Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,617 Hits in 8.2 sec

Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud

Mohammad Al-Rubaie, J. Morris Chang
2016 IEEE Transactions on Information Forensics and Security  
Continuous authentication for mobile devices using behavioral biometrics is being suggested to complement initial authentication for securing mobile devices, and the cloud services accessed through them  ...  For our experiments, we selected one compromised and four attacked gesture-based continuous authentication systems from the recent literature.  ...  This material is based on research sponsored in 16 part by the DARPA Active Authentication Program and the Brandeis Program under agreement numbers FA8750-12-2-0200 and N66001-15-C-4068, respectively  ... 
doi:10.1109/tifs.2016.2594132 fatcat:apszymdebrdejpxcgbzzgp3cfu

User Study on Single Password Authentication [article]

Devris Isler, Alptekin Küpçü, Aykut Coskun
2018 IACR Cryptology ePrint Archive  
SPA solution against two-factor authentication (where, in both cases, in addition to the password, the user needs access to her mobile device).  ...  solution against traditional password-based authentication (where in both cases the user experience is simply entering a username and password), and another comparing the first mobile-application-based  ...  We acknowledge the support of TÜBİTAK (the Scientific and Technological Research Council of Turkey) under the project number 115E766, European Union COST Action IC1306, and the Royal Society of UK Newton  ... 
dblp:journals/iacr/IslerKC18 fatcat:2hvkctvqzbal5dvqawsguusami

IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems

Haider Abbas, Hiroki Suguri, Zheng Yan, William Allen, Xiali Sharon Zhang
2020 IEEE Access  
., in the work titled, ''Cloud-based cyberphysical intrusion detection for vehicles using deep learning,'' investigate the recognition of cyber-attacks against vehicles.  ...  This research proposed a linearly homomorphic authenticated encryption (LinHAE) approach to secure vehicle systems against forgery and eavesdropping attacks.  ... 
doi:10.1109/access.2020.3036713 fatcat:mmmaqfaovfhtlmms7iqxykxnjq

Distributed Single Password Protocol Framework [article]

Devris Isler, Alptekin Küpçü
2018 IACR Cryptology ePrint Archive  
They achieve this with the help of a cloud or mobile storage device.  ...  We further introduce a secure DiSPP instantiation derived from our framework enforcing the adversary to corrupt several cloud and mobile storage devices in addition to the login server in order to perform  ...  Acknowledgment We acknowledge the support of T ÜB İTAK (the Scientific and Technological Research Council of Turkey) under the project number 115E766, and the Royal Society of UK Newton Advanced Fellowship  ... 
dblp:journals/iacr/IslerK18 fatcat:464mdhargfambiytdaxl4wea5a

Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud [article]

Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha
2020 arXiv   pre-print
In this work, we present the Health Access Broker (HAB), a patient-controlled service for secure PHR sharing that (a) does not impose a specific storage location (uniquely for a PHR system), and (b) does  ...  not assume any of its components to be fully secure against adversarial threats.  ...  Updates must also be patient-approved. (3-A) Adversary performs Denial-of-Service (DoS) attacks on HAB controller. In a practical deployment, existing wellknown defenses against DoS attacks (e.g.  ... 
arXiv:2005.07987v1 fatcat:fng3q3jruvezfh6skqxyw67snu

MOBILE CLOUD COMPUTING SERVICES AUTHENTICATION SCHEME

Safana A. Abdulrahman, M. F. Al-Gailani
2022 Iraqi Journal of Information & Communications Technology  
In the mobile cloud, wireless computing networks are the basics of sharing data between mobile devices and cloud services.  ...  Because of the rapid growth of cloud computing and the expansion of mobile phone users in recent years, mobile cloud computing has attracted wide attention.  ...  An anonymized bio-based multi-factor mobile cloud Services authentication scheme is suggested in this paper.  ... 
doi:10.31987/ijict.5.3.201 fatcat:55eap2ptwvgklm2uedqwc5qpli

Security-and-Privacy-Related Issues on IT Systems During Disasters [chapter]

Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
2012 Lecture Notes in Computer Science  
We summarize these security and privacy issues in the context of two major areas of operation: information gathering and system continuity management.  ...  In this paper, we focus on security-and-privacy-related issues that confront IT systems during disasters.  ...  This work has been supported by the Japanese Ministry of Internal Affairs and Communications funded project, "Study of Security Architecture for Cloud Computing in Disasters."  ... 
doi:10.1007/978-3-642-32498-7_33 fatcat:h2g3e6gnazbalaci7kkye7vr7q

A Cloud Security Framework Based on Trust Model and Mobile Agent [article]

Saddek Benabied, Abdelhafid Zitouni, Mahieddine Djoudi
2020 arXiv   pre-print
Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud.  ...  Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing.  ...  server and then launching a side channel attack. d) Authentication attacks: Authentication is a weak point in hosted and virtual services and is frequently targeted. e) Man in the middle attacks: an attacker  ... 
arXiv:2001.09090v1 fatcat:v4dwaezy3jeddf7lha2pirhgye

Defensive Cyberspace: Navigating the Landscape of Cyber Security [article]

Dileep Kumar M., S. R. Jena
2024 Zenodo  
Securing Cloud Environments 11. Emerging Technologies and Cyber Security 12. International Cyber Security Collaboration 13. The Future of Cyber Security Appendix: Cyber Security Resources  ...  The book Defensive Cyberspace: Navigating the Landscape of Cyber Security contains 13 chapters. They are given as follows: 1. Introduction to Cyber Security 2. Foundations of Cyber Security 3.  ...  File System Reconstruction: Reconstruct file systems to recover deleted files, directory structures, and metadata. Tools like The Sleuth Kit can assist in file system analysis.  ... 
doi:10.5281/zenodo.10529044 fatcat:ydw65ur62fhzlbtmj4oslmhxui

Security, Privacy, and Usability in Continuous Authentication: A Survey

Ahmed Fraz Baig, Sigurd Eskeland
2021 Sensors  
Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks.  ...  The security issues are mainly poor matching rates and the problems of replay attacks.  ...  Based on the available data, they utilized positive samples (belong to one user) and presented reconstruction attacks on mobile-based continuous authentication in the cloud, which successfully identifies  ... 
doi:10.3390/s21175967 pmid:34502865 fatcat:xe6k46sdhbhexioz24wbbn74me

Multisensors-based Verification Mechanism with Encryption and Decryption on Fault-tolerant Databases

I-Te Chen, Yu-Hsien Chiu, Han-Chun Liao, Jer-Min Tsai, Wen-Hsien Ho, Chen-Sen Ouyang
2020 Sensors and materials  
Fourth, we design a deconstruction/reconstruction module to store partial ciphertext segments separately. Therefore, the proposed scheme is more secure than other cloud web POS systems.  ...  Therefore, the Taiwan government has included cloud computing in its initiative to promote emerging smart industries. In addition, the world is actively investing in the cloud computing industry.  ...  Nevertheless, Taiwan companies apparently lack confidence in the security and privacy of cloud-based data management systems.  ... 
doi:10.18494/sam.2020.2834 fatcat:pjh5esdxqrgadlgzhrohnirwgu

5G core network security issues and attack classification from network protocol perspective

Hwankuk Kim
2020 Journal of Internet Services and Information Security  
In addition, we classified cyber attacks against nine network protocols primarily used in the 5G core network.  ...  Fifth-generation technology [5G] services commercialized in 2019 have not only provided voice and data communication but also undergone significant structural changes in mobile networks to accommodate  ...  In a mobile network, MEC is implemented through cloud and virtualization technology and is expected to operate in an open system running third party applications.  ... 
doi:10.22667/jisis.2020.05.31.001 dblp:journals/jisis/Kim20 fatcat:etnuwxsgknfrtlyww4f7jba6za

Privacy and Security Implications of Cloud-Based AI Services : A Survey [article]

Alka Luqman, Riya Mahesh, Anupam Chattopadhyay
2024 arXiv   pre-print
This paper details the privacy and security landscape in today's cloud ecosystem and identifies that there is a gap in addressing the risks introduced by machine learning models.  ...  The proposed taxonomies provide a foundational basis for solutions in private, secure and robust ML, paving the way for more transparent and resilient AI systems.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not reflect the views of National Research Foundation, Singapore.  ... 
arXiv:2402.00896v1 fatcat:skmxehukqnd47hzf7t73tayjy4

A robust and lightweight secure access scheme for cloud based E-healthcare services

Mehedi Masud, Gurjot Singh Gaba, Karanjeet Choudhary, Roobaea Alroobaea, M. Shamim Hossain
2021 Peer-to-Peer Networking and Applications  
Due to its simplicity and robustness, the proposed scheme is the best fit for protecting data security and privacy in cloud-based E-healthcare services.  ...  The rights to access the cloud services are provided based on the identity and the association between stakeholders, thus ensuring privacy.  ...  A trust negotiation based framework is proposed to provide authentication, sensitivity, and other access control services in healthcare systems [50] [51] [52] .  ... 
doi:10.1007/s12083-021-01162-x pmid:33968292 pmcid:PMC8090928 fatcat:b5hhcuso6zgpxbjnphez5wiuem

Logic Bugs in IoT Platforms and Systems: A Review [article]

Wei Zhou, Chen Cao, Dongdong Huo, Kai Cheng, Lan Zhang, Le Guan, Tao Liu, Yaowen Zheng, Yuqing Zhang, Limin Sun, Yazhe Wang, Peng Liu
2020 arXiv   pre-print
Contrarily, the complexity (of IoT platforms and systems) is actually being increased in terms of the interactions between the physical world and cyberspace.  ...  The increased complexity indeed results in new vulnerabilities. This paper seeks to provide a review of the recently discovered logic bugs that are specific to IoT platforms and systems.  ...  In the IoT platform, more entities (the IoT device, the cloud and the mobile app) are involved. This makes authentication and authorization more complicated.  ... 
arXiv:1912.13410v2 fatcat:se2dnzt6ifduzg35vbio2s6xy4
« Previous Showing results 1 — 15 out of 7,617 results