A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud
2016
IEEE Transactions on Information Forensics and Security
Continuous authentication for mobile devices using behavioral biometrics is being suggested to complement initial authentication for securing mobile devices, and the cloud services accessed through them ...
For our experiments, we selected one compromised and four attacked gesture-based continuous authentication systems from the recent literature. ...
This material is based on research sponsored in 16 part by the DARPA Active Authentication Program and the Brandeis Program under agreement numbers FA8750-12-2-0200 and N66001-15-C-4068, respectively ...
doi:10.1109/tifs.2016.2594132
fatcat:apszymdebrdejpxcgbzzgp3cfu
User Study on Single Password Authentication
[article]
2018
IACR Cryptology ePrint Archive
SPA solution against two-factor authentication (where, in both cases, in addition to the password, the user needs access to her mobile device). ...
solution against traditional password-based authentication (where in both cases the user experience is simply entering a username and password), and another comparing the first mobile-application-based ...
We acknowledge the support of TÜBİTAK (the Scientific and Technological Research Council of Turkey) under the project number 115E766, European Union COST Action IC1306, and the Royal Society of UK Newton ...
dblp:journals/iacr/IslerKC18
fatcat:2hvkctvqzbal5dvqawsguusami
IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems
2020
IEEE Access
., in the work titled, ''Cloud-based cyberphysical intrusion detection for vehicles using deep learning,'' investigate the recognition of cyber-attacks against vehicles. ...
This research proposed a linearly homomorphic authenticated encryption (LinHAE) approach to secure vehicle systems against forgery and eavesdropping attacks. ...
doi:10.1109/access.2020.3036713
fatcat:mmmaqfaovfhtlmms7iqxykxnjq
Distributed Single Password Protocol Framework
[article]
2018
IACR Cryptology ePrint Archive
They achieve this with the help of a cloud or mobile storage device. ...
We further introduce a secure DiSPP instantiation derived from our framework enforcing the adversary to corrupt several cloud and mobile storage devices in addition to the login server in order to perform ...
Acknowledgment We acknowledge the support of T ÜB İTAK (the Scientific and Technological Research Council of Turkey) under the project number 115E766, and the Royal Society of UK Newton Advanced Fellowship ...
dblp:journals/iacr/IslerK18
fatcat:464mdhargfambiytdaxl4wea5a
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud
[article]
2020
arXiv
pre-print
In this work, we present the Health Access Broker (HAB), a patient-controlled service for secure PHR sharing that (a) does not impose a specific storage location (uniquely for a PHR system), and (b) does ...
not assume any of its components to be fully secure against adversarial threats. ...
Updates must also be patient-approved. (3-A) Adversary performs Denial-of-Service (DoS) attacks on HAB controller. In a practical deployment, existing wellknown defenses against DoS attacks (e.g. ...
arXiv:2005.07987v1
fatcat:fng3q3jruvezfh6skqxyw67snu
MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME
2022
Iraqi Journal of Information & Communications Technology
In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services. ...
Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention. ...
An anonymized bio-based multi-factor mobile cloud Services authentication scheme is suggested in this paper. ...
doi:10.31987/ijict.5.3.201
fatcat:55eap2ptwvgklm2uedqwc5qpli
Security-and-Privacy-Related Issues on IT Systems During Disasters
[chapter]
2012
Lecture Notes in Computer Science
We summarize these security and privacy issues in the context of two major areas of operation: information gathering and system continuity management. ...
In this paper, we focus on security-and-privacy-related issues that confront IT systems during disasters. ...
This work has been supported by the Japanese Ministry of Internal Affairs and Communications funded project, "Study of Security Architecture for Cloud Computing in Disasters." ...
doi:10.1007/978-3-642-32498-7_33
fatcat:h2g3e6gnazbalaci7kkye7vr7q
A Cloud Security Framework Based on Trust Model and Mobile Agent
[article]
2020
arXiv
pre-print
Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud. ...
Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. ...
server and then launching a side channel attack. d) Authentication attacks: Authentication is a weak point in hosted and virtual services and is frequently targeted. e) Man in the middle attacks: an attacker ...
arXiv:2001.09090v1
fatcat:v4dwaezy3jeddf7lha2pirhgye
Defensive Cyberspace: Navigating the Landscape of Cyber Security
[article]
2024
Zenodo
Securing Cloud Environments 11. Emerging Technologies and Cyber Security 12. International Cyber Security Collaboration 13. The Future of Cyber Security Appendix: Cyber Security Resources ...
The book Defensive Cyberspace: Navigating the Landscape of Cyber Security contains 13 chapters. They are given as follows: 1. Introduction to Cyber Security 2. Foundations of Cyber Security 3. ...
File System Reconstruction: Reconstruct file systems to recover deleted files, directory structures, and metadata. Tools like The Sleuth Kit can assist in file system analysis. ...
doi:10.5281/zenodo.10529044
fatcat:ydw65ur62fhzlbtmj4oslmhxui
Security, Privacy, and Usability in Continuous Authentication: A Survey
2021
Sensors
Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. ...
The security issues are mainly poor matching rates and the problems of replay attacks. ...
Based on the available data, they utilized positive samples (belong to one user) and presented reconstruction attacks on mobile-based continuous authentication in the cloud, which successfully identifies ...
doi:10.3390/s21175967
pmid:34502865
fatcat:xe6k46sdhbhexioz24wbbn74me
Multisensors-based Verification Mechanism with Encryption and Decryption on Fault-tolerant Databases
2020
Sensors and materials
Fourth, we design a deconstruction/reconstruction module to store partial ciphertext segments separately. Therefore, the proposed scheme is more secure than other cloud web POS systems. ...
Therefore, the Taiwan government has included cloud computing in its initiative to promote emerging smart industries. In addition, the world is actively investing in the cloud computing industry. ...
Nevertheless, Taiwan companies apparently lack confidence in the security and privacy of cloud-based data management systems. ...
doi:10.18494/sam.2020.2834
fatcat:pjh5esdxqrgadlgzhrohnirwgu
5G core network security issues and attack classification from network protocol perspective
2020
Journal of Internet Services and Information Security
In addition, we classified cyber attacks against nine network protocols primarily used in the 5G core network. ...
Fifth-generation technology [5G] services commercialized in 2019 have not only provided voice and data communication but also undergone significant structural changes in mobile networks to accommodate ...
In a mobile network, MEC is implemented through cloud and virtualization technology and is expected to operate in an open system running third party applications. ...
doi:10.22667/jisis.2020.05.31.001
dblp:journals/jisis/Kim20
fatcat:etnuwxsgknfrtlyww4f7jba6za
Privacy and Security Implications of Cloud-Based AI Services : A Survey
[article]
2024
arXiv
pre-print
This paper details the privacy and security landscape in today's cloud ecosystem and identifies that there is a gap in addressing the risks introduced by machine learning models. ...
The proposed taxonomies provide a foundational basis for solutions in private, secure and robust ML, paving the way for more transparent and resilient AI systems. ...
Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not reflect the views of National Research Foundation, Singapore. ...
arXiv:2402.00896v1
fatcat:skmxehukqnd47hzf7t73tayjy4
A robust and lightweight secure access scheme for cloud based E-healthcare services
2021
Peer-to-Peer Networking and Applications
Due to its simplicity and robustness, the proposed scheme is the best fit for protecting data security and privacy in cloud-based E-healthcare services. ...
The rights to access the cloud services are provided based on the identity and the association between stakeholders, thus ensuring privacy. ...
A trust negotiation based framework is proposed to provide authentication, sensitivity, and other access control services in healthcare systems [50] [51] [52] . ...
doi:10.1007/s12083-021-01162-x
pmid:33968292
pmcid:PMC8090928
fatcat:b5hhcuso6zgpxbjnphez5wiuem
Logic Bugs in IoT Platforms and Systems: A Review
[article]
2020
arXiv
pre-print
Contrarily, the complexity (of IoT platforms and systems) is actually being increased in terms of the interactions between the physical world and cyberspace. ...
The increased complexity indeed results in new vulnerabilities. This paper seeks to provide a review of the recently discovered logic bugs that are specific to IoT platforms and systems. ...
In the IoT platform, more entities (the IoT device, the cloud and the mobile app) are involved. This makes authentication and authorization more complicated. ...
arXiv:1912.13410v2
fatcat:se2dnzt6ifduzg35vbio2s6xy4
« Previous
Showing results 1 — 15 out of 7,617 results