首页 > 最新文献

Journal of Cybersecurity and Information Management最新文献

英文 中文
Information Security Assessment in Big Data Environment using Fuzzy Logic 基于模糊逻辑的大数据环境下信息安全评估
Pub Date : 1900-01-01 DOI: 10.54216/jcim.050103
Kanika Sharma, A. Shankar, Prabhishek Singh
In recent years, it has been observed that disclosure of information leads to the risk. Without restrict the accessibility of information providing security is difficult. So, there is a demand of time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not related directly, but some of their factors indirectly affect each other. Attributes play an important role in connecting the gap among security and accessibility. In this paper, finds the main attributes of security and accessibility that impact directly and indirectly each other such as confidentiality, integrity and availability and severity. The significance of every attribute in terms of their weight is important for their effect on the overall security during the big data security life cycle process. To calculate proposed work, researchers used the Fuzzy Analytic Hierarchy Process (Fuzzy AHP).
近年来,人们观察到信息披露导致风险。没有限制信息的可访问性,提供安全是困难的。因此,填补信息的安全性和可访问性之间的差距需要时间。事实上,安全工具应该可用于提高信息的安全性和可访问性。安全性与可访问性虽然没有直接的关系,但其中的一些因素是相互间接影响的。属性在连接安全性和可访问性之间的差距方面发挥着重要作用。本文发现了安全性和可访问性之间直接或间接影响的主要属性,如保密性、完整性、可用性和严重性。在大数据安全生命周期过程中,每个属性的权重对整体安全的影响非常重要。为了计算建议的工作量,研究人员使用了模糊层次分析法(Fuzzy AHP)。
{"title":"Information Security Assessment in Big Data Environment using Fuzzy Logic","authors":"Kanika Sharma, A. Shankar, Prabhishek Singh","doi":"10.54216/jcim.050103","DOIUrl":"https://doi.org/10.54216/jcim.050103","url":null,"abstract":"In recent years, it has been observed that disclosure of information leads to the risk. Without restrict the accessibility of information providing security is difficult. So, there is a demand of time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not related directly, but some of their factors indirectly affect each other. Attributes play an important role in connecting the gap among security and accessibility. In this paper, finds the main attributes of security and accessibility that impact directly and indirectly each other such as confidentiality, integrity and availability and severity. The significance of every attribute in terms of their weight is important for their effect on the overall security during the big data security life cycle process. To calculate proposed work, researchers used the Fuzzy Analytic Hierarchy Process (Fuzzy AHP).","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131939234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
BioPay: A Secure Payment Gateway through Biometrics BioPay:通过生物识别技术的安全支付网关
Pub Date : 1900-01-01 DOI: 10.54216/jcim.070202
Gurpreet Singh, Divyanshi Kaushik, Hritik Handa, Gagandeep Kaur, Sunil K. Chawla, Ahmed A. Elngar
Due to emerging technological developments, major enhancements are taking place in the area of a secure and quick transaction. BioPay being a secure payment method is a one-step ahead. In the proposed methodology, there is no involvement of any credit or debit card or any other account information like OTP or CVV; it solely depends upon some unique identifying characteristic of a human known as biometrics. This work proposes a novel method that allows users to complete transactions quickly and securely using face and finger recognition. The transaction initiates with scanning face features and matching it with the database which in turn retrieves all the information associated with that customer account. After that, the system will scan the fingerprints of the subject and verify the transaction. This methodology can be implemented in ATMs and smartphones resulting in enhanced security and flexibility for payment purposes.
由于新兴技术的发展,在安全和快速交易领域正在发生重大改进。作为一种安全的支付方式,BioPay领先一步。在建议的方法中,没有涉及任何信用卡或借记卡或任何其他帐户信息,如OTP或CVV;它完全依赖于人类的一些独特的识别特征,即生物特征。这项工作提出了一种新颖的方法,允许用户使用面部和手指识别快速安全地完成交易。该交易首先扫描面部特征并将其与数据库进行匹配,然后检索与该客户帐户相关的所有信息。之后,系统将扫描交易主体的指纹并验证交易。这种方法可以在自动取款机和智能手机上实施,从而提高支付目的的安全性和灵活性。
{"title":"BioPay: A Secure Payment Gateway through Biometrics","authors":"Gurpreet Singh, Divyanshi Kaushik, Hritik Handa, Gagandeep Kaur, Sunil K. Chawla, Ahmed A. Elngar","doi":"10.54216/jcim.070202","DOIUrl":"https://doi.org/10.54216/jcim.070202","url":null,"abstract":"Due to emerging technological developments, major enhancements are taking place in the area of a secure and quick transaction. BioPay being a secure payment method is a one-step ahead. In the proposed methodology, there is no involvement of any credit or debit card or any other account information like OTP or CVV; it solely depends upon some unique identifying characteristic of a human known as biometrics. This work proposes a novel method that allows users to complete transactions quickly and securely using face and finger recognition. The transaction initiates with scanning face features and matching it with the database which in turn retrieves all the information associated with that customer account. After that, the system will scan the fingerprints of the subject and verify the transaction. This methodology can be implemented in ATMs and smartphones resulting in enhanced security and flexibility for payment purposes.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Analysis of Secured Permutation and Substitution based Image Encryption 基于安全置换和替换的图像加密改进分析
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120103
V. Goel, Amit Goyal
The transmission and storage of digital data raises serious security concerns as information technology evolves at a breakneck pace. To ensure the safety of the transferred data, security methods must be put in place. Encrypting an image is a method of protecting sensitive data by converting it into an unrecognizable format. The procedure includes access control, privacy, validation, and copyright protection. Cryptography, steganography, and watermarking are three distinct methods to prevent unauthorized access to digital data. Of these three methods, cryptography has emerged as one of the most important ways to ensure complete safety. Therefore, a secure and efficient cipher algorithm is required for trustworthy communication. In this work, we offer a practical Secured Asymmetric Image Cipher (SAIC) Algorithm for encrypting images with a secret key of arbitrary length. At first, the KG algorithm creates two unique keys. Both the encryption and decryption processes require a key. The experimental results reveal that the encrypted image lacks the original image's independence (NPCR 99.89%, UACI 36.89%). The suggested approach has a high encryption rate, can be implemented easily, and is computationally secure. The reproduced data validates the safety and practicability of the proposed architecture.
随着信息技术的飞速发展,数字数据的传输和存储引发了严重的安全问题。为了确保传输数据的安全,必须采取安全措施。加密图像是一种通过将图像转换为无法识别的格式来保护敏感数据的方法。该过程包括访问控制、隐私、验证和版权保护。密码学、隐写术和水印是防止未经授权访问数字数据的三种不同方法。在这三种方法中,密码学已成为确保完全安全的最重要方法之一。因此,为了实现可信通信,需要一种安全高效的密码算法。在这项工作中,我们提供了一个实用的安全非对称图像密码(SAIC)算法,用于使用任意长度的密钥对图像进行加密。首先,KG算法创建两个唯一的密钥。加密和解密过程都需要密钥。实验结果表明,加密后的图像缺乏原始图像的独立性(NPCR为99.89%,UACI为36.89%)。该方法具有加密率高、易于实现、计算安全等特点。再现的数据验证了所提体系结构的安全性和实用性。
{"title":"An Improved Analysis of Secured Permutation and Substitution based Image Encryption","authors":"V. Goel, Amit Goyal","doi":"10.54216/jcim.120103","DOIUrl":"https://doi.org/10.54216/jcim.120103","url":null,"abstract":"The transmission and storage of digital data raises serious security concerns as information technology evolves at a breakneck pace. To ensure the safety of the transferred data, security methods must be put in place. Encrypting an image is a method of protecting sensitive data by converting it into an unrecognizable format. The procedure includes access control, privacy, validation, and copyright protection. Cryptography, steganography, and watermarking are three distinct methods to prevent unauthorized access to digital data. Of these three methods, cryptography has emerged as one of the most important ways to ensure complete safety. Therefore, a secure and efficient cipher algorithm is required for trustworthy communication. In this work, we offer a practical Secured Asymmetric Image Cipher (SAIC) Algorithm for encrypting images with a secret key of arbitrary length. At first, the KG algorithm creates two unique keys. Both the encryption and decryption processes require a key. The experimental results reveal that the encrypted image lacks the original image's independence (NPCR 99.89%, UACI 36.89%). The suggested approach has a high encryption rate, can be implemented easily, and is computationally secure. The reproduced data validates the safety and practicability of the proposed architecture.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Internet of Medical Things (IoMT) Used in Pandemic Covid-19 For Healthcare Monitoring Services 医疗物联网(IoMT)在Covid-19大流行医疗监测服务中的应用研究
Pub Date : 1900-01-01 DOI: 10.54216/jcim.050201
A. Admin, Harikrishna Chavhan2, Vikas Chumber3, Vikrant Sharma4
Before Internet of things, visit or meet a doctor is based on the appointments, by tele and text communication and also interaction with patient and doctors are limited. IoMT enables medical devices remote monitoring, unleash the possibility for patients to keep safe and healthy, also made easy for physicians to deliver excellent care for patients. The capability of IoT or IoMT in infectious disease control a network of interconnected systems and Artificial intelligence, Data analytics and using omnipresent connectivity in all these networks based upon real time data can help to provide an early warning system to restraint the spread of Pandemic like situation (Covid-19 corona virus, Ebola virus, Hanta Virus etc.) and it also help in healthcare monitoring and treatment services.
在物联网之前,看医生是基于预约,通过电话和文字交流,与病人和医生的互动也很有限。IoMT实现了医疗设备的远程监控,释放了患者保持安全和健康的可能性,也使医生更容易为患者提供优质的护理。物联网或物联网在传染病控制中的能力,互联系统和人工智能的网络,数据分析和基于实时数据在所有这些网络中使用无所不在的连接,可以帮助提供早期预警系统,以限制大流行情况的传播(Covid-19冠状病毒,埃博拉病毒,汉塔病毒等),它也有助于医疗保健监测和治疗服务。
{"title":"A Study of Internet of Medical Things (IoMT) Used in Pandemic Covid-19 For Healthcare Monitoring Services","authors":"A. Admin, Harikrishna Chavhan2, Vikas Chumber3, Vikrant Sharma4","doi":"10.54216/jcim.050201","DOIUrl":"https://doi.org/10.54216/jcim.050201","url":null,"abstract":"Before Internet of things, visit or meet a doctor is based on the appointments, by tele and text communication and also interaction with patient and doctors are limited. IoMT enables medical devices remote monitoring, unleash the possibility for patients to keep safe and healthy, also made easy for physicians to deliver excellent care for patients. The capability of IoT or IoMT in infectious disease control a network of interconnected systems and Artificial intelligence, Data analytics and using omnipresent connectivity in all these networks based upon real time data can help to provide an early warning system to restraint the spread of Pandemic like situation (Covid-19 corona virus, Ebola virus, Hanta Virus etc.) and it also help in healthcare monitoring and treatment services.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Method for Enhanced Quality of Service in IoHT Task Dependency Optimization IoHT任务依赖优化中提高服务质量的改进方法
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120202
R. Doewes, Preeti Saini
Keeping a proper level of task dependency throughout the scheduling process is critical to achieving the aim of decreasing the make-span rate in Internet of Health Things (IoHT) projects. We provide a smart model strategy for effective task scheduling in the IoHT environment for e-healthcare systems by merging hybrid moth flame optimisation (HMFO) with cloud computing. The HMFO algorithm guarantees that all available resources are distributed evenly, resulting in improved quality of service (QoS). We study the Google cluster dataset to learn about the scheduling behaviours of cloud-based jobs in order to train our model. After training, an HMFO model may be used to plan activities in real time. To assess the success of our strategy, we run simulations in the CloudSim environment, taking into account crucial parameters such as resource utilisation, reaction time, and energy consumption. According to a comparative analysis, our hybrid HMFO system surpasses the alternatives in terms of reaction time, average run duration, and cost savings. Our method has proven to be effective due to the favourable effects it has had on response rates, prices, and run times. Combining IoT and cloud computing has the potential to improve healthcare delivery in a variety of ways. One unique strategy we offer for scheduling IOHT jobs is to combine a deep neural network (DNN) algorithm with the MFO technique. Job scheduling in electronic healthcare systems can be optimised with the help of our hybrid MFO-DNN algorithm by taking into account a variety of different objectives, the most important of which are lowering response times while improving resource utilisation and maintaining consistent load balances. The MFO approach searches the search space and provides early solutions, while the DNN algorithm refines and improves those first findings. In comprehensive simulations conducted in a real-world hospital setting, the hybrid MFO-DNN technique outperformed existing scheduling algorithms in terms of reaction time, resource utilisation, and load balancing. The simulated healthcare environments were as true to life as was feasible. The suggested technique has been demonstrated to be both dependable and scalable, making it appropriate for use in large-scale IOHT deployments. This study considerably enhances the state of the art in IOHT task scheduling in E healthcare systems by developing a hybrid optimisation technique that takes advantage of the strengths of both MFO and DNN. The findings indicate that this strategy has the potential to improve the quality and efficiency of healthcare delivery, which helps patients receive care that is both effective and timely.
在整个调度过程中保持适当的任务依赖关系是实现降低健康物联网(IoHT)项目制造周期率目标的关键。我们通过将混合飞蛾火焰优化(HMFO)与云计算相结合,为电子医疗系统的IoHT环境中有效的任务调度提供了一种智能模型策略。该算法保证了所有可用资源的均匀分布,从而提高了服务质量(QoS)。我们研究了Google集群数据集,以了解基于云的作业的调度行为,以训练我们的模型。训练后,HMFO模型可用于实时规划活动。为了评估我们的策略是否成功,我们在CloudSim环境中运行模拟,考虑到资源利用率、反应时间和能耗等关键参数。根据对比分析,我们的混合HMFO系统在反应时间、平均运行时间和成本节约方面优于其他替代系统。我们的方法已被证明是有效的,因为它对响应率、价格和运行时间产生了有利的影响。物联网和云计算的结合有可能以各种方式改善医疗保健服务。我们为调度IOHT作业提供的一个独特策略是将深度神经网络(DNN)算法与MFO技术相结合。在我们的混合MFO-DNN算法的帮助下,通过考虑各种不同的目标,可以优化电子医疗保健系统中的作业调度,其中最重要的是降低响应时间,同时提高资源利用率和保持一致的负载平衡。MFO方法搜索搜索空间并提供早期的解决方案,而DNN算法则对这些最初的发现进行细化和改进。在真实的医院环境中进行的综合模拟中,混合MFO-DNN技术在反应时间、资源利用率和负载平衡方面优于现有的调度算法。模拟的医疗保健环境尽可能逼真。所建议的技术已被证明既可靠又可扩展,因此适合用于大规模IOHT部署。本研究通过开发一种利用MFO和DNN优势的混合优化技术,大大提高了电子医疗系统中IOHT任务调度的最新水平。研究结果表明,该策略有可能提高医疗保健服务的质量和效率,从而帮助患者获得有效和及时的护理。
{"title":"Improved Method for Enhanced Quality of Service in IoHT Task Dependency Optimization","authors":"R. Doewes, Preeti Saini","doi":"10.54216/jcim.120202","DOIUrl":"https://doi.org/10.54216/jcim.120202","url":null,"abstract":"Keeping a proper level of task dependency throughout the scheduling process is critical to achieving the aim of decreasing the make-span rate in Internet of Health Things (IoHT) projects. We provide a smart model strategy for effective task scheduling in the IoHT environment for e-healthcare systems by merging hybrid moth flame optimisation (HMFO) with cloud computing. The HMFO algorithm guarantees that all available resources are distributed evenly, resulting in improved quality of service (QoS). We study the Google cluster dataset to learn about the scheduling behaviours of cloud-based jobs in order to train our model. After training, an HMFO model may be used to plan activities in real time. To assess the success of our strategy, we run simulations in the CloudSim environment, taking into account crucial parameters such as resource utilisation, reaction time, and energy consumption. According to a comparative analysis, our hybrid HMFO system surpasses the alternatives in terms of reaction time, average run duration, and cost savings. Our method has proven to be effective due to the favourable effects it has had on response rates, prices, and run times. Combining IoT and cloud computing has the potential to improve healthcare delivery in a variety of ways. One unique strategy we offer for scheduling IOHT jobs is to combine a deep neural network (DNN) algorithm with the MFO technique. Job scheduling in electronic healthcare systems can be optimised with the help of our hybrid MFO-DNN algorithm by taking into account a variety of different objectives, the most important of which are lowering response times while improving resource utilisation and maintaining consistent load balances. The MFO approach searches the search space and provides early solutions, while the DNN algorithm refines and improves those first findings. In comprehensive simulations conducted in a real-world hospital setting, the hybrid MFO-DNN technique outperformed existing scheduling algorithms in terms of reaction time, resource utilisation, and load balancing. The simulated healthcare environments were as true to life as was feasible. The suggested technique has been demonstrated to be both dependable and scalable, making it appropriate for use in large-scale IOHT deployments. This study considerably enhances the state of the art in IOHT task scheduling in E healthcare systems by developing a hybrid optimisation technique that takes advantage of the strengths of both MFO and DNN. The findings indicate that this strategy has the potential to improve the quality and efficiency of healthcare delivery, which helps patients receive care that is both effective and timely.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115293881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Hybrid Chaotic Technique for Protecting Medical Images 一种增强的混合混沌医学图像保护技术
Pub Date : 1900-01-01 DOI: 10.54216/jcim.100104
M. Eid, Shaimaa A. Hussien
Medical data has attracted much interest; a quick, lossless, and secure cryptosystem is required for saving and transferring images over open networks while maintaining the image's details. This paper shows how to protect medical images with an encryption method based on hybrid chaotic maps. The proposed hybrid method is constructed to deal with problems like confusion and diffusion with a large key space. The technique uses a mix of different chaos maps for a specific set of control settings. There is a complete explanation of how encryption and decryption operations work. The security analysis results showed that the suggested cryptosystem is safe from statistical, brute force, and differential attacks. Compared to already known methods, the estimated times for encryption and decryption make it likely that the proposed scheme can be applied in real-time applications.
医疗数据吸引了很多人的兴趣;在开放网络上保存和传输图像,同时保持图像的细节,需要一个快速、无损和安全的密码系统。提出了一种基于混合混沌映射的医学图像加密方法。本文提出的混合方法是为了解决大密钥空间下的混淆和扩散问题。该技术对一组特定的控制设置使用不同混沌图的混合。有关于加密和解密操作如何工作的完整解释。安全性分析结果表明,建议的密码系统在统计攻击、暴力破解攻击和差分攻击中是安全的。与已知的方法相比,加密和解密的估计时间使得该方案可以应用于实时应用。
{"title":"An Enhanced Hybrid Chaotic Technique for Protecting Medical Images","authors":"M. Eid, Shaimaa A. Hussien","doi":"10.54216/jcim.100104","DOIUrl":"https://doi.org/10.54216/jcim.100104","url":null,"abstract":"Medical data has attracted much interest; a quick, lossless, and secure cryptosystem is required for saving and transferring images over open networks while maintaining the image's details. This paper shows how to protect medical images with an encryption method based on hybrid chaotic maps. The proposed hybrid method is constructed to deal with problems like confusion and diffusion with a large key space. The technique uses a mix of different chaos maps for a specific set of control settings. There is a complete explanation of how encryption and decryption operations work. The security analysis results showed that the suggested cryptosystem is safe from statistical, brute force, and differential attacks. Compared to already known methods, the estimated times for encryption and decryption make it likely that the proposed scheme can be applied in real-time applications.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129092385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing a Secure JSON Web Token Implementation By Handling Cryptographic Key Management for JWT Signature in REST API: : A survey 通过处理REST API中JWT签名的加密密钥管理来管理安全的JSON Web令牌实现::一项调查
Pub Date : 1900-01-01 DOI: 10.54216/jcim.060101
A. Admin
JSON Web Token (JWT) is a compact and self-contained mechanism, digitally authenticated and trusted, for transmitting data between various parties. They are mainly used for implementing stateless authentication mechanisms. The Open Authorization (OAuth 2.0) implementations are using JWTs for their access tokens. OAuth 2.0 and JWT are used token frameworks or standards for authorizing access to REST APIs because of their statelessness and the signature implementation. The most important cryptographic algorithms were tested namely a symmetric algorithm HS256 (HMAC with SHA-256) and an asymmetric algorithm RS256 (RSA Signature with SHA-256) used to construct JWT for signing token based on several parameters of the speed of generating tokens, the size of tokens, time data transfer tokens and security of tokens against attacks.In this research,we propose an approach used for handling cryptographic key management for signing RS256 tokens to ensure the security of the application's architecture. JWT offer a variety of options to manage keys, the server always needs to verify the validity of the key before trusting it for verify that a JWT implementation is secure.The experimental results show It's better to use the RS256 signature method for handling cryptographic key management for signing tokens to manage a secure JWT Implementation
JSON Web令牌(JWT)是一种紧凑且自包含的机制,经过数字认证和信任,用于在各方之间传输数据。它们主要用于实现无状态身份验证机制。开放授权(OAuth 2.0)实现使用jwt作为其访问令牌。OAuth 2.0和JWT是用于授权访问REST api的令牌框架或标准,因为它们的无状态性和签名实现。测试了最重要的加密算法,即对称算法HS256(带SHA-256的HMAC)和非对称算法RS256(带SHA-256的RSA签名),用于基于生成令牌的速度、令牌的大小、数据传输令牌的时间和令牌抗攻击的安全性等几个参数构建JWT来签名令牌。在本研究中,我们提出了一种用于处理加密密钥管理的方法,用于签署RS256令牌,以确保应用程序架构的安全性。JWT提供了多种管理密钥的选项,服务器总是需要在信任密钥之前验证密钥的有效性,以验证JWT实现的安全性。实验结果表明,使用RS256签名方法处理加密密钥管理对令牌进行签名以管理安全的JWT实现效果更好
{"title":"Managing a Secure JSON Web Token Implementation By Handling Cryptographic Key Management for JWT Signature in REST API: : A survey","authors":"A. Admin","doi":"10.54216/jcim.060101","DOIUrl":"https://doi.org/10.54216/jcim.060101","url":null,"abstract":"JSON Web Token (JWT) is a compact and self-contained mechanism, digitally authenticated and trusted, for transmitting data between various parties. They are mainly used for implementing stateless authentication mechanisms. The Open Authorization (OAuth 2.0) implementations are using JWTs for their access tokens. OAuth 2.0 and JWT are used token frameworks or standards for authorizing access to REST APIs because of their statelessness and the signature implementation. The most important cryptographic algorithms were tested namely a symmetric algorithm HS256 (HMAC with SHA-256) and an asymmetric algorithm RS256 (RSA Signature with SHA-256) used to construct JWT for signing token based on several parameters of the speed of generating tokens, the size of tokens, time data transfer tokens and security of tokens against attacks.In this research,we propose an approach used for handling cryptographic key management for signing RS256 tokens to ensure the security of the application's architecture. JWT offer a variety of options to manage keys, the server always needs to verify the validity of the key before trusting it for verify that a JWT implementation is secure.The experimental results show It's better to use the RS256 signature method for handling cryptographic key management for signing tokens to manage a secure JWT Implementation","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating DDoS Attacks in Wireless Sensor Networks using Heuristic Feature Selection with Deep Learning Model 基于深度学习模型的启发式特征选择缓解无线传感器网络中的DDoS攻击
Pub Date : 1900-01-01 DOI: 10.54216/jcim.000106
A. R. W. Sait, I. Pustokhina, M. Ilayaraja
A wireless sensor network (WSN) encompasses a massive set of sensors with limited abilities for gathering sensitive data. Since security is a significant issue in WSN, there is a possibility of different types of attacks. In Distributed Denial of Service (DDOS) attack, the malicious node can adapt to several attacks, namely flooding, black hole, warm hole, etc., to interrupt the working of the WSN. The recently developed deep learning (DL) models can effectively detect DDoS attacks in the network. Therefore, this article proposes a heuristic feature selection with a Deep Learning-based DDoS (HFSDL-DDoS) attack detection model in WSN. The proposed HFSDL-DDoS technique intends to identify and categorize the occurrence of DDoS attacks in WSN. In addition, the HFSDL-DDoS technique involves the immune clonal genetic algorithm (ICGA) based feature selection (FS) approach to improve the detection performance. Moreover, a fruit fly algorithm (FFA) with bidirectional long, short-term memory (BiLSTM) based classification model is employed. The experimental analysis of the HFSDL-DDoS technique is performed, and the results are examined interms of several performance measures. The resultant experimental results pointed out the betterment of the HFSDL-DDoS technique over the other techniques.
无线传感器网络(WSN)包含大量传感器,这些传感器收集敏感数据的能力有限。由于安全是WSN的一个重要问题,因此存在不同类型攻击的可能性。在分布式拒绝服务(DDOS)攻击中,恶意节点可以适应洪水、黑洞、暖洞等几种攻击,从而中断WSN的工作。最近发展起来的深度学习(DL)模型可以有效地检测网络中的DDoS攻击。因此,本文提出了一种基于深度学习的WSN DDoS (HFSDL-DDoS)攻击检测模型的启发式特征选择。HFSDL-DDoS技术旨在对WSN中发生的DDoS攻击进行识别和分类。此外,HFSDL-DDoS技术还引入了基于免疫克隆遗传算法(ICGA)的特征选择(FS)方法来提高检测性能。此外,采用了基于双向长短期记忆(BiLSTM)分类模型的果蝇算法(FFA)。对HFSDL-DDoS技术进行了实验分析,并对实验结果进行了性能测试。实验结果表明HFSDL-DDoS技术优于其他技术。
{"title":"Mitigating DDoS Attacks in Wireless Sensor Networks using Heuristic Feature Selection with Deep Learning Model","authors":"A. R. W. Sait, I. Pustokhina, M. Ilayaraja","doi":"10.54216/jcim.000106","DOIUrl":"https://doi.org/10.54216/jcim.000106","url":null,"abstract":"A wireless sensor network (WSN) encompasses a massive set of sensors with limited abilities for gathering sensitive data. Since security is a significant issue in WSN, there is a possibility of different types of attacks. In Distributed Denial of Service (DDOS) attack, the malicious node can adapt to several attacks, namely flooding, black hole, warm hole, etc., to interrupt the working of the WSN. The recently developed deep learning (DL) models can effectively detect DDoS attacks in the network. Therefore, this article proposes a heuristic feature selection with a Deep Learning-based DDoS (HFSDL-DDoS) attack detection model in WSN. The proposed HFSDL-DDoS technique intends to identify and categorize the occurrence of DDoS attacks in WSN. In addition, the HFSDL-DDoS technique involves the immune clonal genetic algorithm (ICGA) based feature selection (FS) approach to improve the detection performance. Moreover, a fruit fly algorithm (FFA) with bidirectional long, short-term memory (BiLSTM) based classification model is employed. The experimental analysis of the HFSDL-DDoS technique is performed, and the results are examined interms of several performance measures. The resultant experimental results pointed out the betterment of the HFSDL-DDoS technique over the other techniques.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System Windows操作系统下第三方杀毒软件的必要性再评估
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090105
Faisal A. Garba, Rosemary M. Dima, A. B. Isa, A. Bello, A. Aliyu, F. U. Yarima, S. A. Ibrahim
There is a general assumption that one must purchase costly antivirus software products to defend one’s computer system. However, if one is using the Windows Operating System, the question that arises is whether one needs to purchase antivirus software or not. The Windows operating system has a market share of 31.15% behind Android with a market share of 41.56% worldwide amongst all the operating systems. This makes Windows a prime target for hacking due to its large user base. Windows 11 a recent upgrade to the Windows operating system has claimed to have taken its security to the next level. There is a need to evaluate the capability of the Windows 11 default security against antivirus evasion tools. This research investigated the capability of Windows 11 default security by evaluating it against 6 free and open-source antivirus evasion tools: TheFatRat, Venom, Paygen, Defeat Defender, Inflate and Defender Disabler. The criteria for the selection of the antivirus evasion tools were free and open source and recently updated. A research lab was set up using Oracle VirtualBox where two guest machines were installed: a Windows 11 victim machine and the Kali Linux attacking machine. The antivirus evasion tools were installed on the Kali Linux machine one at a time to generate a malware and pass it to the victim machine. Apache web server was used in holding the malicious sample for the Windows 11 victim machine to download. A score of 2 was awarded to an antivirus evasion tool that successfully evaded the Windows 11 security and created a reverse connection with the attacking machine. From the research results: TheFatRat had a 25% evasion score, Venom had 20% while the rest had a 0% evasion score. None of the payloads generated with the antivirus evasion tools was able to create a connection with the Kali Linux attacking machine. The research results imply that the default Windows 11 security is good enough to stand on its own. A third-party antivirus solution will only supplement the already good protection capability of Windows 11.
有一个普遍的假设,一个人必须购买昂贵的杀毒软件产品来保护自己的计算机系统。但是,如果使用的是Windows操作系统,那么问题是是否需要购买杀毒软件。Windows操作系统在全球所有操作系统中的市场份额为41.56%,落后于Android的市场份额为31.15%。由于其庞大的用户群,这使得Windows成为黑客攻击的首要目标。最近升级到Windows操作系统的Windows 11声称已经将其安全性提升到一个新的水平。有必要评估Windows 11默认安全性对防病毒规避工具的能力。本研究通过对6种免费开源反病毒规避工具(TheFatRat、Venom、Paygen、Defeat Defender、Inflate和Defender Disabler)进行评估,调查了Windows 11默认安全性的能力。选择反病毒逃避工具的标准是免费、开源和最近更新的。使用Oracle VirtualBox建立了一个研究实验室,其中安装了两台来宾机器:一台Windows 11受害者机器和Kali Linux攻击机器。反病毒逃避工具一次一个地安装在Kali Linux机器上,以生成恶意软件并将其传递到受害机器。使用Apache web服务器保存恶意样本,供Windows 11受害机器下载。一款防病毒规避工具获得了2分,该工具成功规避了Windows 11的安全,并与攻击机器建立了反向连接。从研究结果来看:the fatrat有25%的闪避得分,Venom有20%的闪避得分,而其余的都是0%的闪避得分。反病毒规避工具生成的有效负载都无法与Kali Linux攻击机器建立连接。研究结果表明,默认的Windows 11安全性足够好,可以独立运行。第三方防病毒解决方案只会补充Windows 11已经很好的保护功能。
{"title":"Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System","authors":"Faisal A. Garba, Rosemary M. Dima, A. B. Isa, A. Bello, A. Aliyu, F. U. Yarima, S. A. Ibrahim","doi":"10.54216/jcim.090105","DOIUrl":"https://doi.org/10.54216/jcim.090105","url":null,"abstract":"There is a general assumption that one must purchase costly antivirus software products to defend one’s computer system. However, if one is using the Windows Operating System, the question that arises is whether one needs to purchase antivirus software or not. The Windows operating system has a market share of 31.15% behind Android with a market share of 41.56% worldwide amongst all the operating systems. This makes Windows a prime target for hacking due to its large user base. Windows 11 a recent upgrade to the Windows operating system has claimed to have taken its security to the next level. There is a need to evaluate the capability of the Windows 11 default security against antivirus evasion tools. This research investigated the capability of Windows 11 default security by evaluating it against 6 free and open-source antivirus evasion tools: TheFatRat, Venom, Paygen, Defeat Defender, Inflate and Defender Disabler. The criteria for the selection of the antivirus evasion tools were free and open source and recently updated. A research lab was set up using Oracle VirtualBox where two guest machines were installed: a Windows 11 victim machine and the Kali Linux attacking machine. The antivirus evasion tools were installed on the Kali Linux machine one at a time to generate a malware and pass it to the victim machine. Apache web server was used in holding the malicious sample for the Windows 11 victim machine to download. A score of 2 was awarded to an antivirus evasion tool that successfully evaded the Windows 11 security and created a reverse connection with the attacking machine. From the research results: TheFatRat had a 25% evasion score, Venom had 20% while the rest had a 0% evasion score. None of the payloads generated with the antivirus evasion tools was able to create a connection with the Kali Linux attacking machine. The research results imply that the default Windows 11 security is good enough to stand on its own. A third-party antivirus solution will only supplement the already good protection capability of Windows 11.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Upgraded Data Security Based on Homomorphic Encryption and Aggregate Signature Method in Wireless Sensor Network 基于同态加密和聚合签名方法的无线传感器网络数据安全升级
Pub Date : 1900-01-01 DOI: 10.54216/jcim.120102
Raju Ranjan, Vinay Kumar Ahlawat
Wireless sensor networks (WSN) have been implemented in nearly every field of use because they offer a solution to practical problems that can also be affordably implemented. The sensor nodes have limited computing resources, weak batteries, and limited storage space. The environmental or physical data collected by these nodes is transmitted straight to the BS. The data transfer cost is raised due to the direct data transmission. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. Each sensor node's transmission is encrypted with cipher text generated by the Paillier homomorphic cryptosystem. In addition, the Bilinear aggregate signature method is used to create a digital signature at each sensor node. The cluster head BS is where the aggregation takes place once the cipher text and signature have been combined. Before deciding whether to accept or reject the message, the BS checks the aggregate signature. The homomorphic cryptosystem saves power because it does not perform intermediate-level or cluster-head decryption. Data integrity, authenticity, and confidentiality are all maintained while using less power with this technology. The Intel laboratory dataset is used in the implementation. When compared to current systems, the proposed SDA method requires less time and energy to calculate.
无线传感器网络(WSN)已经应用于几乎所有的使用领域,因为它们为实际问题提供了一种解决方案,并且可以负担得起。传感器节点的计算资源有限,电池性能差,存储空间有限。这些节点收集的环境或物理数据直接传输到BS。数据的直接传输增加了数据传输成本。此外,由于数据交换所需的能量增加,传感器网络的寿命缩短。因此,在无线传感器网络中利用数据聚合可以减轻传输成本负担,延长传感器网络的使用寿命。每个传感器节点的传输都使用Paillier同态密码系统生成的密文进行加密。此外,采用双线性聚合签名方法在每个传感器节点上创建一个数字签名。簇头BS是组合密文和签名后进行聚合的地方。在决定接受或拒绝消息之前,BS检查聚合签名。同态密码系统节省电力,因为它不执行中级或簇头解密。数据完整性、真实性和保密性都得到了维护,同时使用该技术的功耗更低。在实现中使用了英特尔实验室数据集。与现有系统相比,所提出的SDA方法的计算时间和能量更少。
{"title":"An Upgraded Data Security Based on Homomorphic Encryption and Aggregate Signature Method in Wireless Sensor Network","authors":"Raju Ranjan, Vinay Kumar Ahlawat","doi":"10.54216/jcim.120102","DOIUrl":"https://doi.org/10.54216/jcim.120102","url":null,"abstract":"Wireless sensor networks (WSN) have been implemented in nearly every field of use because they offer a solution to practical problems that can also be affordably implemented. The sensor nodes have limited computing resources, weak batteries, and limited storage space. The environmental or physical data collected by these nodes is transmitted straight to the BS. The data transfer cost is raised due to the direct data transmission. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. Each sensor node's transmission is encrypted with cipher text generated by the Paillier homomorphic cryptosystem. In addition, the Bilinear aggregate signature method is used to create a digital signature at each sensor node. The cluster head BS is where the aggregation takes place once the cipher text and signature have been combined. Before deciding whether to accept or reject the message, the BS checks the aggregate signature. The homomorphic cryptosystem saves power because it does not perform intermediate-level or cluster-head decryption. Data integrity, authenticity, and confidentiality are all maintained while using less power with this technology. The Intel laboratory dataset is used in the implementation. When compared to current systems, the proposed SDA method requires less time and energy to calculate.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132121616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cybersecurity and Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1