in mobile apps, and many detection approaches are proposed. To evade detection, new mobile malware starts to mimic privacy-related behaviours of benign apps, and mix malicious privacy leak with benign ones to reduce the chance of being observed. Since prior proposed approaches primarily focus on the privacy leak discovery, these evasive techniques will make differentiating between malicious and benign privacy disclosures difficult during privacy leak analysis. In this paper, we propose PrivacyContext to identify malicious privacy leak using context. PrivacyContext can be used to purify privacy leak detection results for automatic and easy interpretation by filtering benign privacy disclosures. Experiments show PrivacyContext can perform an effective and efficient static privacy disclosure analysis enhancement and identify malicious privacy leak with 92.73% true positive rate. Evaluation also indicates that to keep the accuracy of privacy disclosure classification, our proposed contexts are all necessary.
移动应用中用户隐私泄露的问题引起了人们的严重关注,并提出了许多检测方法。为了逃避检测,新的移动恶意软件开始模仿良性应用的隐私相关行为,并将恶意隐私泄露与良性应用混合在一起,以减少被发现的机会。由于先前提出的方法主要关注隐私泄漏发现,这些规避技术将使隐私泄漏分析中难以区分恶意和良性隐私泄露。在本文中,我们提出了PrivacyContext来使用上下文识别恶意隐私泄漏。PrivacyContext可以用来净化隐私泄漏检测结果,通过过滤良性的隐私泄露来实现自动和容易的解释。实验表明,PrivacyContext对静态隐私泄露分析进行了有效、高效的增强,识别出恶意隐私泄露的真阳性率为92.73%。评估还表明,为了保持隐私披露分类的准确性,我们所提出的上下文都是必要的。
{"title":"PrivacyContext: identifying malicious mobile privacy leak using program context","authors":"Xiaolei Wang, Yuexiang Yang","doi":"10.1504/ijics.2019.10024486","DOIUrl":"https://doi.org/10.1504/ijics.2019.10024486","url":null,"abstract":"Serious concerns have been raised about user's privacy leak in mobile apps, and many detection approaches are proposed. To evade detection, new mobile malware starts to mimic privacy-related behaviours of benign apps, and mix malicious privacy leak with benign ones to reduce the chance of being observed. Since prior proposed approaches primarily focus on the privacy leak discovery, these evasive techniques will make differentiating between malicious and benign privacy disclosures difficult during privacy leak analysis. In this paper, we propose PrivacyContext to identify malicious privacy leak using context. PrivacyContext can be used to purify privacy leak detection results for automatic and easy interpretation by filtering benign privacy disclosures. Experiments show PrivacyContext can perform an effective and efficient static privacy disclosure analysis enhancement and identify malicious privacy leak with 92.73% true positive rate. Evaluation also indicates that to keep the accuracy of privacy disclosure classification, our proposed contexts are all necessary.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OPFE: Outsourcing Computation for Private Function Evaluation OPFE:私有功能评估的外包计算
Pub Date : 2019-10-09 DOI: 10.1504/IJICS.2019.10024485
Henry Carter, Patrick Traynor
Outsourced secure multiparty computation (SMC) protocols allow resource-constrained devices to execute input-private computation with great efficiency. Unfortunately, existing outsourced SMC protocols require that all parties know the function being evaluated, precluding applications where the function itself must remain private. We develop the first linear-complexity protocols for outsourcing private function evaluation (PFE), SMC protocols that provide input and function privacy. Assuming a semi-honest function holder, we build on existing two-party PFE constructions to develop outsourced protocols that are secure against a semi-honest, covert, or malicious outsourcing server and malicious mobile participants. To do this, we develop a garbling technique for combining public and private sub-circuits in a single computation. This allows us to apply auxiliary checks for malicious behaviour using only free-XOR gates. These protocols demonstrate the feasibility of outsourced PFE and provide a first step towards privacy-preserving applications for use in cloud computing.
外包安全多方计算(SMC)协议允许资源受限的设备以极高的效率执行输入私有计算。不幸的是,现有的外包SMC协议要求所有各方都知道正在评估的功能,从而排除了功能本身必须保持私有的应用程序。我们开发了第一个用于外包私有功能评估(PFE)的线性复杂性协议,提供输入和功能隐私的SMC协议。假设一个半诚实的功能持有人,我们在现有的两方PFE结构的基础上开发外包协议,这些协议对半诚实、隐蔽或恶意的外包服务器和恶意的移动参与者是安全的。为了做到这一点,我们开发了一种在一次计算中结合公共和私有子电路的乱码技术。这允许我们仅使用自由异或门对恶意行为应用辅助检查。这些协议证明了外包PFE的可行性,并向用于云计算的隐私保护应用程序迈出了第一步。
{"title":"OPFE: Outsourcing Computation for Private Function Evaluation","authors":"Henry Carter, Patrick Traynor","doi":"10.1504/IJICS.2019.10024485","DOIUrl":"https://doi.org/10.1504/IJICS.2019.10024485","url":null,"abstract":"Outsourced secure multiparty computation (SMC) protocols allow resource-constrained devices to execute input-private computation with great efficiency. Unfortunately, existing outsourced SMC protocols require that all parties know the function being evaluated, precluding applications where the function itself must remain private. We develop the first linear-complexity protocols for outsourcing private function evaluation (PFE), SMC protocols that provide input and function privacy. Assuming a semi-honest function holder, we build on existing two-party PFE constructions to develop outsourced protocols that are secure against a semi-honest, covert, or malicious outsourcing server and malicious mobile participants. To do this, we develop a garbling technique for combining public and private sub-circuits in a single computation. This allows us to apply auxiliary checks for malicious behaviour using only free-XOR gates. These protocols demonstrate the feasibility of outsourced PFE and provide a first step towards privacy-preserving applications for use in cloud computing.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment 一种基于加密算法的多代理系统方法,用于云计算环境中保护通信和存储数据
Pub Date : 2019-08-27 DOI: 10.1504/ijics.2019.10023472
Mohammed Amine Yagoub, O. Kazar, Mounir Beggas
The cloud computing has been envisioned as the next generation architecture of information technology enterprise. The Internet is indispensable in present days to provide and maintain the data. Such applications can be used by the end-user via the cloud communications without any configuration. Moreover, the user's data files can be accessed from any other computer using the Internet services. The security goal is to save data from threat and vulnerability which is handled by various approaches. The data should be encrypted prior to be transmitted and stored. We aim to propose a solution such that we will encrypt the whole data along with the cryptographic key. This contribution provides a new architecture that combines, obfuscation technique, hybrid encryption algorithms and the homomorphic encryption approaches. The proposed security architecture based on multi-agent system for cloud computing communications and storage environment that takes into account the most known security gaps.
云计算已被设想为下一代信息技术企业的体系结构。互联网在提供和维护数据方面是不可或缺的。最终用户可以通过云通信使用这些应用程序,而无需进行任何配置。此外,用户的数据文件可以从使用互联网服务的任何其他计算机访问。安全目标是将数据从各种方法处理的威胁和漏洞中保存下来。数据在传输和存储之前应该加密。我们的目标是提出一个解决方案,这样我们就可以加密整个数据以及加密密钥。这一贡献提供了一个结合了混淆技术、混合加密算法和同态加密方法的新体系结构。提出了一种基于多代理系统的云计算通信和存储环境安全体系结构,该体系结构考虑了目前已知的安全漏洞。
{"title":"A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment","authors":"Mohammed Amine Yagoub, O. Kazar, Mounir Beggas","doi":"10.1504/ijics.2019.10023472","DOIUrl":"https://doi.org/10.1504/ijics.2019.10023472","url":null,"abstract":"The cloud computing has been envisioned as the next generation architecture of information technology enterprise. The Internet is indispensable in present days to provide and maintain the data. Such applications can be used by the end-user via the cloud communications without any configuration. Moreover, the user's data files can be accessed from any other computer using the Internet services. The security goal is to save data from threat and vulnerability which is handled by various approaches. The data should be encrypted prior to be transmitted and stored. We aim to propose a solution such that we will encrypt the whole data along with the cryptographic key. This contribution provides a new architecture that combines, obfuscation technique, hybrid encryption algorithms and the homomorphic encryption approaches. The proposed security architecture based on multi-agent system for cloud computing communications and storage environment that takes into account the most known security gaps.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129172723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient authentication and key agreement scheme for e-health applications in the context of internet of things 一种物联网环境下电子医疗应用的高效认证与密钥协议方案
Pub Date : 2019-08-27 DOI: 10.1504/IJICS.2019.10018795
Hamza Khemissa, Djamel Tandjaoui, S. Bouzefrane
E-health applications are one of the most promising applications in the context of internet of things (IoT). Nevertheless, resource constraints and security issues in IoT are the main barriers for their deployment. Among security issues, authentication and data confidentiality are required to secure e-health applications. In this paper, we propose a new authentication and key agreement scheme for e-health applications in the context of IoT. This scheme allows a sensor node, a gateway node, and a remote user to authenticate each other and secure the collection of health-related data. The proposed scheme is based on lightweight symmetric cryptography since it uses nonces, exclusive-or operations, and simple hash functions. Besides, it takes into consideration the sensors location to provide an efficient authentication. To assess the proposed scheme, we conduct a theoretical and an automated security analysis using AVISPA tool. The results show that our scheme preserves the security properties, and ensures resilience against different types of attacks. In addition, we evaluate and compare both communication and computational costs with some existing authentication schemes. The obtained results prove that it provides authentication with low energy cost.
电子医疗应用是物联网(IoT)背景下最有前途的应用之一。然而,物联网中的资源限制和安全问题是其部署的主要障碍。在安全问题中,需要身份验证和数据机密性来保护电子医疗应用程序。在本文中,我们提出了一种新的认证和密钥协议方案,用于物联网背景下的电子医疗应用。该方案允许传感器节点、网关节点和远程用户相互验证并保护健康相关数据的收集。所提出的方案基于轻量级对称加密,因为它使用随机数、异或操作和简单的哈希函数。此外,它还考虑了传感器的位置,提供了有效的认证。为了评估所提出的方案,我们使用AVISPA工具进行了理论和自动安全性分析。结果表明,该方案既保留了安全特性,又保证了对不同类型攻击的弹性。此外,我们评估和比较了一些现有认证方案的通信和计算成本。实验结果表明,该方法可以提供低能耗的认证。
{"title":"An efficient authentication and key agreement scheme for e-health applications in the context of internet of things","authors":"Hamza Khemissa, Djamel Tandjaoui, S. Bouzefrane","doi":"10.1504/IJICS.2019.10018795","DOIUrl":"https://doi.org/10.1504/IJICS.2019.10018795","url":null,"abstract":"E-health applications are one of the most promising applications in the context of internet of things (IoT). Nevertheless, resource constraints and security issues in IoT are the main barriers for their deployment. Among security issues, authentication and data confidentiality are required to secure e-health applications. In this paper, we propose a new authentication and key agreement scheme for e-health applications in the context of IoT. This scheme allows a sensor node, a gateway node, and a remote user to authenticate each other and secure the collection of health-related data. The proposed scheme is based on lightweight symmetric cryptography since it uses nonces, exclusive-or operations, and simple hash functions. Besides, it takes into consideration the sensors location to provide an efficient authentication. To assess the proposed scheme, we conduct a theoretical and an automated security analysis using AVISPA tool. The results show that our scheme preserves the security properties, and ensures resilience against different types of attacks. In addition, we evaluate and compare both communication and computational costs with some existing authentication schemes. The obtained results prove that it provides authentication with low energy cost.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127758856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Password security by encryption using an extended ADFGVX cipher 使用扩展ADFGVX密码进行加密的密码安全性
Pub Date : 2019-08-27 DOI: 10.1504/ijics.2019.10023477
I. B. Venkateswarlu, Jagadeesh Kakarla
Login will be the critical step for most of the web users for the user authentication. As hackers utilizing a variety of techniques to steal the passwords, it is recommended to offer secured transmission of passwords to the servers from the client system. Current web developers are using common traditional hashing techniques for securing passwords over the network. However, hashing techniques are vulnerable to several attacks like brute-force attack, dictionary attack, and birthday attack. This paper implemented password security with an easy and robust transposition based encryption technique using an extended ADFGVX cipher. The proposed cipher uses two 7 × 6 Polybius squares for encryption to accommodate common characters of the password along with the random key for encryption. Finally, this study considered four metrics for performance evaluation and compared the proposed method with the state-of-art techniques. It is found that the proposed method performed excellently regarding complexity for cracking password and satisfactorily concerning execution time.
登录将是大多数网络用户进行用户认证的关键步骤。由于黑客利用各种技术窃取密码,因此建议提供从客户端系统到服务器的安全传输密码。目前的web开发人员正在使用常见的传统散列技术来保护网络上的密码。然而,散列技术容易受到暴力攻击、字典攻击和生日攻击等几种攻击。本文利用扩展的ADFGVX密码实现了一种简单、鲁棒的基于换位加密技术的密码安全。该密码采用两个7 × 6的波利比乌斯方形进行加密,以容纳密码的常用字符,并使用随机密钥进行加密。最后,本研究考虑了绩效评估的四个指标,并将所提出的方法与最先进的技术进行了比较。结果表明,该方法在复杂度和执行时间方面都有较好的表现。
{"title":"Password security by encryption using an extended ADFGVX cipher","authors":"I. B. Venkateswarlu, Jagadeesh Kakarla","doi":"10.1504/ijics.2019.10023477","DOIUrl":"https://doi.org/10.1504/ijics.2019.10023477","url":null,"abstract":"Login will be the critical step for most of the web users for the user authentication. As hackers utilizing a variety of techniques to steal the passwords, it is recommended to offer secured transmission of passwords to the servers from the client system. Current web developers are using common traditional hashing techniques for securing passwords over the network. However, hashing techniques are vulnerable to several attacks like brute-force attack, dictionary attack, and birthday attack. This paper implemented password security with an easy and robust transposition based encryption technique using an extended ADFGVX cipher. The proposed cipher uses two 7 × 6 Polybius squares for encryption to accommodate common characters of the password along with the random key for encryption. Finally, this study considered four metrics for performance evaluation and compared the proposed method with the state-of-art techniques. It is found that the proposed method performed excellently regarding complexity for cracking password and satisfactorily concerning execution time.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132109031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient user authentication model for IOT-based healthcare environment 面向物联网医疗环境的高效用户身份验证模型
Pub Date : 2019-08-27 DOI: 10.1504/IJICS.2019.10023077
Ahmed A. Elngar
Along with the large-scale proliferation of IoT-networks and information technology, users can obtain the information resources conveniently via intelligent device. Therefore authentication mechanism is a fundamental tool for ensuring secure communications and the validity of communicating party. Specially, focusing on healthcare applications based on IoT-networks.This paper proposes an efficient authentication model called 'Elngar authentication model' (EAM)-based IoT medical data system for anonymous users using elliptic curves cryptosystem (ECC) which achieves mutual authentication and forward security. Specifically, this paper certify the legitimacy of the proposed via employing BAN-logic, which is one of the important formal methods. Further, the performance comparison shows that EAM model is more suitable for IoT medical applications where efficiency and security concerned.
随着物联网和信息技术的大规模普及,用户可以通过智能设备方便地获取信息资源。因此,认证机制是保证通信安全性和通信方有效性的基本工具。特别关注基于物联网的医疗保健应用。本文提出了一种基于Elngar认证模型(EAM)的匿名用户物联网医疗数据系统,采用椭圆曲线密码系统(ECC)实现双向认证和前向安全。具体来说,本文通过采用ban逻辑来证明所提方案的合法性,ban逻辑是一种重要的形式化方法。此外,性能比较表明,EAM模型更适合于关注效率和安全性的物联网医疗应用。
{"title":"An efficient user authentication model for IOT-based healthcare environment","authors":"Ahmed A. Elngar","doi":"10.1504/IJICS.2019.10023077","DOIUrl":"https://doi.org/10.1504/IJICS.2019.10023077","url":null,"abstract":"Along with the large-scale proliferation of IoT-networks and information technology, users can obtain the information resources conveniently via intelligent device. Therefore authentication mechanism is a fundamental tool for ensuring secure communications and the validity of communicating party. Specially, focusing on healthcare applications based on IoT-networks.This paper proposes an efficient authentication model called 'Elngar authentication model' (EAM)-based IoT medical data system for anonymous users using elliptic curves cryptosystem (ECC) which achieves mutual authentication and forward security. Specifically, this paper certify the legitimacy of the proposed via employing BAN-logic, which is one of the important formal methods. Further, the performance comparison shows that EAM model is more suitable for IoT medical applications where efficiency and security concerned.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An ontology-based approach to improve access policy administration of attribute-based access control 一种基于本体的方法来改进基于属性的访问控制的访问策略管理
Pub Date : 2019-08-27 DOI: 10.1504/ijics.2019.10023471
Jiaying Li, Baowen Zhang
Attribute-based access control (ABAC) needs a large number of policies to function by using attributes of visitors, resources, environmental conditions, etc. Efficient policy administration is vital for implementation of ABAC models. In this paper, an ontology-based approach is proposed to build up an ABAC model, which is named as an ontology-based ABAC model, OABACM. Underlying relationships among things such as attributes hierarchies in OABACM are identified and described in OABACM, which if treated improperly can directly lead to problems in policy administration. In addition, policy representation and reasoning mechanism are discussed within OABACM and inherent logical properties of this model are formalised in rules. With proper reasoners, these properties can be utilised to logically improve access policy administration by reducing policy redundancy and detecting policy conflicts. In experiments, a sample ontology is created and several enterprise access examples are tested upon OABACM, which validates the effects of our model on policy administration.
基于属性的访问控制(Attribute-based access control, ABAC)需要大量的策略来利用访问者、资源、环境条件等属性来实现功能。有效的策略管理对于ABAC模型的实现至关重要。本文提出了一种基于本体的ABAC模型构建方法,称为基于本体的ABAC模型OABACM。诸如OABACM中的属性层次结构之类的事物之间的潜在关系在OABACM中被识别和描述,如果处理不当,可能会直接导致策略管理中的问题。此外,在OABACM中讨论了策略表示和推理机制,并在规则中形式化了该模型的固有逻辑属性。使用适当的推理器,可以利用这些属性通过减少策略冗余和检测策略冲突来从逻辑上改进访问策略管理。在实验中,创建了一个样本本体,并在OABACM上测试了几个企业访问示例,验证了我们的模型在策略管理方面的效果。
{"title":"An ontology-based approach to improve access policy administration of attribute-based access control","authors":"Jiaying Li, Baowen Zhang","doi":"10.1504/ijics.2019.10023471","DOIUrl":"https://doi.org/10.1504/ijics.2019.10023471","url":null,"abstract":"Attribute-based access control (ABAC) needs a large number of policies to function by using attributes of visitors, resources, environmental conditions, etc. Efficient policy administration is vital for implementation of ABAC models. In this paper, an ontology-based approach is proposed to build up an ABAC model, which is named as an ontology-based ABAC model, OABACM. Underlying relationships among things such as attributes hierarchies in OABACM are identified and described in OABACM, which if treated improperly can directly lead to problems in policy administration. In addition, policy representation and reasoning mechanism are discussed within OABACM and inherent logical properties of this model are formalised in rules. With proper reasoners, these properties can be utilised to logically improve access policy administration by reducing policy redundancy and detecting policy conflicts. In experiments, a sample ontology is created and several enterprise access examples are tested upon OABACM, which validates the effects of our model on policy administration.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem 对研究方法有效性的关键洞察演变为确保物联网生态系统的安全
Pub Date : 2019-08-27 DOI: 10.1504/ijics.2019.10023470
B. Khan, R. F. Olanrewaju, F. Anwar, R. N. Mir, Athaur Rahman Najeeb
Increasing proliferation of IoT has led to an evolution of various devices for realising the smart features of ubiquitous applications. However, the inclusion of such a massive pool of devices with different computational capabilities, network protocols, hardware configurations, etc. also causes a higher number of security threats. Security professionals, organisations, and researchers are consistently investigating the security problems associated with IoT ecosystem and are coming up with different forms of solution sets. This paper presents a snapshot of the existing research work being carried out towards the security of IoT and assesses their strengths and weaknesses. The paper also explores the current research trend and presents the latest security methods being implemented and outlines the open research issues associated with it. The paper contributes to offering an accurate picture of the effectiveness of the existing security system in IoT.
物联网的日益普及导致了各种设备的发展,以实现无处不在的应用程序的智能功能。然而,包含如此庞大的具有不同计算能力、网络协议、硬件配置等的设备池也会导致更多的安全威胁。安全专家、组织和研究人员一直在调查与物联网生态系统相关的安全问题,并提出了不同形式的解决方案集。本文简要介绍了针对物联网安全开展的现有研究工作,并评估了其优势和劣势。本文还探讨了当前的研究趋势,介绍了正在实施的最新安全方法,并概述了与之相关的开放研究问题。本文有助于准确描述物联网中现有安全系统的有效性。
{"title":"A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem","authors":"B. Khan, R. F. Olanrewaju, F. Anwar, R. N. Mir, Athaur Rahman Najeeb","doi":"10.1504/ijics.2019.10023470","DOIUrl":"https://doi.org/10.1504/ijics.2019.10023470","url":null,"abstract":"Increasing proliferation of IoT has led to an evolution of various devices for realising the smart features of ubiquitous applications. However, the inclusion of such a massive pool of devices with different computational capabilities, network protocols, hardware configurations, etc. also causes a higher number of security threats. Security professionals, organisations, and researchers are consistently investigating the security problems associated with IoT ecosystem and are coming up with different forms of solution sets. This paper presents a snapshot of the existing research work being carried out towards the security of IoT and assesses their strengths and weaknesses. The paper also explores the current research trend and presents the latest security methods being implemented and outlines the open research issues associated with it. The paper contributes to offering an accurate picture of the effectiveness of the existing security system in IoT.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing 基于云计算攻击模式和风险评估的入侵检测行为分析方法
Pub Date : 2019-08-27 DOI: 10.1504/IJICS.2019.10013935
B. Youssef, M. Nada, B. Regragui
Cloud environments are becoming easy targets for intruders looking for possible vulnerabilities to exploit as many enterprise applications and data are moving into cloud platforms. The use of current generation of IDS have various limitations on their performance making them not effective for cloud computing security and could generate a huge number of false positive alarms. Analysing intrusion based on attack patterns and risk assessment has demonstrated its efficiency in reducing the number of false alarms and optimising the IDS performances. However, the use of the same value of likelihood makes the approach lacks of real risk value determination. This paper intended to present a new probabilistic and behavioural approach for likelihood determination to quantify attacks in cloud environment, with the main task to increase the efficiency of IDS and decrease the number of alarms. Experimental results show that our approach is superior to the state-of-the-art approaches for intrusion detection in cloud.
随着许多企业应用程序和数据迁移到云平台,云环境正成为入侵者寻找潜在漏洞的容易目标。当前一代IDS的使用对其性能有各种限制,使其对云计算安全性无效,并可能产生大量误报警报。基于攻击模式和风险评估的入侵分析在减少误报数量和优化入侵检测系统性能方面具有较好的效果。然而,使用相同的似然值使得该方法缺乏真正的风险值确定。本文旨在提出一种新的概率和行为方法来确定云环境中攻击的可能性,其主要任务是提高IDS的效率并减少警报数量。实验结果表明,该方法优于当前云环境下的入侵检测方法。
{"title":"Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing","authors":"B. Youssef, M. Nada, B. Regragui","doi":"10.1504/IJICS.2019.10013935","DOIUrl":"https://doi.org/10.1504/IJICS.2019.10013935","url":null,"abstract":"Cloud environments are becoming easy targets for intruders looking for possible vulnerabilities to exploit as many enterprise applications and data are moving into cloud platforms. The use of current generation of IDS have various limitations on their performance making them not effective for cloud computing security and could generate a huge number of false positive alarms. Analysing intrusion based on attack patterns and risk assessment has demonstrated its efficiency in reducing the number of false alarms and optimising the IDS performances. However, the use of the same value of likelihood makes the approach lacks of real risk value determination. This paper intended to present a new probabilistic and behavioural approach for likelihood determination to quantify attacks in cloud environment, with the main task to increase the efficiency of IDS and decrease the number of alarms. Experimental results show that our approach is superior to the state-of-the-art approaches for intrusion detection in cloud.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116761138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Inf. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1