Pub Date : 2019-09-01DOI: 10.6025/jisr/2019/10/3/87-91
Xue-rui Wang, Yong-qiang He
{"title":"Security Management and Prevention on the Campus Network against Hacking","authors":"Xue-rui Wang, Yong-qiang He","doi":"10.6025/jisr/2019/10/3/87-91","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/3/87-91","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.6025/jisr/2019/10/3/92-96
Yingjun Han
{"title":"Research on Digital Resources Integration Model in Cloud Computing Environment","authors":"Yingjun Han","doi":"10.6025/jisr/2019/10/3/92-96","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/3/92-96","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.6025/JISR/2019/10/2/67-76
P. Vyas, D. Patel
{"title":"Data and Programming Security Issues in Fog Computing","authors":"P. Vyas, D. Patel","doi":"10.6025/JISR/2019/10/2/67-76","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/67-76","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.6025/JISR/2019/10/2/48-66
Khalid Mansour, Khaled W. Mahmoud
{"title":"Keystroke Latency Time Discrete Representation for Password Hardening","authors":"Khalid Mansour, Khaled W. Mahmoud","doi":"10.6025/JISR/2019/10/2/48-66","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/2/48-66","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128512529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.6025/JISR/2019/10/1/1-17
B. Madhuravani, Murthy Dsr
With the exponential growth of network bandwidth and computational resources, data security has become one of the interesting research area in wireless communication networks. Authentication is considered as a prime concern in the field of energy-constrained wireless sensor networks due to its wide domain applications. Extensive amount of research works have been carried out to develop more secure authentication system in order to achieve confidentiality and authenticity constraints. Many authentication protocols are mainly depend upon security, scalability, communication constraints and computation overhead. Also, most of the traditional authentication models are failed to authenticate node behavior using integrity, secured key distribution and encryption models. Therefore, there is requirement of very strong authentication protocols in order to provide extended security to the WSN systems. To overcome these issues, a novel quantum chaotic key distribution (QKD) based homomorphic CPABE model was implemented in wireless communication networks. Quantum key Distribution (QKD) is required to improve the security of communication systems. The major objective of quantum key distribution is to generate a key that takes part in encryption. Experimental results proved that the proposed model has high computation speed, storage overhead and secured key distribution compared to traditional wireless authentication models.
{"title":"A Novel Chaotic Quantum based Homomorphic CPABE Authentication Protocol against Malicious attack in Wireless Communication Networks","authors":"B. Madhuravani, Murthy Dsr","doi":"10.6025/JISR/2019/10/1/1-17","DOIUrl":"https://doi.org/10.6025/JISR/2019/10/1/1-17","url":null,"abstract":"With the exponential growth of network bandwidth and computational resources, data security has become one of the interesting research area in wireless communication networks. Authentication is considered as a prime concern in the field of energy-constrained wireless sensor networks due to its wide domain applications. Extensive amount of research works have been carried out to develop more secure authentication system in order to achieve confidentiality and authenticity constraints. Many authentication protocols are mainly depend upon security, scalability, communication constraints and computation overhead. Also, most of the traditional authentication models are failed to authenticate node behavior using integrity, secured key distribution and encryption models. Therefore, there is requirement of very strong authentication protocols in order to provide extended security to the WSN systems. To overcome these issues, a novel quantum chaotic key distribution (QKD) based homomorphic CPABE model was implemented in wireless communication networks. Quantum key Distribution (QKD) is required to improve the security of communication systems. The major objective of quantum key distribution is to generate a key that takes part in encryption. Experimental results proved that the proposed model has high computation speed, storage overhead and secured key distribution compared to traditional wireless authentication models.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.6025/jisr/2019/10/1/18-23
Syed Umar
Significant security password to authenticate users on a network system network system for small and large. Text passwords is the standard form of authentication of users on the site for comfort and convenience. In fact, it probably caught on the user's password with various threats and vulnerabilities and threats. ordinary users use text passwords for authentication when they register with the selected account on the site. weak password selected by the user and the application between the sites that a domino effect. Additionally, enter the password of the computer thief a password is not a reliable threat arrival could begin passwords, such as phishing, key loggers and capturing malware attacks steal. OPASS introduce more help with a specific user authentication protocol in this paper. The concept of the universal system and methods of organizations and users to implement password policies. The system is designed for user authentication protocols OTP relating to benefit the users of mobile phones and short message services giant passwords and reuse of passwords to steal a series of attacks. OPass a live phone number of each contribution, this unique recreation and telecom service providers involved have shot three OPASS, users need to log in a password on any computer in the long-term prototype website. After remembering OPASS, we believe OPASS effective and inexpensive compared to a conventional web authentication mechanism.
{"title":"An Authentication of Significant security for accessing Password through Network System","authors":"Syed Umar","doi":"10.6025/jisr/2019/10/1/18-23","DOIUrl":"https://doi.org/10.6025/jisr/2019/10/1/18-23","url":null,"abstract":"Significant security password to authenticate users on a network system network system for small and large. Text passwords is the standard form of authentication of users on the site for comfort and convenience. In fact, it probably caught on the user's password with various threats and vulnerabilities and threats. ordinary users use text passwords for authentication when they register with the selected account on the site. weak password selected by the user and the application between the sites that a domino effect. Additionally, enter the password of the computer thief a password is not a reliable threat arrival could begin passwords, such as phishing, key loggers and capturing malware attacks steal. OPASS introduce more help with a specific user authentication protocol in this paper. The concept of the universal system and methods of organizations and users to implement password policies. The system is designed for user authentication protocols OTP relating to benefit the users of mobile phones and short message services giant passwords and reuse of passwords to steal a series of attacks. OPass a live phone number of each contribution, this unique recreation and telecom service providers involved have shot three OPASS, users need to log in a password on any computer in the long-term prototype website. After remembering OPASS, we believe OPASS effective and inexpensive compared to a conventional web authentication mechanism.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.6025/JISR/2018/9/3/96-106
B. Khammas
{"title":"Malware Detection using Sub-Signatures and Machine Learning Technique","authors":"B. Khammas","doi":"10.6025/JISR/2018/9/3/96-106","DOIUrl":"https://doi.org/10.6025/JISR/2018/9/3/96-106","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128937450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.6025/jisr/2018/9/3/83-95
Sarah Shihab Hamad, A. Sagheer
Cloud computing enables sharing of resources and services. In the cloud computing the client (user) puts his data in the cloud, and any computations on his stored data will be implemented in the cloud. To produce the effective services, some of the cloud service providers share the information with third parties. The third party can reach to the client private data and modifies the information to make it beneficial to him. Therefore, the security becomes the main thing in cloud computing. The scheme that allows to executing several computations on the encrypted message without decrypting the message is called homomorphic encryption. This paper provides a Fully Homomorphic Encryption Scheme SA that we can apply it for security of a cloud computing. The proposed scheme is based on Euler’s theorem, which proved both addition and multiplication operations at the same time on ciphertext without decryption. We compute the time complexity of the encryption and decryption function for the Elgamal and RSA cryptosystems compared to the proposed SA scheme and also compared the execution time among the three schemes with varies sizes of messages and varies lengths of secret key, and finally the security of the three schemes is analyzed. As a result, in calculations of the execution time of ElGamal and RSA cryptosystems compared to the proposed SA scheme, it was observed that the length of the secret key effect on the execution time, in which the execution time increased when the length of the private key was increased. The proposed scheme showed a good security for the stored data on the cloud.
{"title":"Fully Homomorphic Encryption based on Euler’s Theorem","authors":"Sarah Shihab Hamad, A. Sagheer","doi":"10.6025/jisr/2018/9/3/83-95","DOIUrl":"https://doi.org/10.6025/jisr/2018/9/3/83-95","url":null,"abstract":"Cloud computing enables sharing of resources and services. In the cloud computing the client (user) puts his data in the cloud, and any computations on his stored data will be implemented in the cloud. To produce the effective services, some of the cloud service providers share the information with third parties. The third party can reach to the client private data and modifies the information to make it beneficial to him. Therefore, the security becomes the main thing in cloud computing. The scheme that allows to executing several computations on the encrypted message without decrypting the message is called homomorphic encryption. This paper provides a Fully Homomorphic Encryption Scheme SA that we can apply it for security of a cloud computing. The proposed scheme is based on Euler’s theorem, which proved both addition and multiplication operations at the same time on ciphertext without decryption. We compute the time complexity of the encryption and decryption function for the Elgamal and RSA cryptosystems compared to the proposed SA scheme and also compared the execution time among the three schemes with varies sizes of messages and varies lengths of secret key, and finally the security of the three schemes is analyzed. As a result, in calculations of the execution time of ElGamal and RSA cryptosystems compared to the proposed SA scheme, it was observed that the length of the secret key effect on the execution time, in which the execution time increased when the length of the private key was increased. The proposed scheme showed a good security for the stored data on the cloud.","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.6025/jisr/2018/9/3/107-118
Atena Shiranzaei, R. Khan
{"title":"An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT","authors":"Atena Shiranzaei, R. Khan","doi":"10.6025/jisr/2018/9/3/107-118","DOIUrl":"https://doi.org/10.6025/jisr/2018/9/3/107-118","url":null,"abstract":"","PeriodicalId":339136,"journal":{"name":"Journal of Information Security Research","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134292250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}