首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
A Provably Secure Android-Based Mobile Banking Protocol 一个可证明安全的基于android的移动银行协议
Pub Date : 2017-08-31 DOI: 10.14257/IJSIA.2017.11.8.06
Hisham S. Elganzoury, A. A. Hafez, A. A. Hegazy
The rising vogue of smart phones and tablets has led users to complete their daily works (such as M-Banking) with these devices. Therefore, mobile banking needs to become more proper, reliable, effective; and secure. Security is the most crucial requirement in mobile banking, since all the communications are via unsecure networks such as the Internet. Providing main security services; Confidentiality, Integrity, and Authentication (CIA) between any two communicating parties must be ensured and guaranteed. Many vulnerabilities may make Users’ confidential information vulnerable to risks. These vulnerabilities can take different shapes, such as fixed values-based security techniques, one factor authentication, separate hard token-based authentication, hardware thievery, and Android OS based attacks. This paper proposes a new secure scheme for mobile banking applications to overcome these risks. Then, the proposed scheme is analyzed, and compared to the most powered approaches. Finally, performance key identifiers are assessed and validated.
智能手机和平板电脑的日益流行使得用户通过这些设备完成日常工作(如移动银行)。因此,手机银行需要变得更加恰当、可靠、有效;和安全。安全是手机银行最重要的要求,因为所有的通信都是通过互联网等不安全的网络进行的。提供主要保安服务;必须确保通信双方之间的机密性、完整性和身份验证(CIA)。许多漏洞可能会使用户的机密信息面临风险。这些漏洞可以采取不同的形式,例如基于固定值的安全技术、单因素身份验证、单独的基于硬令牌的身份验证、硬件盗窃和基于Android OS的攻击。本文提出了一种新的移动银行应用安全方案来克服这些风险。然后,对该方案进行了分析,并与最强大的方法进行了比较。最后,评估和验证性能关键标识符。
{"title":"A Provably Secure Android-Based Mobile Banking Protocol","authors":"Hisham S. Elganzoury, A. A. Hafez, A. A. Hegazy","doi":"10.14257/IJSIA.2017.11.8.06","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.06","url":null,"abstract":"The rising vogue of smart phones and tablets has led users to complete their daily works (such as M-Banking) with these devices. Therefore, mobile banking needs to become more proper, reliable, effective; and secure. Security is the most crucial requirement in mobile banking, since all the communications are via unsecure networks such as the Internet. Providing main security services; Confidentiality, Integrity, and Authentication (CIA) between any two communicating parties must be ensured and guaranteed. Many vulnerabilities may make Users’ confidential information vulnerable to risks. These vulnerabilities can take different shapes, such as fixed values-based security techniques, one factor authentication, separate hard token-based authentication, hardware thievery, and Android OS based attacks. This paper proposes a new secure scheme for mobile banking applications to overcome these risks. Then, the proposed scheme is analyzed, and compared to the most powered approaches. Finally, performance key identifiers are assessed and validated.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44883179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
When Android Apps Open Ports to Handle Network Requests: Functionality or Security Vulnerability? 当Android应用程序打开端口处理网络请求:功能还是安全漏洞?
Pub Date : 2017-08-31 DOI: 10.14257/ijsia.2017.11.8.05
H. Yue, Yuqing Zhang
Large amounts of Android apps (applications) are found to open network ports to handle network requests to realize some specific functions, e.g., access from web page to Android app, communication between computer and Android device, file transmission in LAN (Local Area Network) environment, etc. However, an opened network port also provides an interface for attackers to visit the app. If a network request can trigger sensitive behaviors of a port-opening app without being e ff ective authorized by the app, it would pose security threats to the user, and we consider this app has port-opening vulnerability. In this paper, we first study the universality of port-opening apps in current Android app stores, the purposes of opening network ports and the possible attacks that the vulnerable apps may su ff er from. Then we propose a detection method of port-opening vulnerability of Android app based on static analysis and implement a detection tool— APOVD (Android Port-Opening Vulnerability Detection). APOVD first judges whether an opened port can lead to the occurrence of sensitive behaviors by the method of reachability analysis and taint analysis. Then the technique of static program slicing is used to judge whether there exists adequate access controls in the paths to reach each sensitive behavior. If there exists a path to reach a sensitive behavior and no adequate access control in this path, APOVD considers that the app under test has port-opening vulnerability. 1187 port-opening Android apps are found in 15600 popular apps, and 407 of them are identified as having port-opening vulnerability with the help of APOVD. The result shows that APOVD is e ff ective in detecting port-opening vulnerability.
大量安卓应用程序(应用程序)被发现打开网络端口来处理网络请求,以实现某些特定功能,例如从网页访问安卓应用、计算机与安卓设备之间的通信、局域网环境中的文件传输等。然而,打开的网络端口也为攻击者访问应用程序提供了接口。如果网络请求可以在未经应用程序有效授权的情况下触发端口打开应用程序的敏感行为,则会对用户构成安全威胁,我们认为该应用程序存在端口打开漏洞。在本文中,我们首先研究了当前安卓应用商店中端口开放应用程序的普遍性、开放网络端口的目的以及易受攻击的应用程序可能受到的攻击。然后,我们提出了一种基于静态分析的Android应用程序端口打开漏洞检测方法,并实现了一个检测工具——APOVD(Android端口打开漏洞)。APOVD首先通过可达性分析和污染分析的方法来判断一个开放的端口是否会导致敏感行为的发生。然后使用静态程序切片技术来判断路径中是否存在足够的访问控制以达到每个敏感行为。如果存在到达敏感行为的路径,并且该路径中没有足够的访问控制,APOVD认为测试中的应用程序存在端口打开漏洞。在15600个热门应用程序中发现1187个开放端口的安卓应用程序,其中407个应用程序在APOVD的帮助下被识别为存在端口开放漏洞。结果表明,APOVD能够有效地检测端口打开漏洞。
{"title":"When Android Apps Open Ports to Handle Network Requests: Functionality or Security Vulnerability?","authors":"H. Yue, Yuqing Zhang","doi":"10.14257/ijsia.2017.11.8.05","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.8.05","url":null,"abstract":"Large amounts of Android apps (applications) are found to open network ports to handle network requests to realize some specific functions, e.g., access from web page to Android app, communication between computer and Android device, file transmission in LAN (Local Area Network) environment, etc. However, an opened network port also provides an interface for attackers to visit the app. If a network request can trigger sensitive behaviors of a port-opening app without being e ff ective authorized by the app, it would pose security threats to the user, and we consider this app has port-opening vulnerability. In this paper, we first study the universality of port-opening apps in current Android app stores, the purposes of opening network ports and the possible attacks that the vulnerable apps may su ff er from. Then we propose a detection method of port-opening vulnerability of Android app based on static analysis and implement a detection tool— APOVD (Android Port-Opening Vulnerability Detection). APOVD first judges whether an opened port can lead to the occurrence of sensitive behaviors by the method of reachability analysis and taint analysis. Then the technique of static program slicing is used to judge whether there exists adequate access controls in the paths to reach each sensitive behavior. If there exists a path to reach a sensitive behavior and no adequate access control in this path, APOVD considers that the app under test has port-opening vulnerability. 1187 port-opening Android apps are found in 15600 popular apps, and 407 of them are identified as having port-opening vulnerability with the help of APOVD. The result shows that APOVD is e ff ective in detecting port-opening vulnerability.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46670624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Self-Similarity for Detection of Rate-based Network Anomalies 基于速率的网络异常检测的自相似性研究
Pub Date : 2017-08-31 DOI: 10.14257/IJSIA.2017.11.8.03
Gagandeep Kaur, V. Saxena, J. Gupta
In this paper, we have reviewed state of the art works done in the field of anomaly detection in general and network based anomaly detection in particular. The current anomaly detection techniques with respect to rate based network anomalies have been examined and their strengths and weaknesses have been highlighted. The applicability of scale-invariant property of self-similarity as a parameter for detection of anomalies from normal network traffic behaviors has been studied in depth. From the studies of scaleinvariance and it's usage in detecting anomalies like flash crowds, DDoS attacks, outages, portscans, etc. it was realized that wavelets are a good tool that can be used for n-level decomposition of aggregated network traffic.
在本文中,我们回顾了异常检测领域的最新研究成果,特别是基于网络的异常检测。对目前基于速率的网络异常检测技术进行了研究,并指出了它们的优缺点。深入研究了自相似度的尺度不变特性作为检测正常网络流量行为异常的参数的适用性。从尺度不变性的研究和它在检测异常(如闪电人群、DDoS攻击、中断、端口扫描等)中的使用来看,我们意识到小波是一个很好的工具,可以用于聚合网络流量的n级分解。
{"title":"Study of Self-Similarity for Detection of Rate-based Network Anomalies","authors":"Gagandeep Kaur, V. Saxena, J. Gupta","doi":"10.14257/IJSIA.2017.11.8.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.03","url":null,"abstract":"In this paper, we have reviewed state of the art works done in the field of anomaly detection in general and network based anomaly detection in particular. The current anomaly detection techniques with respect to rate based network anomalies have been examined and their strengths and weaknesses have been highlighted. The applicability of scale-invariant property of self-similarity as a parameter for detection of anomalies from normal network traffic behaviors has been studied in depth. From the studies of scaleinvariance and it's usage in detecting anomalies like flash crowds, DDoS attacks, outages, portscans, etc. it was realized that wavelets are a good tool that can be used for n-level decomposition of aggregated network traffic.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45244411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks 基于协作代理的ISP分布式DDoS防御模型
Pub Date : 2017-08-31 DOI: 10.14257/IJSIA.2017.11.8.01
Karanbir Singh, Dr. Kanwalvir Singh Dhindsa, B. Bhushan
{"title":"Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks","authors":"Karanbir Singh, Dr. Kanwalvir Singh Dhindsa, B. Bhushan","doi":"10.14257/IJSIA.2017.11.8.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.8.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43693534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards an ethical online payment system through cryptography and next generation communication network 通过密码学和下一代通信网络实现道德在线支付系统
Pub Date : 2017-08-16 DOI: 10.14257/IJSIA.2017.11.10.03
M. Hassan, A. Shuriye, Momoh J. E. Salam, A. Abdalla, O. Khalifa
Abstract The internet brings unprecedented connectivity and communications for both social and commercial settings. There have been many businesses that offer their products and services completely online. Nowadays, even the break and mortar businesses use the internet in a way or another to promote their offerings and to reach people and places they would have never thought of reaching them before the internet era. Conventional online payment systems such as credit and debit cards have enabled such a revolutionary way of doing business. However, conventional financial system has been generating catastrophic disasters to the world. The great depression of 1930s, the World War II, the dot com bubble at the beginning of the new century, and the recent financial crisis that has begun on 2008; to name a few. This will persist if we keep trusting the old ways of finance. This paper investigates the relatively new online payment system termed “Bitcoin” which embraces intentionally or unintentionally the principle of Islamic finance such as saving, compared to the conventional financial system of borrowing, lending and “Riba” (interest).
摘要互联网为社交和商业环境带来了前所未有的连接和通信。已经有许多企业完全在线提供产品和服务。如今,即使是实体企业也以某种方式使用互联网来推广他们的产品,并接触到他们在互联网时代之前从未想过会接触到的人和地方。传统的在线支付系统,如信用卡和借记卡,已经实现了这样一种革命性的商业方式。然而,传统的金融体系给世界带来了灾难性的灾难。20世纪30年代的大萧条、第二次世界大战、新世纪初的网络泡沫,以及最近始于2008年的金融危机;仅举几个例子。如果我们继续相信旧的金融方式,这种情况就会持续下去。本文研究了一种名为“比特币”的相对较新的在线支付系统,与传统的借贷和“Riba”(利息)金融系统相比,该系统有意或无意地包含了伊斯兰金融的原则,如储蓄。
{"title":"Towards an ethical online payment system through cryptography and next generation communication network","authors":"M. Hassan, A. Shuriye, Momoh J. E. Salam, A. Abdalla, O. Khalifa","doi":"10.14257/IJSIA.2017.11.10.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.10.03","url":null,"abstract":"Abstract The internet brings unprecedented connectivity and communications for both social and commercial settings. There have been many businesses that offer their products and services completely online. Nowadays, even the break and mortar businesses use the internet in a way or another to promote their offerings and to reach people and places they would have never thought of reaching them before the internet era. Conventional online payment systems such as credit and debit cards have enabled such a revolutionary way of doing business. However, conventional financial system has been generating catastrophic disasters to the world. The great depression of 1930s, the World War II, the dot com bubble at the beginning of the new century, and the recent financial crisis that has begun on 2008; to name a few. This will persist if we keep trusting the old ways of finance. This paper investigates the relatively new online payment system termed “Bitcoin” which embraces intentionally or unintentionally the principle of Islamic finance such as saving, compared to the conventional financial system of borrowing, lending and “Riba” (interest).","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41659555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security Content Development for Awareness Training Programs in Healthcare 医疗保健领域意识培训项目的信息安全内容开发
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.07
A. Ghazvini, Z. Shukur
Human error is recognized as the major cause of data breaches across the healthcare industry. Training and education are effective approaches to help employees adhere to appropriate behaviors that do not compromise information assets. However, not all awareness training programs are effective. One of the main failures in implementing successful awareness programs is the training content. In many cases, the training content is reported to be too informative or too advance. The aim of this paper is to propose a guideline to develop information security content for awareness training programs. Developing a rich and attractive training content is the key to an effective awareness program. It is necessary to ensure that important information security issues are effectively communicated with employees during awareness training programs, and employees are not over-trained or under-trained. The paper demonstrates the process of information security policy augmentation for a selected healthcare organization, and develops information security content from the augmented policy document. The focus of the training content is to enforce the organization’s internal information security policies.
在整个医疗保健行业,人为错误被认为是导致数据泄露的主要原因。培训和教育是帮助员工遵守不损害信息资产的适当行为的有效方法。然而,并不是所有的意识训练项目都有效。实施成功的意识项目的主要失败之一是培训内容。在许多情况下,培训内容被报告为信息量太大或太高级。本文的目的是提出一个指导方针,以制定信息安全内容的意识培训计划。开发丰富而有吸引力的培训内容是有效开展意识培训的关键。有必要确保重要的信息安全问题在意识培训项目中有效地与员工沟通,员工不会培训过度或培训不足。本文演示了选定医疗保健组织的信息安全策略增强过程,并从增强的策略文档中开发信息安全内容。培训内容的重点是执行组织的内部信息安全策略。
{"title":"Information Security Content Development for Awareness Training Programs in Healthcare","authors":"A. Ghazvini, Z. Shukur","doi":"10.14257/IJSIA.2017.11.7.07","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.07","url":null,"abstract":"Human error is recognized as the major cause of data breaches across the healthcare industry. Training and education are effective approaches to help employees adhere to appropriate behaviors that do not compromise information assets. However, not all awareness training programs are effective. One of the main failures in implementing successful awareness programs is the training content. In many cases, the training content is reported to be too informative or too advance. The aim of this paper is to propose a guideline to develop information security content for awareness training programs. Developing a rich and attractive training content is the key to an effective awareness program. It is necessary to ensure that important information security issues are effectively communicated with employees during awareness training programs, and employees are not over-trained or under-trained. The paper demonstrates the process of information security policy augmentation for a selected healthcare organization, and develops information security content from the augmented policy document. The focus of the training content is to enforce the organization’s internal information security policies.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47464149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart System for Forest Fire Using Sensor Network 基于传感器网络的森林火灾智能系统
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.01
Ahmad A. A. Alkhatib, M. Alia, Adnan A. Hnaif
Wireless sensor network systems deploy a dense array of small, low-cost sensors that observe the local environment. The system can be deployed anywhere, even in inaccessible places. This technology can provide real time monitoring for forest fires. Ignition can be determined rapidly, depending on the wake/sleep schedule of the system nodes. This study investigates the coverage and fire detection ability of a wireless network system. Sub-networks in randomly-distributed nodes convert the network from being randomly distributed to being organised, and reduce the operation time and energy consumption of each node. Dividing the network into three sub-networks increases network battery lifetime by 2.7% and increases energy performance by 63% compared to conventional fire detection networks. The proposed network only requires each node to be equipped with a cheap temperature sensor. Analysis of data from multiple sensors can indicate not only the presence of a fire, but also its intensity, behaviour and direction of spread, which can greatly assist firefighting efforts.
无线传感器网络系统部署了密集的小型、低成本传感器阵列,用于观察本地环境。该系统可以部署在任何地方,甚至是无法访问的地方。这项技术可以为森林火灾提供实时监测。点火可以根据系统节点的唤醒/睡眠时间表快速确定。本研究调查了无线网络系统的覆盖范围和火灾探测能力。随机分布节点中的子网络将网络从随机分布转变为有组织,减少了每个节点的操作时间和能耗。与传统的火灾探测网络相比,将网络划分为三个子网络可使网络电池寿命延长2.7%,能源性能提高63%。所提出的网络只需要每个节点都配备一个廉价的温度传感器。对来自多个传感器的数据进行分析,不仅可以指示火灾的存在,还可以指示其强度、行为和蔓延方向,这可以极大地帮助消防工作。
{"title":"Smart System for Forest Fire Using Sensor Network","authors":"Ahmad A. A. Alkhatib, M. Alia, Adnan A. Hnaif","doi":"10.14257/IJSIA.2017.11.7.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.01","url":null,"abstract":"Wireless sensor network systems deploy a dense array of small, low-cost sensors that observe the local environment. The system can be deployed anywhere, even in inaccessible places. This technology can provide real time monitoring for forest fires. Ignition can be determined rapidly, depending on the wake/sleep schedule of the system nodes. This study investigates the coverage and fire detection ability of a wireless network system. Sub-networks in randomly-distributed nodes convert the network from being randomly distributed to being organised, and reduce the operation time and energy consumption of each node. Dividing the network into three sub-networks increases network battery lifetime by 2.7% and increases energy performance by 63% compared to conventional fire detection networks. The proposed network only requires each node to be equipped with a cheap temperature sensor. Analysis of data from multiple sensors can indicate not only the presence of a fire, but also its intensity, behaviour and direction of spread, which can greatly assist firefighting efforts.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48340275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Introducing Quantum Cryptography Based Secured Encryption and Decryption Algorithms 介绍基于量子密码学的安全加解密算法
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.02
V. Padmavathi, B. Vardhan, A. V. Krishna
With the expansion in electronic communication, the significance of cryptography is apparently increasing every year. Encryption is a cryptography technique to send unintelligible information and decryption to restore the information. These techniques usually undergo difficulty with eavesdropping of plaintext and ciphertext. The conventional cryptography is vulnerable to attacks using high computational resources. Necessarily, an elegant concept of Quantum cryptography based on laws of quantum mechanics is introduced to offer secure and private communication. This paper gives a method for encryption and decryption using Toffoli quantum gate named as VBA Quantum Encryption and Decryption Algorithms. The incorporation of gate renders security which acts as a cumbersome to eavesdropping attack. Besides, a way to detect known plaintext, ciphertext only and chosen plaintext attack through public discussion is explained.
随着电子通信的发展,密码学的重要性逐年明显增加。加密是一种发送难以理解的信息和解密恢复信息的密码学技术。这些技术通常难以对明文和密文进行窃听。传统的密码学容易受到高计算资源的攻击。为了保证通信的安全性和私密性,必须引入基于量子力学定律的量子密码学概念。本文给出了一种利用Toffoli量子门进行加解密的方法——VBA量子加解密算法。门的加入使安全性提高,对窃听攻击起到了累人的作用。通过公开讨论,给出了一种检测已知明文、纯密文和选择明文攻击的方法。
{"title":"Introducing Quantum Cryptography Based Secured Encryption and Decryption Algorithms","authors":"V. Padmavathi, B. Vardhan, A. V. Krishna","doi":"10.14257/IJSIA.2017.11.7.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.02","url":null,"abstract":"With the expansion in electronic communication, the significance of cryptography is apparently increasing every year. Encryption is a cryptography technique to send unintelligible information and decryption to restore the information. These techniques usually undergo difficulty with eavesdropping of plaintext and ciphertext. The conventional cryptography is vulnerable to attacks using high computational resources. Necessarily, an elegant concept of Quantum cryptography based on laws of quantum mechanics is introduced to offer secure and private communication. This paper gives a method for encryption and decryption using Toffoli quantum gate named as VBA Quantum Encryption and Decryption Algorithms. The incorporation of gate renders security which acts as a cumbersome to eavesdropping attack. Besides, a way to detect known plaintext, ciphertext only and chosen plaintext attack through public discussion is explained.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46454612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable and Enhanced Third Party Auditing in Cloud Server Data Storage 云服务器数据存储中可靠且增强的第三方审核
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.05
N. Nagar, U. Suman
Cloud computing provides a service based environment for data storage and resource sharing that are available to user through internet with on-demand basis. Thus, users can access their data across any geographical location at any time. Cloud environment also provides better scalability, flexibility, high performance, availability and less storage cost as compared to other physical storage of data. Maintaining data integrity and security in cloud environment is difficult especially, when the stored data is not completely reliable and trustworthy. However, the security of stored data is the major concerned for organizations and individual user to adopt cloud based environment. In this paper, we have proposed and enhanced the functionalities of third party auditor server to protect the availability and integrity of outsourced data in a cloud environment. The proposed approach uses the functionality such as, public verifiability, metadata generation, data dynamics, storage access point, encryption and decryption of data through RSA algorithm and IP range in case of private cloud. The proposed work also focuses on a solution to reliability, availability and integrity of data that are the major issues in the cloud adoption.
云计算为数据存储和资源共享提供了一个基于服务的环境,用户可以通过互联网按需获取这些数据和资源。因此,用户可以在任何时间、任何地理位置访问他们的数据。与其他物理数据存储相比,云环境还提供了更好的可伸缩性、灵活性、高性能、可用性和更低的存储成本。在云环境中维护数据的完整性和安全性是非常困难的,特别是当存储的数据不是完全可靠和可信的时候。然而,存储数据的安全性是组织和个人用户采用云环境的主要关注点。在本文中,我们提出并增强了第三方审计服务器的功能,以保护云环境中外包数据的可用性和完整性。在私有云环境下,该方法利用了公共可验证性、元数据生成、数据动态、存储接入点、通过RSA算法对数据进行加密和解密以及IP范围等功能。拟议的工作还侧重于解决数据的可靠性、可用性和完整性,这些都是采用云的主要问题。
{"title":"Reliable and Enhanced Third Party Auditing in Cloud Server Data Storage","authors":"N. Nagar, U. Suman","doi":"10.14257/IJSIA.2017.11.7.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.05","url":null,"abstract":"Cloud computing provides a service based environment for data storage and resource sharing that are available to user through internet with on-demand basis. Thus, users can access their data across any geographical location at any time. Cloud environment also provides better scalability, flexibility, high performance, availability and less storage cost as compared to other physical storage of data. Maintaining data integrity and security in cloud environment is difficult especially, when the stored data is not completely reliable and trustworthy. However, the security of stored data is the major concerned for organizations and individual user to adopt cloud based environment. In this paper, we have proposed and enhanced the functionalities of third party auditor server to protect the availability and integrity of outsourced data in a cloud environment. The proposed approach uses the functionality such as, public verifiability, metadata generation, data dynamics, storage access point, encryption and decryption of data through RSA algorithm and IP range in case of private cloud. The proposed work also focuses on a solution to reliability, availability and integrity of data that are the major issues in the cloud adoption.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43017764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Searchable Encryption Scheme in a Multi-user Setting for Cloud Storage 云存储多用户环境下的可搜索加密方案
Pub Date : 2017-07-31 DOI: 10.14257/IJSIA.2017.11.7.04
Qingqing Gan, Xiaoming Wang
To support encrypted keyword queries on encrypted data and to access data in a multi-user setting for cloud storage, a searchable encryption scheme is proposed by combining Chinese Remainder Theorem with Public Encryption with Keyword Search. The proposed scheme enables data owners to outsource their encrypted data to the storage of cloud servers for a number of users, who are given the ability to generate valid queries and to access data without leaking any information. More importantly, the proposed scheme does not rely on shared keys to realize multi-user searchable encryption and user dynamics. Each authorized user in the proposed scheme has a unique key and can perform encrypted keyword queries on encrypted data as well as access data without knowledge of the keys of other users, such that when some users are added or removed, other users are unaffected. We prove that the proposed scheme is secure under Bilinear Diffie-Hellman and Hash Diffie-Hellman assumptions. The performance analysis shows that the proposed scheme has lower communication and storage overheads for both cloud servers and users than other existing schemes. In addition, the proposed scheme possesses features similar to that of most existing schemes in a single-user setting and does not downgrade because of supporting multiple users.
为了支持对加密数据进行加密关键字查询,以及在云存储的多用户环境下访问数据,提出了一种将中文剩余定理与公共加密与关键字搜索相结合的可搜索加密方案。所提出的方案使数据所有者能够将其加密数据外包给许多用户的云服务器存储,这些用户能够生成有效的查询并在不泄露任何信息的情况下访问数据。更重要的是,该方案不依赖于共享密钥来实现多用户可搜索加密和用户动态。在该方案中,每个授权用户都有一个唯一的密钥,可以对加密数据执行加密关键字查询,也可以在不知道其他用户密钥的情况下访问数据,这样当添加或删除一些用户时,其他用户不受影响。在双线性Diffie-Hellman和Hash Diffie-Hellman假设下证明了该方案的安全性。性能分析表明,与现有方案相比,该方案对云服务器和用户的通信和存储开销都较低。此外,该方案具有与大多数现有单用户方案相似的特性,并且不会因为支持多用户而降级。
{"title":"A Searchable Encryption Scheme in a Multi-user Setting for Cloud Storage","authors":"Qingqing Gan, Xiaoming Wang","doi":"10.14257/IJSIA.2017.11.7.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.7.04","url":null,"abstract":"To support encrypted keyword queries on encrypted data and to access data in a multi-user setting for cloud storage, a searchable encryption scheme is proposed by combining Chinese Remainder Theorem with Public Encryption with Keyword Search. The proposed scheme enables data owners to outsource their encrypted data to the storage of cloud servers for a number of users, who are given the ability to generate valid queries and to access data without leaking any information. More importantly, the proposed scheme does not rely on shared keys to realize multi-user searchable encryption and user dynamics. Each authorized user in the proposed scheme has a unique key and can perform encrypted keyword queries on encrypted data as well as access data without knowledge of the keys of other users, such that when some users are added or removed, other users are unaffected. We prove that the proposed scheme is secure under Bilinear Diffie-Hellman and Hash Diffie-Hellman assumptions. The performance analysis shows that the proposed scheme has lower communication and storage overheads for both cloud servers and users than other existing schemes. In addition, the proposed scheme possesses features similar to that of most existing schemes in a single-user setting and does not downgrade because of supporting multiple users.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45750289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1