首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
A cryptographic approach for secure client - server chat application using public key infrastructure (PKI) 基于公钥基础设施(PKI)的安全客户端-服务器聊天应用的加密方法
Isil Karabey, Gamze Akman
Nowadays, while the popularity of chat applications increases, this popularity brings some security problems with it. A variety of authentication mechanisms and encrypting methods are suggested and applied between server and client to minimize the increasing security problems in literature and marketing companies. In this study, various security measures have been considered for instant messaging applications, a java based client-server chat application developed by Professor Dan Boneh [1] and his assistants from Stanford University has been made secure and a secured chat application model which has three steps has been developed. At the first step, server has been identified itself to certificate authority and password authentication procedure has been performed to identify client itself to server. The second step is called as connection and client connects to chat room via ticket granting ticket (TGT) request in this step. Messages written by clients are sent to server cryptically through symmetric encryption method Advanced Encryption Standard (AES) in the third step which is called as encrypted messaging too. Source code of this application is accessible to everyone from the reference [9].
如今,随着聊天应用程序的普及,这种普及带来了一些安全问题。在服务器和客户端之间建议并应用各种身份验证机制和加密方法,以最大限度地减少文献和营销公司中日益增加的安全问题。在本研究中,对即时通讯应用程序考虑了各种安全措施,对斯坦福大学Dan Boneh教授[1]及其助手开发的基于java的客户端-服务器聊天应用程序进行了安全保护,并开发了一个分为三个步骤的安全聊天应用程序模型。在第一步中,服务器已将自己标识为证书颁发机构,并执行密码身份验证过程以将客户端本身标识为服务器。第二步称为连接,客户端在此步骤中通过票据授予(TGT)请求连接到聊天室。客户端编写的消息通过对称加密方法AES (Advanced encryption Standard,高级加密标准)加密发送给服务器,第三步也称为加密消息。每个人都可以从参考文献[9]中获得该应用程序的源代码。
{"title":"A cryptographic approach for secure client - server chat application using public key infrastructure (PKI)","authors":"Isil Karabey, Gamze Akman","doi":"10.1109/ICITST.2016.7856750","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856750","url":null,"abstract":"Nowadays, while the popularity of chat applications increases, this popularity brings some security problems with it. A variety of authentication mechanisms and encrypting methods are suggested and applied between server and client to minimize the increasing security problems in literature and marketing companies. In this study, various security measures have been considered for instant messaging applications, a java based client-server chat application developed by Professor Dan Boneh [1] and his assistants from Stanford University has been made secure and a secured chat application model which has three steps has been developed. At the first step, server has been identified itself to certificate authority and password authentication procedure has been performed to identify client itself to server. The second step is called as connection and client connects to chat room via ticket granting ticket (TGT) request in this step. Messages written by clients are sent to server cryptically through symmetric encryption method Advanced Encryption Standard (AES) in the third step which is called as encrypted messaging too. Source code of this application is accessible to everyone from the reference [9].","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123191849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Web security in the finance sector 金融领域的网络安全
Tiago Vieira, C. Serrão
Nowadays, information security is an increasing concern in institutions and organizations. This concern is even greater in the finance sector, not only because the financial amount involved but also clients and organization's private and sensitive information. As a way to test security in infrastructures, networks, deployed web applications and many other assets, organizations have been performing penetration testing (pentest) which simulates an attacker's behavior in a controlled environment in order to identify its vulnerabilities. This article focusses on the analysis of the results of security audits conducted on several financial web applications from one institution with aid of automatic tools in order to assess their web applications security level. To help in security matters, many organizations build security frameworks for vulnerability assessment, security assessment, threat modeling, penetration testing, risk management and many more. As for penetration testing, organizations such as OWASP provide vulnerability and security information, a testing methodology, risk analysis and penetration testing tools.
如今,信息安全在机构和组织中越来越受到关注。在金融领域,这种担忧甚至更大,不仅因为涉及的财务金额,而且还涉及客户和组织的私人和敏感信息。作为一种测试基础设施、网络、已部署的web应用程序和许多其他资产安全性的方法,组织一直在执行渗透测试(pentest),它在受控环境中模拟攻击者的行为,以识别其漏洞。本文重点分析了使用自动工具对一家机构的几个金融web应用程序进行安全审计的结果,以评估其web应用程序的安全级别。为了帮助解决安全问题,许多组织为漏洞评估、安全评估、威胁建模、渗透测试、风险管理等构建了安全框架。至于渗透测试,像OWASP这样的组织提供了漏洞和安全信息、测试方法、风险分析和渗透测试工具。
{"title":"Web security in the finance sector","authors":"Tiago Vieira, C. Serrão","doi":"10.1109/ICITST.2016.7856707","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856707","url":null,"abstract":"Nowadays, information security is an increasing concern in institutions and organizations. This concern is even greater in the finance sector, not only because the financial amount involved but also clients and organization's private and sensitive information. As a way to test security in infrastructures, networks, deployed web applications and many other assets, organizations have been performing penetration testing (pentest) which simulates an attacker's behavior in a controlled environment in order to identify its vulnerabilities. This article focusses on the analysis of the results of security audits conducted on several financial web applications from one institution with aid of automatic tools in order to assess their web applications security level. To help in security matters, many organizations build security frameworks for vulnerability assessment, security assessment, threat modeling, penetration testing, risk management and many more. As for penetration testing, organizations such as OWASP provide vulnerability and security information, a testing methodology, risk analysis and penetration testing tools.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129948009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD) 阿布扎比卫生局移动电子服务的隐私要求(HAAD)
A. Khattak, Farkhund Iqbal, P. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin
The Health Authority - Abu Dhabi (HAAD) mobile e-Service is a smartphone or smart device installed with the HAAD mobile app. This connects to one or more e-services at the HAAD Cloud to facilitate healthcare services for the residents at the Emirate of Abu Dhabi in the United Arab Emirates (UAE). A mobile device in this context can be effectively considered Internet of Things (IoT), which can provide advanced online services to both healthcare provider and requestor under the control and monitor of the HAAD. Health information is among the most sensitive information of an individual that can be collected and shared. The information that needs to be protected in the healthcare sector is often referred to as Protected Health Information (PHI). Service providers with a good reputation for privacy protection will find it easier to build a trusted relationship with their users. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines a set of security and privacy rules to be followed by healthcare providers in the United States of America. The HIPAA standards are designed for protecting health information. This paper discusses related privacy requirements for Mobile e-Service at the HAAD in accordance with the HIPAA privacy requirements.
阿布扎比卫生局(HAAD)移动电子服务是安装了HAAD移动应用程序的智能手机或智能设备。它连接到HAAD云上的一个或多个电子服务,以促进阿拉伯联合酋长国(阿联酋)阿布扎比酋长国居民的医疗保健服务。在这种情况下,可以有效地将移动设备视为物联网(IoT),它可以在HAAD的控制和监视下为医疗保健提供者和请求者提供高级在线服务。健康信息是可收集和共享的个人最敏感信息之一。医疗保健部门中需要保护的信息通常称为受保护的健康信息(PHI)。在隐私保护方面有良好声誉的服务提供商会发现与用户建立信任关系更容易。1996年《健康保险流通与责任法案》(HIPAA)定义了一套美利坚合众国医疗保健提供者应遵守的安全和隐私规则。HIPAA标准是为保护健康信息而设计的。本文根据HIPAA的私隐要求,讨论民政事务总署对流动电子服务的相关私隐要求。
{"title":"Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)","authors":"A. Khattak, Farkhund Iqbal, P. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin","doi":"10.1109/ICITST.2016.7856697","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856697","url":null,"abstract":"The Health Authority - Abu Dhabi (HAAD) mobile e-Service is a smartphone or smart device installed with the HAAD mobile app. This connects to one or more e-services at the HAAD Cloud to facilitate healthcare services for the residents at the Emirate of Abu Dhabi in the United Arab Emirates (UAE). A mobile device in this context can be effectively considered Internet of Things (IoT), which can provide advanced online services to both healthcare provider and requestor under the control and monitor of the HAAD. Health information is among the most sensitive information of an individual that can be collected and shared. The information that needs to be protected in the healthcare sector is often referred to as Protected Health Information (PHI). Service providers with a good reputation for privacy protection will find it easier to build a trusted relationship with their users. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) defines a set of security and privacy rules to be followed by healthcare providers in the United States of America. The HIPAA standards are designed for protecting health information. This paper discusses related privacy requirements for Mobile e-Service at the HAAD in accordance with the HIPAA privacy requirements.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Structural improvements of chaotic PRNG implementations 混沌PRNG实现的结构改进
Gabriele Spenger, J. Keller
Chaotic functions have been announced in the literature as promising for implementing low complexity pseudo-random number generators (PRNGs) required e.g. for RFID security applications. They combine good theoretical statistical properties with a computationally simple algorithm. Unfortunately, actual implementations with finite number precision show a disappointing behavior compared to the mathematical theory. This results for example in comparably short cycles in the state space graph, which lead to a repetition of the generated pseudo random values after a small number of iterations. This paper presents a simple way to improve the state space structure of chaotic PRNGs by using a different parametrization of the chaotic function at certain iterations and hereby breaking out of these cycles. This approach reduces this aspect of the weakness of such implementations, which we demonstrate with several examples.
混沌函数已经在文献中被宣布为实现低复杂度伪随机数生成器(prng)所需要的,例如RFID安全应用。他们结合了良好的理论统计性质和计算简单的算法。不幸的是,与数学理论相比,有限数字精度的实际实现显示出令人失望的行为。例如,这会导致状态空间图中相对较短的周期,从而导致在少量迭代之后重复生成的伪随机值。本文提出了一种简单的改进混沌prng状态空间结构的方法,即在某些迭代处对混沌函数进行不同的参数化,从而打破这些循环。这种方法减少了这种实现在这方面的弱点,我们将用几个例子来证明这一点。
{"title":"Structural improvements of chaotic PRNG implementations","authors":"Gabriele Spenger, J. Keller","doi":"10.1109/ICITST.2016.7856754","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856754","url":null,"abstract":"Chaotic functions have been announced in the literature as promising for implementing low complexity pseudo-random number generators (PRNGs) required e.g. for RFID security applications. They combine good theoretical statistical properties with a computationally simple algorithm. Unfortunately, actual implementations with finite number precision show a disappointing behavior compared to the mathematical theory. This results for example in comparably short cycles in the state space graph, which lead to a repetition of the generated pseudo random values after a small number of iterations. This paper presents a simple way to improve the state space structure of chaotic PRNGs by using a different parametrization of the chaotic function at certain iterations and hereby breaking out of these cycles. This approach reduces this aspect of the weakness of such implementations, which we demonstrate with several examples.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing 用于保护隐私的多客户端云审计的私有信息检索和可搜索加密
Louis Tajan, D. Westhoff, Christian A. Reuter, Frederik Armknecht
In the work at hand, we combine a Private Information Retrieval (PIR) protocol with Somewhat Homomorphic Encryption (SHE) and use Searchable Encryption (SE) with the objective to provide security and confidentiality features for a third party cloud security audit. During the auditing process, a third party auditor will act on behalf of a cloud service user to validate the security requirements performed by a cloud service provider. Our concrete contribution consists of developing a PIR protocol which is proceeding directly on a log database of encrypted data and allowing to retrieve a sum or a product of multiple encrypted elements. Subsequently, we concretely apply our new form of PIR protocol to a cloud audit use case where searchable encryption is employed to allow additional confidentiality requirements to the privacy of the user. Exemplarily we are considering and evaluating an audit of client accesses to a controlled resource provided by a cloud service provider.
在手头的工作中,我们将私有信息检索(PIR)协议与某种同态加密(SHE)结合起来,并使用可搜索加密(SE),目的是为第三方云安全审计提供安全和机密性特性。在审计过程中,第三方审计员将代表云服务用户验证云服务提供商执行的安全需求。我们的具体贡献包括开发一个PIR协议,该协议直接在加密数据的日志数据库上进行处理,并允许检索多个加密元素的总和或乘积。随后,我们将新形式的PIR协议具体应用于云审计用例,其中使用可搜索加密来允许对用户隐私的额外机密性要求。例如,我们正在考虑和评估对客户访问由云服务提供商提供的受控资源的审计。
{"title":"Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing","authors":"Louis Tajan, D. Westhoff, Christian A. Reuter, Frederik Armknecht","doi":"10.1109/ICITST.2016.7856690","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856690","url":null,"abstract":"In the work at hand, we combine a Private Information Retrieval (PIR) protocol with Somewhat Homomorphic Encryption (SHE) and use Searchable Encryption (SE) with the objective to provide security and confidentiality features for a third party cloud security audit. During the auditing process, a third party auditor will act on behalf of a cloud service user to validate the security requirements performed by a cloud service provider. Our concrete contribution consists of developing a PIR protocol which is proceeding directly on a log database of encrypted data and allowing to retrieve a sum or a product of multiple encrypted elements. Subsequently, we concretely apply our new form of PIR protocol to a cloud audit use case where searchable encryption is employed to allow additional confidentiality requirements to the privacy of the user. Exemplarily we are considering and evaluating an audit of client accesses to a controlled resource provided by a cloud service provider.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Machine learning classification model for Network based Intrusion Detection System 基于网络的入侵检测系统机器学习分类模型
Sanjay Kumar, A. Viinikainen, T. Hämäläinen
With an enormous increase in number of mobile users, mobile threats are also growing rapidly. Mobile malwares can lead to several cybersecurity threats i.e. stealing sensitive information, installing backdoors, ransomware attacks and sending premium SMSs etc. Previous studies have shown that due to the sophistication of threats and tailored techniques to avoid detection, not every antivirus system is capable of detecting advance threats. However, an extra layer of security at the network side can protect users from these advanced threats by analyzing the traffic patterns. To detect these threats, this paper proposes and evaluates, a Machine Learning (ML) based model for Network based Intrusion Detection Systems (NIDS). In this research, several supervised ML classifiers were built using data-sets containing labeled instances of network traffic features generated by several malicious and benign applications. The focus of this research is on Android based malwares due to its global share in mobile malware and popularity among users. Based on the evaluation results, the model was able to detect known and unknown threats with the accuracy of up to 99.4%. This ML model can also be integrated with traditional intrusion detection systems in order to detect advanced threats and reduce false positives.
随着移动用户数量的大量增加,移动威胁也在迅速增长。移动恶意软件可能导致多种网络安全威胁,例如窃取敏感信息、安装后门、勒索软件攻击和发送收费短信等。先前的研究表明,由于威胁的复杂性和量身定制的技术来避免检测,并不是每个防病毒系统都能够检测到高级威胁。然而,网络端的额外安全层可以通过分析流量模式来保护用户免受这些高级威胁。为了检测这些威胁,本文提出并评估了一种基于机器学习的网络入侵检测系统(NIDS)模型。在本研究中,使用包含由几个恶意和良性应用程序生成的网络流量特征的标记实例的数据集构建了几个有监督的ML分类器。这项研究的重点是基于Android的恶意软件,因为它在全球移动恶意软件中的份额和受欢迎程度。根据评估结果,该模型能够检测已知和未知威胁,准确率高达99.4%。该机器学习模型还可以与传统的入侵检测系统集成,以检测高级威胁并减少误报。
{"title":"Machine learning classification model for Network based Intrusion Detection System","authors":"Sanjay Kumar, A. Viinikainen, T. Hämäläinen","doi":"10.1109/ICITST.2016.7856705","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856705","url":null,"abstract":"With an enormous increase in number of mobile users, mobile threats are also growing rapidly. Mobile malwares can lead to several cybersecurity threats i.e. stealing sensitive information, installing backdoors, ransomware attacks and sending premium SMSs etc. Previous studies have shown that due to the sophistication of threats and tailored techniques to avoid detection, not every antivirus system is capable of detecting advance threats. However, an extra layer of security at the network side can protect users from these advanced threats by analyzing the traffic patterns. To detect these threats, this paper proposes and evaluates, a Machine Learning (ML) based model for Network based Intrusion Detection Systems (NIDS). In this research, several supervised ML classifiers were built using data-sets containing labeled instances of network traffic features generated by several malicious and benign applications. The focus of this research is on Android based malwares due to its global share in mobile malware and popularity among users. Based on the evaluation results, the model was able to detect known and unknown threats with the accuracy of up to 99.4%. This ML model can also be integrated with traditional intrusion detection systems in order to detect advanced threats and reduce false positives.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117300412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Privacy-sensitive data in connected cars 联网汽车中的隐私敏感数据
T. Nawrath, D. Fischer, B. Markscheffel
Our research work presents findings from literature review and expert interviews with more detailed knowledge of privacy-sensitive data in connected cars. At first we explore which privacy-sensitive data are collected in cars and how they are collected. Then we describe who receives the data, for what purposes and how car users can determine if their privacy-sensitive data are being collected and used. Furthermore, we analyze exemplary security measures for privacy-sensitive data in connected cars and consider which threats can be prevented or mitigated by these measures. Examples of measures to improve the transparency and security of privacy-sensitive data in connected cars are presented.
我们的研究成果来自文献综述和专家访谈,对联网汽车中的隐私敏感数据有更详细的了解。首先,我们探讨了哪些隐私敏感数据是在汽车中收集的,以及它们是如何收集的。然后,我们描述了谁接收数据,目的是什么,以及汽车用户如何确定他们的隐私敏感数据是否被收集和使用。此外,我们分析了联网汽车中隐私敏感数据的典型安全措施,并考虑通过这些措施可以预防或减轻哪些威胁。介绍了提高联网汽车中隐私敏感数据透明度和安全性的措施示例。
{"title":"Privacy-sensitive data in connected cars","authors":"T. Nawrath, D. Fischer, B. Markscheffel","doi":"10.1109/ICITST.2016.7856736","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856736","url":null,"abstract":"Our research work presents findings from literature review and expert interviews with more detailed knowledge of privacy-sensitive data in connected cars. At first we explore which privacy-sensitive data are collected in cars and how they are collected. Then we describe who receives the data, for what purposes and how car users can determine if their privacy-sensitive data are being collected and used. Furthermore, we analyze exemplary security measures for privacy-sensitive data in connected cars and consider which threats can be prevented or mitigated by these measures. Examples of measures to improve the transparency and security of privacy-sensitive data in connected cars are presented.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Compressive Sensing encryption modes and their security 压缩感知加密模式及其安全性
Robin M. Fay, C. Ruland
Compressed Sensing may offer confidentiality with a good level of security that comes at limited extra costs. By this means, encryption can be added right into the sampling process. Previous proposals of Compressive Sensing encryption schemes are based on the randomness introduced by the sensing matrix. Once the matrix is fixed, the encryption becomes deterministic and therefore it can hardly be secure when encrypting more than a single signal. The work presented in this paper is built on the theoretical results on the secrecy of one-time Compressive Sensing encryption, and it proposes practical realizations, which extend this kind of encryption so that multiple signals may be encrypted under a single key. The confidentiality of the signal is thereby solely given by the inherent secrecy of the compressed measurements. In contrast to recent suggestions, the modes of operation defined in this paper are able to encrypt signals with different energy without exposing the signals energy to an eavesdropper. A general design for Compressive Sensing encryption modes is presented along with two realizations: one designed for parallel processing and another one that is self-synchronizing. The secrecy of the proposed modes is reduced to the secrecy of known and trusted cryptographic primitives. Compressive Sensing encryption modes are useful in a wide range of practical applications by providing a joint end-to-end encryption and compression that starts at the sensor level.
压缩感知可以在有限的额外成本下提供具有良好安全性的机密性。通过这种方法,加密可以直接添加到采样过程中。以往的压缩感知加密方案都是基于感知矩阵引入的随机性。一旦矩阵固定,加密就变得确定性,因此当加密多个信号时,它很难是安全的。本文的工作是建立在一次性压缩感知加密保密性的理论基础上,并提出了实际实现,扩展了这种加密,使多个信号可以在一个密钥下加密。因此,信号的保密性完全由压缩测量的固有保密性给出。与最近的建议相反,本文定义的操作模式能够加密不同能量的信号,而不会将信号能量暴露给窃听者。提出了压缩感知加密模式的一般设计以及两种实现:一种设计用于并行处理,另一种设计用于自同步。所提出的模式的保密性被简化为已知和可信的密码原语的保密性。压缩感知加密模式通过提供从传感器级别开始的联合端到端加密和压缩,在广泛的实际应用中非常有用。
{"title":"Compressive Sensing encryption modes and their security","authors":"Robin M. Fay, C. Ruland","doi":"10.1109/ICITST.2016.7856681","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856681","url":null,"abstract":"Compressed Sensing may offer confidentiality with a good level of security that comes at limited extra costs. By this means, encryption can be added right into the sampling process. Previous proposals of Compressive Sensing encryption schemes are based on the randomness introduced by the sensing matrix. Once the matrix is fixed, the encryption becomes deterministic and therefore it can hardly be secure when encrypting more than a single signal. The work presented in this paper is built on the theoretical results on the secrecy of one-time Compressive Sensing encryption, and it proposes practical realizations, which extend this kind of encryption so that multiple signals may be encrypted under a single key. The confidentiality of the signal is thereby solely given by the inherent secrecy of the compressed measurements. In contrast to recent suggestions, the modes of operation defined in this paper are able to encrypt signals with different energy without exposing the signals energy to an eavesdropper. A general design for Compressive Sensing encryption modes is presented along with two realizations: one designed for parallel processing and another one that is self-synchronizing. The secrecy of the proposed modes is reduced to the secrecy of known and trusted cryptographic primitives. Compressive Sensing encryption modes are useful in a wide range of practical applications by providing a joint end-to-end encryption and compression that starts at the sensor level.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"61 7-8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Performance study of the index structures in audited environment 审计环境下索引结构的性能研究
Michal Kvet, Monika Vajsová
Development in information systems has brought the need for universal access to data stored in computer systems using database approach. It should ensure quality, reliability, performance with emphasis on rising data amount. The first part of the paper deals with the index structure definition, index access methods, which delimit access type. However, another significant factor is the data security. The second part of the paper deals with the audit as one element of complex activities. Standard database auditing does not influence defined index, but can generate too much data regardless the query type. Fine-grained auditing is new opportunity based on attribute granularity. Experiment section highlights limitations of index access methods, when adding new audit policy. As we can see, new audit characteristic definition can significantly degrade performance due to adding new conditions to the query consequencing sequential table data processing.
信息系统的发展带来了使用数据库方法普遍访问存储在计算机系统中的数据的需要。它应该保证质量、可靠性和性能,重点是增加数据量。本文第一部分讨论了索引结构的定义、索引访问方法,并对访问类型进行了划分。然而,另一个重要因素是数据安全性。本文的第二部分讨论了作为复杂活动的一个要素的审计。标准数据库审计不会影响定义的索引,但无论查询类型如何,都会生成过多的数据。细粒度审计是基于属性粒度的新机会。实验部分强调了在添加新的审计策略时索引访问方法的局限性。正如我们所看到的,新的审计特征定义会显著降低性能,因为它会向导致顺序表数据处理的查询添加新的条件。
{"title":"Performance study of the index structures in audited environment","authors":"Michal Kvet, Monika Vajsová","doi":"10.1109/ICITST.2016.7856753","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856753","url":null,"abstract":"Development in information systems has brought the need for universal access to data stored in computer systems using database approach. It should ensure quality, reliability, performance with emphasis on rising data amount. The first part of the paper deals with the index structure definition, index access methods, which delimit access type. However, another significant factor is the data security. The second part of the paper deals with the audit as one element of complex activities. Standard database auditing does not influence defined index, but can generate too much data regardless the query type. Fine-grained auditing is new opportunity based on attribute granularity. Experiment section highlights limitations of index access methods, when adding new audit policy. As we can see, new audit characteristic definition can significantly degrade performance due to adding new conditions to the query consequencing sequential table data processing.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114248923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sharing in the rain: Secure and efficient data sharing for the Cloud 雨中共享:安全高效的云数据共享
A. Michalas
Cloud storage has rapidly become a cornerstone of many businesses and has moved from an early adopters stage to an early majority, where we typically see explosive deployments. As companies rush to join the cloud revolution, it has become vital to create the necessary tools that will effectively protect users' data from unauthorized access. Nevertheless, sharing data between multiple users' under the same domain in a secure and efficient way is not trivial. In this paper, we propose Sharing in the Rain - a protocol that allows cloud users' to securely share their data based on predefined policies. The proposed protocol is based on Attribute-Based Encryption (ABE) and allows users to encrypt data based on certain policies and attributes. Moreover, we use a Key-Policy Attribute-Based technique through which access revocation is optimized. More precisely, we show how to securely and efficiently remove access to a file, for a certain user that is misbehaving or is no longer part of a user group, without having to decrypt and re-encrypt the original data with a new key or a new policy.
云存储已经迅速成为许多企业的基石,并且已经从早期采用者阶段转变为早期的主流,在那里我们通常会看到爆炸性的部署。随着企业纷纷加入云计算革命,创建必要的工具来有效保护用户数据免受未经授权的访问变得至关重要。然而,在同一域下的多个用户之间安全高效地共享数据并非易事。在本文中,我们提出了“雨中共享”——一种允许云用户基于预定义策略安全地共享数据的协议。该协议基于ABE (Attribute-Based Encryption),允许用户根据一定的策略和属性对数据进行加密。此外,我们还使用了基于Key-Policy属性的技术,通过该技术对访问撤销进行了优化。更准确地说,我们展示了如何安全有效地为行为不当或不再属于用户组的某个用户删除对文件的访问,而无需使用新密钥或新策略解密和重新加密原始数据。
{"title":"Sharing in the rain: Secure and efficient data sharing for the Cloud","authors":"A. Michalas","doi":"10.1109/ICITST.2016.7856693","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856693","url":null,"abstract":"Cloud storage has rapidly become a cornerstone of many businesses and has moved from an early adopters stage to an early majority, where we typically see explosive deployments. As companies rush to join the cloud revolution, it has become vital to create the necessary tools that will effectively protect users' data from unauthorized access. Nevertheless, sharing data between multiple users' under the same domain in a secure and efficient way is not trivial. In this paper, we propose Sharing in the Rain - a protocol that allows cloud users' to securely share their data based on predefined policies. The proposed protocol is based on Attribute-Based Encryption (ABE) and allows users to encrypt data based on certain policies and attributes. Moreover, we use a Key-Policy Attribute-Based technique through which access revocation is optimized. More precisely, we show how to securely and efficiently remove access to a file, for a certain user that is misbehaving or is no longer part of a user group, without having to decrypt and re-encrypt the original data with a new key or a new policy.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124960817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1