首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Telecommunication traffic through submarine cables: Security and vulnerabilities 海底电缆通信:安全性和脆弱性
Aisha Suliaman Alazri
This paper highlight the idea of submarine cables and its security trends. At the beginning , history of cables and its development have been introduced. The main structure of fiber optic have been discussed as well. Finally, threats and vulnerabilities of submarine cable introduced in details and supported by examples from the world such as natural disaster and habitats, commercial fishing, anchoring, oil and gas development.
本文重点介绍了海底电缆的思想及其安全发展趋势。首先,介绍了电缆的历史及其发展。并对光纤的主要结构进行了讨论。最后,详细介绍了海底电缆的威胁和脆弱性,并以自然灾害和栖息地、商业捕鱼、锚泊、油气开发等世界实例为佐证。
{"title":"Telecommunication traffic through submarine cables: Security and vulnerabilities","authors":"Aisha Suliaman Alazri","doi":"10.1109/ICITST.2016.7856733","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856733","url":null,"abstract":"This paper highlight the idea of submarine cables and its security trends. At the beginning , history of cables and its development have been introduced. The main structure of fiber optic have been discussed as well. Finally, threats and vulnerabilities of submarine cable introduced in details and supported by examples from the world such as natural disaster and habitats, commercial fishing, anchoring, oil and gas development.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experience-based learning for identifying sub-regions in Wireless Sensor Networks 基于经验的无线传感器网络子区域识别方法
Aiman Ghannami, C. Shao
In this paper, we propose a novel mechanism to calculate sub-regions (overlapped areas) in Wireless Sensor networks (WSNs). As the major part of WSN tasks are monitoring and reporting events in sensors' sensing range, those reported events' locations can be used, by means of convex hulls, to accumulatively learn the boundaries of those overlapped areas between the ranges of sensors. Although the proposed mechanism targeted clustered networks, the mechanism also can be used with non-clustered networks. Besides, the proposed method provides two levels of abstraction, the first level is the selection of the proper algorithm to calculate convex hulls, and the second is the selection of the clustering algorithm at implementation time. The main contribution of this work is to provide a new perspective to solve this problem in WSNs and new avenues for future research.
在本文中,我们提出了一种新的机制来计算无线传感器网络(WSNs)中的子区域(重叠区域)。由于WSN的主要任务是监测和报告传感器感知范围内的事件,因此可以利用这些报告事件的位置,通过凸包的方法来累积学习传感器范围之间重叠区域的边界。虽然提出的机制针对的是集群网络,但该机制也适用于非集群网络。此外,该方法提供了两个层次的抽象,第一级是选择合适的算法来计算凸包,第二级是在实现时选择聚类算法。本工作的主要贡献是为解决这一问题提供了一个新的视角,并为未来的研究提供了新的途径。
{"title":"Experience-based learning for identifying sub-regions in Wireless Sensor Networks","authors":"Aiman Ghannami, C. Shao","doi":"10.1109/ICITST.2016.7856722","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856722","url":null,"abstract":"In this paper, we propose a novel mechanism to calculate sub-regions (overlapped areas) in Wireless Sensor networks (WSNs). As the major part of WSN tasks are monitoring and reporting events in sensors' sensing range, those reported events' locations can be used, by means of convex hulls, to accumulatively learn the boundaries of those overlapped areas between the ranges of sensors. Although the proposed mechanism targeted clustered networks, the mechanism also can be used with non-clustered networks. Besides, the proposed method provides two levels of abstraction, the first level is the selection of the proper algorithm to calculate convex hulls, and the second is the selection of the clustering algorithm at implementation time. The main contribution of this work is to provide a new perspective to solve this problem in WSNs and new avenues for future research.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack 一种抗伽玛校正攻击的低失真QR码数字彩色图像水印方案
Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez
The use of Internet and new technologies have changed the way in which digital content is provided, unfortunately due to the ease with which such data can be copied and modified, the illegal copying of digital content has been notably increased. This problem has created the need to protect digital content to avoid the illegal use and handling of such information. The watermarking is one of the most popular technologies focused on copyright protection. This technique involves inserting a message that contains information about the copyright owner. An alternative for storing this information is the use of QR Codes (Quick Response Codes) whose maximum symbol size can encoding 4296 alphanumeric data. This paper presents a Rational Dither Modulation based watermarking scheme for QR code embedding into color images. Each watermarked image was measured with the PSNR, SSIM and MSE. Results showed that the obtained values of the used measured were into the valid ranges. Also, the proposed scheme shows robustness to gamma correction attack.
互联网和新技术的使用改变了提供数字内容的方式,不幸的是,由于这些数据很容易被复制和修改,非法复制数字内容的情况明显增加。这个问题产生了保护数字内容的需要,以避免非法使用和处理这些信息。水印技术是目前版权保护领域最流行的技术之一。该技术涉及插入包含有关版权所有者信息的消息。存储这些信息的另一种方法是使用QR码(快速响应码),其最大符号大小可以编码4296个字母数字数据。提出了一种基于理性抖动调制的彩色图像QR码嵌入水印方案。用PSNR、SSIM和MSE测量每幅水印图像。结果表明,所得到的测量值均在有效范围内。同时,该方案对伽马校正攻击具有较强的鲁棒性。
{"title":"A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack","authors":"Cynthia Lizbeth Guzman-Candelario, José Juan García-Hernández, Loreto Gonzalez-Hernandez","doi":"10.1109/ICITST.2016.7856659","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856659","url":null,"abstract":"The use of Internet and new technologies have changed the way in which digital content is provided, unfortunately due to the ease with which such data can be copied and modified, the illegal copying of digital content has been notably increased. This problem has created the need to protect digital content to avoid the illegal use and handling of such information. The watermarking is one of the most popular technologies focused on copyright protection. This technique involves inserting a message that contains information about the copyright owner. An alternative for storing this information is the use of QR Codes (Quick Response Codes) whose maximum symbol size can encoding 4296 alphanumeric data. This paper presents a Rational Dither Modulation based watermarking scheme for QR code embedding into color images. Each watermarked image was measured with the PSNR, SSIM and MSE. Results showed that the obtained values of the used measured were into the valid ranges. Also, the proposed scheme shows robustness to gamma correction attack.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features 使用轻量级功能提高基于搜索引擎的反网络钓鱼解决方案的准确性
G. Varshney, M. Misra, P. Atrey
A drawback of the Search Engine (SE) based anti-phishing technique is that authentic websites that are newly launched over the web are classified as phishing websites due to their low ranking. This causes a noticeable reduction in the True Negative Rate (TNR) of such schemes. Some SE based techniques use other complex anti-phishing techniques or features in combination to increase the TNR which results in higher accuracy. However, such an addition dilutes the importance of SE based techniques, which are intended to make anti-phishing lightweight, client side implementable and efficient. In this paper, we study a set of lightweight features including https, digits in domain name and Google Safe Browsing (GSB) API check, and the effect of their addition to the results of a SE based solution. An eventual effect on the accuracy of the existing SE based schemes is also reflected in this paper. A total shift of nearly 96% from False Positive Rate (FPR) to TNR is recorded with a slight decrease of 0.1% in True Positive Rate (TPR), thus increasing the accuracy by 3.28%.
基于搜索引擎(SE)的反钓鱼技术的缺点是,在网络上新推出的真实网站由于排名较低而被归类为钓鱼网站。这导致此类计划的真负率(TNR)显著降低。一些基于SE的技术结合使用其他复杂的反网络钓鱼技术或特性来增加TNR,从而提高准确性。然而,这样的添加削弱了基于SE的技术的重要性,这些技术旨在使反网络钓鱼变得轻量级、客户端可实现且高效。在本文中,我们研究了一组轻量级特性,包括https,域名中的数字和谷歌安全浏览(GSB) API检查,以及它们的加入对基于SE的解决方案的结果的影响。本文还反映了对现有基于SE的方案的精度的最终影响。从假阳性率(False Positive Rate, FPR)到TNR的总偏移量接近96%,而真阳性率(True Positive Rate, TPR)略有下降0.1%,从而提高了3.28%的准确率。
{"title":"Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features","authors":"G. Varshney, M. Misra, P. Atrey","doi":"10.1109/ICITST.2016.7856731","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856731","url":null,"abstract":"A drawback of the Search Engine (SE) based anti-phishing technique is that authentic websites that are newly launched over the web are classified as phishing websites due to their low ranking. This causes a noticeable reduction in the True Negative Rate (TNR) of such schemes. Some SE based techniques use other complex anti-phishing techniques or features in combination to increase the TNR which results in higher accuracy. However, such an addition dilutes the importance of SE based techniques, which are intended to make anti-phishing lightweight, client side implementable and efficient. In this paper, we study a set of lightweight features including https, digits in domain name and Google Safe Browsing (GSB) API check, and the effect of their addition to the results of a SE based solution. An eventual effect on the accuracy of the existing SE based schemes is also reflected in this paper. A total shift of nearly 96% from False Positive Rate (FPR) to TNR is recorded with a slight decrease of 0.1% in True Positive Rate (TPR), thus increasing the accuracy by 3.28%.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning History Transition Graphs for understanding the programming learning situations 学习历史过渡图用于理解编程学习情况
H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera
This research project aims at enabling easier understanding of a learning situation on the basis of a student's learning process (compile error history) in programming exercise currently conducted at universities. We express transition of learning history of a student in graph form of time series (we call it Learning History Transition Graph (LHTG)). Facilitators or a learner can refer to an LHTG along with additional information regarding the learner. Moreover, this paper describes a prototype of the support system for grasping the learning situation introducing LHTG along with the flow of our support. Application of this system enables a novel learning support with an emphasis on context.
这个研究项目的目的是使学生更容易理解目前在大学进行的编程练习的学习过程(编译错误历史)的基础上的学习情况。我们用时间序列的图形形式来表示学生学习历史的过渡(我们称之为学习历史过渡图(LHTG))。辅导员或学习者可以参考LHTG以及有关学习者的其他信息。此外,本文还描述了一个用于掌握学习情况的支持系统的原型,并介绍了LHTG以及我们的支持流程。该系统的应用提供了一种强调上下文的新颖学习支持。
{"title":"Learning History Transition Graphs for understanding the programming learning situations","authors":"H. Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, H. Kaminaga, Y. Miyadera","doi":"10.1109/ICITST.2016.7856758","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856758","url":null,"abstract":"This research project aims at enabling easier understanding of a learning situation on the basis of a student's learning process (compile error history) in programming exercise currently conducted at universities. We express transition of learning history of a student in graph form of time series (we call it Learning History Transition Graph (LHTG)). Facilitators or a learner can refer to an LHTG along with additional information regarding the learner. Moreover, this paper describes a prototype of the support system for grasping the learning situation introducing LHTG along with the flow of our support. Application of this system enables a novel learning support with an emphasis on context.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks 基于集群的无线传感器网络智能动态连通性控制算法
S. M. Jameii, M. Maadani
Connectivity and energy efficiency are two important issues in wireless sensor networks. Clustering is a mechanism to organize the sensor nodes into clusters and manage the connectivity and energy consumption of the network. In this paper, we consider cluster-based wireless sensor network and propose a Connectivity Control Algorithm based on Learning Automata called CCALA. This algorithm dynamically adjusts the transmission radius of sensor nodes to maintain the desirable connectivity. The simulation results demonstrate the efficiency of the proposed algorithm in terms of average transmission radius of nodes, percentage of connected nodes, balanced energy consumption in the network and network lifetime.
连接和能源效率是无线传感器网络中的两个重要问题。聚类是一种将传感器节点组织成簇并管理网络连通性和能耗的机制。本文考虑基于集群的无线传感器网络,提出了一种基于学习自动机(CCALA)的连接控制算法。该算法动态调整传感器节点的传输半径以保持理想的连通性。仿真结果表明,该算法在节点平均传输半径、连接节点百分比、网络平衡能耗和网络生存时间等方面具有较高的效率。
{"title":"Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks","authors":"S. M. Jameii, M. Maadani","doi":"10.1109/ICITST.2016.7856744","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856744","url":null,"abstract":"Connectivity and energy efficiency are two important issues in wireless sensor networks. Clustering is a mechanism to organize the sensor nodes into clusters and manage the connectivity and energy consumption of the network. In this paper, we consider cluster-based wireless sensor network and propose a Connectivity Control Algorithm based on Learning Automata called CCALA. This algorithm dynamically adjusts the transmission radius of sensor nodes to maintain the desirable connectivity. The simulation results demonstrate the efficiency of the proposed algorithm in terms of average transmission radius of nodes, percentage of connected nodes, balanced energy consumption in the network and network lifetime.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure cloud distributed file system 安全的云分布式文件系统
Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang
Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be layered transparently on existing public cloud storage infrastructure. Our approach combines secret sharing and information dispersal algorithm with more flexible authentication and access control security measures to provide secure storage for enterprise data in the cloud. Our proposed architecture supports a clear separation of roles of storage owner and information owner.
传统的数据保护方法受到云的特定性质和体系结构的挑战。随着网络攻击者的日益成熟和密码分析技术的进步,仅靠加密已不足以确保数据安全。因此,需要一种更具适应性和灵活性的数据安全方法。在本文中,我们介绍了一个安全的分布式文件系统,它可以透明地分层在现有的公共云存储基础设施上。我们的方法将秘密共享和信息分散算法与更灵活的身份验证和访问控制安全措施相结合,为企业数据在云中提供安全存储。我们建议的体系结构支持存储所有者和信息所有者角色的清晰分离。
{"title":"Secure cloud distributed file system","authors":"Kheng Kok Mar, Zhengqing Hu, C. Y. Law, Meifen Wang","doi":"10.1109/ICITST.2016.7856692","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856692","url":null,"abstract":"Traditional methods of securing data are challenged by specific nature and architecture of cloud. With increasing sophistication of cyber attackers and advancement of cryptanalysis techniques, encryption alone is not sufficient to ensure data security. A more adaptive and flexible approach to data security is thus required. In this paper, we introduce a secure distributed file system which can be layered transparently on existing public cloud storage infrastructure. Our approach combines secret sharing and information dispersal algorithm with more flexible authentication and access control security measures to provide secure storage for enterprise data in the cloud. Our proposed architecture supports a clear separation of roles of storage owner and information owner.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131603189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Robust chaos-based stream-cipher for secure public communication channels 用于安全公共通信信道的鲁棒混沌流密码
Ons Jallouli, S. E. Assad, M. Chetto
In this paper, we propose a novel stream cipher based on a chaotic system. In order to get the cipher text, the plain text is simply XORed with the key-stream generated by a strong pseudo chaotic number generator (PCNG). Then, all the security of the system is based on the used PCNG. The structure of the proposed PCNG includes two chaotic maps which are weakly coupled by a predefined matrix and integrates a swap function. The PCNG passes all statistical NIST's randomness tests. Also, analysis and experimental results show that the proposed stream cipher has a large key space, a high key sensitivity, and can resist against chosen-plaintext attack and chosen-ciphertext attack. Indeed, for each new execution of the system using the same secret key, the generated key-stream is different due to the IV-setup function. The computing performance of the proposed system is comparable to the main algorithms of eStream such as Rabbit and HC-128.
本文提出了一种新的基于混沌系统的流密码。为了获得密文,只需将明文与强伪混沌数发生器(PCNG)生成的密钥流进行xor即可。然后,系统的所有安全性都是基于使用的PCNG。所提出的PCNG结构包括两个混沌映射,它们通过预定义矩阵弱耦合并集成交换函数。PCNG通过所有统计NIST的随机性测试。分析和实验结果表明,所提出的流密码具有密钥空间大、密钥灵敏度高的特点,能够抵御选择明文攻击和选择密文攻击。实际上,对于使用相同密钥的系统的每次新执行,由于IV-setup功能,生成的密钥流是不同的。该系统的计算性能可与eStream的主要算法Rabbit和HC-128相媲美。
{"title":"Robust chaos-based stream-cipher for secure public communication channels","authors":"Ons Jallouli, S. E. Assad, M. Chetto","doi":"10.1109/ICITST.2016.7856658","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856658","url":null,"abstract":"In this paper, we propose a novel stream cipher based on a chaotic system. In order to get the cipher text, the plain text is simply XORed with the key-stream generated by a strong pseudo chaotic number generator (PCNG). Then, all the security of the system is based on the used PCNG. The structure of the proposed PCNG includes two chaotic maps which are weakly coupled by a predefined matrix and integrates a swap function. The PCNG passes all statistical NIST's randomness tests. Also, analysis and experimental results show that the proposed stream cipher has a large key space, a high key sensitivity, and can resist against chosen-plaintext attack and chosen-ciphertext attack. Indeed, for each new execution of the system using the same secret key, the generated key-stream is different due to the IV-setup function. The computing performance of the proposed system is comparable to the main algorithms of eStream such as Rabbit and HC-128.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A cryptographic approach for secure client - server chat application using public key infrastructure (PKI) 基于公钥基础设施(PKI)的安全客户端-服务器聊天应用的加密方法
Isil Karabey, Gamze Akman
Nowadays, while the popularity of chat applications increases, this popularity brings some security problems with it. A variety of authentication mechanisms and encrypting methods are suggested and applied between server and client to minimize the increasing security problems in literature and marketing companies. In this study, various security measures have been considered for instant messaging applications, a java based client-server chat application developed by Professor Dan Boneh [1] and his assistants from Stanford University has been made secure and a secured chat application model which has three steps has been developed. At the first step, server has been identified itself to certificate authority and password authentication procedure has been performed to identify client itself to server. The second step is called as connection and client connects to chat room via ticket granting ticket (TGT) request in this step. Messages written by clients are sent to server cryptically through symmetric encryption method Advanced Encryption Standard (AES) in the third step which is called as encrypted messaging too. Source code of this application is accessible to everyone from the reference [9].
如今,随着聊天应用程序的普及,这种普及带来了一些安全问题。在服务器和客户端之间建议并应用各种身份验证机制和加密方法,以最大限度地减少文献和营销公司中日益增加的安全问题。在本研究中,对即时通讯应用程序考虑了各种安全措施,对斯坦福大学Dan Boneh教授[1]及其助手开发的基于java的客户端-服务器聊天应用程序进行了安全保护,并开发了一个分为三个步骤的安全聊天应用程序模型。在第一步中,服务器已将自己标识为证书颁发机构,并执行密码身份验证过程以将客户端本身标识为服务器。第二步称为连接,客户端在此步骤中通过票据授予(TGT)请求连接到聊天室。客户端编写的消息通过对称加密方法AES (Advanced encryption Standard,高级加密标准)加密发送给服务器,第三步也称为加密消息。每个人都可以从参考文献[9]中获得该应用程序的源代码。
{"title":"A cryptographic approach for secure client - server chat application using public key infrastructure (PKI)","authors":"Isil Karabey, Gamze Akman","doi":"10.1109/ICITST.2016.7856750","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856750","url":null,"abstract":"Nowadays, while the popularity of chat applications increases, this popularity brings some security problems with it. A variety of authentication mechanisms and encrypting methods are suggested and applied between server and client to minimize the increasing security problems in literature and marketing companies. In this study, various security measures have been considered for instant messaging applications, a java based client-server chat application developed by Professor Dan Boneh [1] and his assistants from Stanford University has been made secure and a secured chat application model which has three steps has been developed. At the first step, server has been identified itself to certificate authority and password authentication procedure has been performed to identify client itself to server. The second step is called as connection and client connects to chat room via ticket granting ticket (TGT) request in this step. Messages written by clients are sent to server cryptically through symmetric encryption method Advanced Encryption Standard (AES) in the third step which is called as encrypted messaging too. Source code of this application is accessible to everyone from the reference [9].","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123191849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD) 阿布扎比卫生局移动电子服务的隐私要求(HAAD)
A. Khattak, Farkhund Iqbal, P. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin
The Health Authority - Abu Dhabi (HAAD) mobile e-Service is a smartphone or smart device installed with the HAAD mobile app. This connects to one or more e-services at the HAAD Cloud to facilitate healthcare services for the residents at the Emirate of Abu Dhabi in the United Arab Emirates (UAE). A mobile device in this context can be effectively considered Internet of Things (IoT), which can provide advanced online services to both healthcare provider and requestor under the control and monitor of the HAAD. Health information is among the most sensitive information of an individual that can be collected and shared. The information that needs to be protected in the healthcare sector is often referred to as Protected Health Information (PHI). Service providers with a good reputation for privacy protection will find it easier to build a trusted relationship with their users. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines a set of security and privacy rules to be followed by healthcare providers in the United States of America. The HIPAA standards are designed for protecting health information. This paper discusses related privacy requirements for Mobile e-Service at the HAAD in accordance with the HIPAA privacy requirements.
阿布扎比卫生局(HAAD)移动电子服务是安装了HAAD移动应用程序的智能手机或智能设备。它连接到HAAD云上的一个或多个电子服务,以促进阿拉伯联合酋长国(阿联酋)阿布扎比酋长国居民的医疗保健服务。在这种情况下,可以有效地将移动设备视为物联网(IoT),它可以在HAAD的控制和监视下为医疗保健提供者和请求者提供高级在线服务。健康信息是可收集和共享的个人最敏感信息之一。医疗保健部门中需要保护的信息通常称为受保护的健康信息(PHI)。在隐私保护方面有良好声誉的服务提供商会发现与用户建立信任关系更容易。1996年《健康保险流通与责任法案》(HIPAA)定义了一套美利坚合众国医疗保健提供者应遵守的安全和隐私规则。HIPAA标准是为保护健康信息而设计的。本文根据HIPAA的私隐要求,讨论民政事务总署对流动电子服务的相关私隐要求。
{"title":"Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)","authors":"A. Khattak, Farkhund Iqbal, P. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin","doi":"10.1109/ICITST.2016.7856697","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856697","url":null,"abstract":"The Health Authority - Abu Dhabi (HAAD) mobile e-Service is a smartphone or smart device installed with the HAAD mobile app. This connects to one or more e-services at the HAAD Cloud to facilitate healthcare services for the residents at the Emirate of Abu Dhabi in the United Arab Emirates (UAE). A mobile device in this context can be effectively considered Internet of Things (IoT), which can provide advanced online services to both healthcare provider and requestor under the control and monitor of the HAAD. Health information is among the most sensitive information of an individual that can be collected and shared. The information that needs to be protected in the healthcare sector is often referred to as Protected Health Information (PHI). Service providers with a good reputation for privacy protection will find it easier to build a trusted relationship with their users. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines a set of security and privacy rules to be followed by healthcare providers in the United States of America. The HIPAA standards are designed for protecting health information. This paper discusses related privacy requirements for Mobile e-Service at the HAAD in accordance with the HIPAA privacy requirements.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1