首页 > 最新文献

2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

英文 中文
A taxonomy on intrusion alert aggregation techniques 入侵警报聚合技术的分类
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013129
Taqwa Ahmed, M. M. Siraj, A. Zainal, M. Din
As security threats advance in a drastic way, most of the organizations apply various intrusion detection systems (IDSs) to optimize detection and to provide comprehensive view of intrusion activities. But IDS produces huge number of duplicated alerts information that overwhelm security operator. Alert aggregation addresses this issue by reducing, fusing and clustering the alerts. Techniques from a different scope of disciplines have been proposed by researchers for different aspects of aggregation. In this paper we present a comprehensive review on proposed alert aggregation techniques. Our main contribution is to classify the literature based on the techniques applied to aggregate the alerts.
随着安全威胁的迅猛发展,大多数组织都采用各种入侵检测系统来优化检测并提供全面的入侵活动视图。但是IDS会产生大量重复的警报信息,使安全操作人员不堪重负。警报聚合通过减少、融合和聚集警报来解决这个问题。研究人员针对聚合的不同方面提出了来自不同学科范围的技术。在本文中,我们提出了一个全面的审查提出的警报聚合技术。我们的主要贡献是根据用于聚合警报的技术对文献进行分类。
{"title":"A taxonomy on intrusion alert aggregation techniques","authors":"Taqwa Ahmed, M. M. Siraj, A. Zainal, M. Din","doi":"10.1109/ISBAST.2014.7013129","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013129","url":null,"abstract":"As security threats advance in a drastic way, most of the organizations apply various intrusion detection systems (IDSs) to optimize detection and to provide comprehensive view of intrusion activities. But IDS produces huge number of duplicated alerts information that overwhelm security operator. Alert aggregation addresses this issue by reducing, fusing and clustering the alerts. Techniques from a different scope of disciplines have been proposed by researchers for different aspects of aggregation. In this paper we present a comprehensive review on proposed alert aggregation techniques. Our main contribution is to classify the literature based on the techniques applied to aggregate the alerts.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative analysis of skin color model for face detection 肤色模型在人脸检测中的比较分析
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013088
C. Sumathi, M. Mahadevi
Skin color detection plays an important phase in identifying the face in images. Detecting face has become difficult because of the complexity in facial features and the similarity between those features. To identify a face, one of the basic step is to segment the image based on skin color. The main objective of the paper is to find a color model which is more suitable and shows a good performance in detecting a face. This paper compares each of the skin color models namely HSV, YCBCR, L*a*b for better accuracy. On such comparison, a hybrid skin color model is derived by combining the suitable color component from the three skin color models. After Morphological operations and using connected components a face is detected. After experiments it is observed that the Hybrid color model based skin detection is more suitable with an accuracy of 93%.
肤色检测是人脸识别的一个重要环节。由于人脸特征的复杂性和特征之间的相似性,人脸检测变得非常困难。人脸识别的基本步骤之一是基于肤色对图像进行分割。本文的主要目的是寻找一种更合适的颜色模型,并在人脸检测中表现出良好的性能。本文对HSV、YCBCR、L*a*b三种肤色模型进行了比较,以获得更好的准确性。在此基础上,结合三种肤色模型中合适的肤色分量,得到混合肤色模型。经过形态学操作,并使用连接的组件来检测人脸。实验结果表明,基于混合颜色模型的皮肤检测更为合适,准确率达到93%。
{"title":"Comparative analysis of skin color model for face detection","authors":"C. Sumathi, M. Mahadevi","doi":"10.1109/ISBAST.2014.7013088","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013088","url":null,"abstract":"Skin color detection plays an important phase in identifying the face in images. Detecting face has become difficult because of the complexity in facial features and the similarity between those features. To identify a face, one of the basic step is to segment the image based on skin color. The main objective of the paper is to find a color model which is more suitable and shows a good performance in detecting a face. This paper compares each of the skin color models namely HSV, YCBCR, L*a*b for better accuracy. On such comparison, a hybrid skin color model is derived by combining the suitable color component from the three skin color models. After Morphological operations and using connected components a face is detected. After experiments it is observed that the Hybrid color model based skin detection is more suitable with an accuracy of 93%.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123637836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA approach for password conversion generator 密码转换生成器的DNA方法
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013114
Chng Chern Wei
The evolution of an information technology has been expended and growth rapidly since last decade, especially in the era of an internet web technology, such as, e-commence, ebusiness or e-payment or e-shopping and more. The evolution of an internet web technology has made the transmission of the data or information over the web is more comprehensive. Thus, the data or information is easy to hack, crack or spy by the unauthorized persons over the network. This paper proposed a technique of cryptography to make the data or information to be more secure during transmission over the internet technology based on the DNA Stenography with the Finite State Machine (Mealy Machine) theory. This proposed algorithm is able to securing the data or information at least 3 levels of combinations for the password conversion.
自过去十年以来,信息技术的发展已经得到了迅速的扩展和增长,特别是在互联网网络技术的时代,例如电子商务,电子商务或电子支付或电子购物等等。internet网络技术的发展使得数据或信息在网络上的传输更加全面。因此,数据或信息很容易被未经授权的人通过网络入侵、破解或间谍。本文提出了一种基于有限状态机(Mealy Machine)理论的DNA速记技术,以提高数据或信息在互联网传输过程中的安全性。该算法能够保护至少3个级别的密码转换组合的数据或信息。
{"title":"DNA approach for password conversion generator","authors":"Chng Chern Wei","doi":"10.1109/ISBAST.2014.7013114","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013114","url":null,"abstract":"The evolution of an information technology has been expended and growth rapidly since last decade, especially in the era of an internet web technology, such as, e-commence, ebusiness or e-payment or e-shopping and more. The evolution of an internet web technology has made the transmission of the data or information over the web is more comprehensive. Thus, the data or information is easy to hack, crack or spy by the unauthorized persons over the network. This paper proposed a technique of cryptography to make the data or information to be more secure during transmission over the internet technology based on the DNA Stenography with the Finite State Machine (Mealy Machine) theory. This proposed algorithm is able to securing the data or information at least 3 levels of combinations for the password conversion.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face verification using Local Graph Stucture (LGS) 基于局部图结构的人脸验证
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013098
E. Abusham
Verification of human face plays an important role in social interaction, such as recognition and security. In this paper, a novel generative approach for face verification based on Local Graph Structure (LGS) description is proposed. A generic face model is considered as a collection of LGS-histograms. Local Graph Structure (LGS) operator is defined as a gray-scale invariant texture measure, derived from a general definition of texture in a local neighborhood. The histograms of the LGS were used for verification, various distance/similarity measures classifiers, namely, the Euclidian distance, the City block distance, the cosine similarity measure and the mahalanobis cosine. The experiments results on standard ORL face database images demonstrated the effectiveness of the proposed method.
人脸验证在识别和安全等社会互动中起着重要作用。提出了一种基于局部图结构(LGS)描述的人脸验证生成方法。一个通用的人脸模型被认为是lgs直方图的集合。局部图结构(Local Graph Structure, LGS)算子是一种灰度不变的纹理测度,由局部邻域纹理的一般定义衍生而来。使用LGS的直方图进行验证,使用各种距离/相似度量分类器,即欧几里得距离、城市街区距离、余弦相似度量和马氏余弦。在标准ORL人脸数据库图像上的实验结果证明了该方法的有效性。
{"title":"Face verification using Local Graph Stucture (LGS)","authors":"E. Abusham","doi":"10.1109/ISBAST.2014.7013098","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013098","url":null,"abstract":"Verification of human face plays an important role in social interaction, such as recognition and security. In this paper, a novel generative approach for face verification based on Local Graph Structure (LGS) description is proposed. A generic face model is considered as a collection of LGS-histograms. Local Graph Structure (LGS) operator is defined as a gray-scale invariant texture measure, derived from a general definition of texture in a local neighborhood. The histograms of the LGS were used for verification, various distance/similarity measures classifiers, namely, the Euclidian distance, the City block distance, the cosine similarity measure and the mahalanobis cosine. The experiments results on standard ORL face database images demonstrated the effectiveness of the proposed method.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A review of cloud security based on cryptographic mechanisms 基于加密机制的云安全综述
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013103
Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah
Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology offers even more applications to be utilized without installation. This paper presents a review of basic security challenges consisting of traditional security issues. It also discusses the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems. Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.
最近,计算机用户可以使用一种叫做云计算的技术在互联网和中央远程服务器上维护他们的数据和应用程序。它是一种允许用户从提供互联网服务的任何设备访问他们的个人文件的技术,这种技术提供了更多的应用程序,无需安装即可使用。本文综述了由传统安全问题构成的基本安全挑战。本文还讨论了云系统的提供商和用户使用云计算模型所带来的其他挑战。此外,一些研究人员提出的解决方案侧重于批准安全云存储的加密技术。
{"title":"A review of cloud security based on cryptographic mechanisms","authors":"Sura Khalil Abd, S. Al-Haddad, F. Hashim, Azizol Abdullah","doi":"10.1109/ISBAST.2014.7013103","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013103","url":null,"abstract":"Recently, computer users can maintain their data and applications on the Internet and in the central remote server by using a technology called cloud computing. It is a kind of technology that allows users to access their personal files from any device provided with Internet services such technology offers even more applications to be utilized without installation. This paper presents a review of basic security challenges consisting of traditional security issues. It also discusses the additional challenges that take place as a result of using cloud computing model by providers and users of cloud systems. Furthermore, solutions suggested by some researchers are presented with a focus on cryptographic techniques that approve secure cloud storage.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An enhanced certificateless cryptosystem for mobile ad hoc networks 一种用于移动自组织网络的增强的无证书密码系统
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013117
Shabnam Kasra Kermanshahi, M. Salleh
Due to the importance of security in many critical applications in MANETs and the limitation of the resources in mobile devices, it is important to have lightweight cryptosystems. Although some lightweight certificateless cryptosystems for MANETs have been proposed, it is possible to improve them in the term of reducing the complexity of the computations. In this paper, we have tried to propose a lightweight certificateless public key cryptographic scheme based on bilinear pairings. In addition, we compared our proposed scheme with other existing certificateless pairing based and result shows that the proposed scheme is more efficient based on computational cost and the rate of growth of computational expense viewpoints.
由于安全在许多关键应用中的重要性以及移动设备中资源的限制,轻量级密码系统非常重要。尽管已经提出了一些用于manet的轻量级无证书密码系统,但在降低计算复杂性方面仍有可能对其进行改进。本文提出了一种基于双线性对的轻量级无证书公钥加密方案。此外,我们将所提出的方案与现有的基于无证书配对的方案进行了比较,结果表明,从计算成本和计算费用的增长率角度来看,所提出的方案更有效。
{"title":"An enhanced certificateless cryptosystem for mobile ad hoc networks","authors":"Shabnam Kasra Kermanshahi, M. Salleh","doi":"10.1109/ISBAST.2014.7013117","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013117","url":null,"abstract":"Due to the importance of security in many critical applications in MANETs and the limitation of the resources in mobile devices, it is important to have lightweight cryptosystems. Although some lightweight certificateless cryptosystems for MANETs have been proposed, it is possible to improve them in the term of reducing the complexity of the computations. In this paper, we have tried to propose a lightweight certificateless public key cryptographic scheme based on bilinear pairings. In addition, we compared our proposed scheme with other existing certificateless pairing based and result shows that the proposed scheme is more efficient based on computational cost and the rate of growth of computational expense viewpoints.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134387934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed Denial of Service detection using hybrid machine learning technique 使用混合机器学习技术的分布式拒绝服务检测
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013133
M. Barati, Azizol Abdullah, N. Udzir, R. Mahmod, N. Mustapha
Distributed Denial of Service (DDoS) is a major threat among many security issues. To overcome this problem, many studies have been carried out by researchers, however due to inefficiency of their techniques in terms of accuracy and computational cost, proposing an efficient method to detect DDoS attack is still a hot topic in research. Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. Wrapper method using GA is deployed to select the most efficient features and then DDoS attack detection rate is improved by applying Multi-Layer Perceptron (MLP) of ANN. Results demonstrate that the proposed method is able to detect DDoS attack with high accuracy and deniable False Alarm.
分布式拒绝服务(DDoS)是众多安全问题中的一个主要威胁。为了克服这一问题,研究人员进行了许多研究,但由于其技术在准确性和计算成本方面的低效率,提出一种有效的检测DDoS攻击的方法仍然是研究的热点。本文提出了一种DDoS攻击检测系统的体系结构。该方法采用遗传算法(GA)和人工神经网络(ANN)进行特征选择和攻击检测。利用遗传算法的包装方法选择最有效的特征,然后利用人工神经网络的多层感知器(MLP)提高DDoS攻击的检测率。结果表明,该方法检测DDoS攻击具有较高的准确率和可否认的虚警。
{"title":"Distributed Denial of Service detection using hybrid machine learning technique","authors":"M. Barati, Azizol Abdullah, N. Udzir, R. Mahmod, N. Mustapha","doi":"10.1109/ISBAST.2014.7013133","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013133","url":null,"abstract":"Distributed Denial of Service (DDoS) is a major threat among many security issues. To overcome this problem, many studies have been carried out by researchers, however due to inefficiency of their techniques in terms of accuracy and computational cost, proposing an efficient method to detect DDoS attack is still a hot topic in research. Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. Wrapper method using GA is deployed to select the most efficient features and then DDoS attack detection rate is improved by applying Multi-Layer Perceptron (MLP) of ANN. Results demonstrate that the proposed method is able to detect DDoS attack with high accuracy and deniable False Alarm.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Face recognition for security efficiency in managing and monitoring visitors of an organization 人脸识别在管理和监控一个组织的访客安全效率
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013101
B. Satari, Nor Azlina Abd Rahman, Zety Marlia Zainal Abidin
This paper discussing on a system that able to manage and monitor the visitors of an organization using face recognition as an authentication method. After the authentication and verification process, valid visitor will be printed with visitor card that will print out the face image of the visitor, date and time of visiting and the name of the person to be visited. Face recognition visitors management system (FRVMS) is proposed to enhance the security of an organization from outsiders that entering the building illegally for certain purposes such as spying or stealing the organization assets. Centralize system enable managing and monitoring process become more efficient. Cost of development is also taking into consideration as this system is not requiring any extra devices. Face recognition is using web camera that is already embedded with the computer. Several similar systems and technologies were reviewed and analyzed before designing the system. A system framework was proposed and prototype was developed. System advantages are highlighted but the main advantages of this system are to enhance the security and cutting cost of system development.
本文讨论了一种以人脸识别为认证手段的机构访客管理与监控系统。经过认证和验证过程后,有效访客将被打印访客卡,该访客卡将打印访客的面部图像,访问日期和时间以及被访问人的姓名。人脸识别访客管理系统(FRVMS)的提出是为了提高组织的安全性,防止外部人员非法进入建筑物,以达到某些目的,如间谍或窃取组织资产。集中式系统使管理和监控流程变得更加高效。开发成本也被考虑在内,因为该系统不需要任何额外的设备。人脸识别使用的是已经嵌入电脑的网络摄像头。在设计系统之前,对几种类似的系统和技术进行了回顾和分析。提出了系统框架并开发了样机。强调了系统的优点,但该系统的主要优点是提高了安全性,降低了系统开发成本。
{"title":"Face recognition for security efficiency in managing and monitoring visitors of an organization","authors":"B. Satari, Nor Azlina Abd Rahman, Zety Marlia Zainal Abidin","doi":"10.1109/ISBAST.2014.7013101","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013101","url":null,"abstract":"This paper discussing on a system that able to manage and monitor the visitors of an organization using face recognition as an authentication method. After the authentication and verification process, valid visitor will be printed with visitor card that will print out the face image of the visitor, date and time of visiting and the name of the person to be visited. Face recognition visitors management system (FRVMS) is proposed to enhance the security of an organization from outsiders that entering the building illegally for certain purposes such as spying or stealing the organization assets. Centralize system enable managing and monitoring process become more efficient. Cost of development is also taking into consideration as this system is not requiring any extra devices. Face recognition is using web camera that is already embedded with the computer. Several similar systems and technologies were reviewed and analyzed before designing the system. A system framework was proposed and prototype was developed. System advantages are highlighted but the main advantages of this system are to enhance the security and cutting cost of system development.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Biometric encryption to enhance confidentiality in Cloud computing 生物特征加密增强云计算的保密性
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013092
Malek Najib Omar, M. Salleh, M. Bakhtiari
Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing to provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to reduce the cost of dedicated servers. However, virtualization and Cloud computing contain many security weaknesses that affects the biometric data confidentiality in the Cloud computing. Those security issues are VM ware escape, hopping, mobility, diversity monitoring and etc. Furthermore, the privacy of a particular user is an issue in biometric data i.e. the face reorganization data for a famous and important people. Therefore, this paper proposed biometric encryption to improve the confidentiality in Cloud computing for biometric data. Also, this paper discussed virtualization for Cloud computing, as well as biometrics encryption. Indeed, this paper overviewed the security weaknesses of Cloud computing and how biometric encryption can improve the confidentiality in Cloud computing environment. Apart from this, confidentiality is enhanced in Cloud computing by using biometric encryption for biometric data. The novel approach of biometric encryption is to enhance the biometric data confidentiality in Cloud computing.
虚拟化技术是云计算中使用的基础技术。因此,虚拟化使云计算能够按需为用户提供硬件和软件服务。实际上,许多公司迁移到云计算的原因有很多,比如处理器的能力、总线速度、存储的大小、内存,以及设法降低专用服务器的成本。然而,虚拟化和云计算存在许多安全漏洞,影响了云计算中生物识别数据的保密性。这些安全问题包括虚拟机的逃逸、跳变、移动性、多样性监控等。此外,特定用户的隐私是生物特征数据中的一个问题,即著名人物和重要人物的面部重组数据。因此,本文提出了生物特征加密技术,以提高云计算中生物特征数据的保密性。此外,本文还讨论了云计算的虚拟化,以及生物识别加密。实际上,本文概述了云计算的安全弱点,以及生物特征加密如何提高云计算环境下的机密性。除此之外,在云计算中,通过对生物特征数据使用生物特征加密来增强机密性。为了提高云计算环境下生物特征数据的保密性,提出了一种新的生物特征加密方法。
{"title":"Biometric encryption to enhance confidentiality in Cloud computing","authors":"Malek Najib Omar, M. Salleh, M. Bakhtiari","doi":"10.1109/ISBAST.2014.7013092","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013092","url":null,"abstract":"Virtualization technology is the base technology used in Cloud computing. Therefore, virtualization enables Cloud computing to provide hardware and software services to the users on demand. Actually, many companies migrates to the Cloud computing for many reasons such as capabilities of processor, bus speed, size of storage, memory and managed to reduce the cost of dedicated servers. However, virtualization and Cloud computing contain many security weaknesses that affects the biometric data confidentiality in the Cloud computing. Those security issues are VM ware escape, hopping, mobility, diversity monitoring and etc. Furthermore, the privacy of a particular user is an issue in biometric data i.e. the face reorganization data for a famous and important people. Therefore, this paper proposed biometric encryption to improve the confidentiality in Cloud computing for biometric data. Also, this paper discussed virtualization for Cloud computing, as well as biometrics encryption. Indeed, this paper overviewed the security weaknesses of Cloud computing and how biometric encryption can improve the confidentiality in Cloud computing environment. Apart from this, confidentiality is enhanced in Cloud computing by using biometric encryption for biometric data. The novel approach of biometric encryption is to enhance the biometric data confidentiality in Cloud computing.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"8 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security evaluation over lightweight cryptographic protocols 轻量级加密协议的安全性评估
Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013116
S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.
由于在最近提出的应用中有广泛的密码系统的适用性,因此开发了各种各样的密码方案。可以说,提出一个满足安全性和效率要求的加密协议是一个重大的挑战问题。然而,密码学研究界缺乏一种集成的模式来对上述问题的可能挑战进行分类和标准化。这些缺点反过来会给那些不是该研究领域专家的研究人员带来很多困惑。因此,我们特别注意汇编一个强大的文件,以填补初学者和专家之间的差距。我们的最终目标是使其他研究人员能够对可证明安全密码系统或轻量级密码系统的挑战进行分类,根据确定的组件分析提出的方案,并帮助他们为未来的研究找到更好的解决方案。
{"title":"Security evaluation over lightweight cryptographic protocols","authors":"S. Ghoreishi, S. Razak, I. Isnin, Hassan Chizari","doi":"10.1109/ISBAST.2014.7013116","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013116","url":null,"abstract":"Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130203863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1