Application of Amicable Numbers in Cryptographic Data Protection Methods
Abstract Cryptographic data protection algorithms require specific resources for proper implementation and security. Certain environments, particularly those involving Internet of Things devices, cannot provide the necessary set of measures, including processor speed, memory size, and communication bandwidth, with an acceptable response time and a limitation on battery power consumption. Unfortunately, effective and known data protection mechanisms, such as public key infrastructure, have no potential application in this case. An alternative is to develop other solutions that will ensure an appropriate level of security and will be dedicated to devices with minimal computing and communication resources. This paper proposes a new method to access the resources or to verify access rights using so-called amicable numbers as a base for the authentication mechanism. The mathematical properties of amicable numbers can form the basis for developing new algorithms that are highly needed in the IoT world and relate to fundamental data security and privacy protection issues.
- Research Article
6
- 10.1016/j.future.2024.04.039
- Apr 20, 2024
- Future Generation Computer Systems
A lattice-based efficient certificateless public key encryption for big data security in clouds
- Book Chapter
3
- 10.1007/978-3-319-47573-8_3
- Jan 1, 2017
This chapter provides an up to date analysis of the legal and administrative frameworks surrounding informational rights at a supranational level in the European Union with a focus on the right of access to personal data. The first part of the chapter tracks the development of data protection and privacy legislation in the European Union, offering context and background to understand the journey of such regulation with a specific focus on the right of access. The second part of the chapter considers how issues of privacy and data protection have been dealt with by European courts, namely the European Court of Justice and the European Court of Human Rights. The chapter concludes by outlining the role played by the European Data Protection Supervisor.
- Conference Article
597
- 10.1109/iccsee.2012.193
- Mar 1, 2012
It is well-known that cloud computing has many potential advantages and many enterprise applications and data are migrating to public or hybrid cloud. But regarding some business-critical applications, the organizations, especially large enterprises, still wouldn't move them to cloud. The market size the cloud computing shared is still far behind the one expected. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle. Then this paper discusses some current solutions. Finally, this paper describes future research work about data security and privacy protection issues in cloud.
- Conference Article
5
- 10.1109/smcsia.2003.1232419
- Jun 18, 2003
Businesses are deploying Public Key Infrastructures (PKIs) to support internal business processes, implement virtual private networks, and secure corporate assets. The ability to establish business relations inside the company as well as with other companies in a secure way is important for the operability of business in today's world; corporate PKIs may implement different architectures, security policies, and cryptographic suites in order to accomplish this goal. But communication beyond the PKI is established with other companies based on a trust relationship (B2B), which brings vulnerability provided by PKIs from different companies. A flexible mechanism is needed to link these corporate PKIs and translate corporate relationships with security mechanisms and policies. This is accomplished through a Password Authentication Protocol (PAK), which provides means to authenticate or validate users across Bridge Certification Authorities (BCA), where certificates authorities (CA) are limited and cannot reach over to the other side of the BCA. In such a way, PAK can guarantee authentication of end points without modifying the original PKI structure of companies and offer flexibility in the process of implementation. Additional to this, there are several other issues that must be solved; such as the ability to connect different company PKI without compromising any sensible information that might cause a conflict of commercial interests and still guarantee a certain level of security through an accreditation and validation of the parties in order to be certain with whom we are doing business. In order to achieve accreditation and validation of PKIs and not expose any sensible information that could compromise either parties, we also based our work on a zero-knowledge security protocol, letting each PKI continue with their security policies without having to adjust to specific needs, achieving a better security level of commercial transactions through such hardening process.
- Book Chapter
1
- 10.1007/978-3-319-47573-8_1
- Jan 1, 2017
This introductory chapter situates the central theme of this volume – the right of access to personal data – in the wider context of a world experiencing the ongoing proliferation of data collection techniques. In post-Snowden societies, awareness around issues of privacy and data protection are growing and this chapter explains how and why the right of access may help to enhance the empowerment of data subjects in terms of determining how their personal data is collected, used and shared.
- Conference Article
2
- 10.1109/iscaie.2018.8405466
- Apr 1, 2018
The term cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today cloud computing not only provides innovative improvements in resource utilization but it also creates a new opportunities in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, cloud computing also introduces concerns about data protection and intrusion detection mechanism especially cloud computing are exposed to Denial of Service (DoS) attacks. This paper aims to provide DoS detection mechanism for cloud computing environment. As a result, we provide an experiment to examine the capability of the proposed system. The result shows that the proposed system was able to detect DoS attacks that conducted during the experiment with 94.4% detection rate. We conclude the paper with a discussion on the results, then we include together with a graphical summary of the experiment's result.
- Research Article
1
- 10.18178/ijeetc.8.4.188-193
- Jan 1, 2019
- International Journal of Electrical and Electronic Engineering & Telecommunications
The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it also creates a new opportunity in data protection mechanisms where the advancement of intrusion detection technologies are blooming rapidly. From the perspective of security, Cloud computing also introduces concerns about data protection and intrusion detection mechanism. This paper aims to provide Denial of Service (DoS) detection for Cloud computing environment. As a result, we provide an experiment to examine the capability of the proposed system. The result shows that the proposed system was able to detect all types of attacks that conducted during the experiment. We conclude the paper with a discussion on the results, then we include together with a graphical summary of the experiment's result.
- Research Article
- 10.48175/ijarsct-9469
- Apr 26, 2023
- International Journal of Advanced Research in Science, Communication and Technology
The Crime Record Management System is a web-based application designed to improve the management of crime records across all police stations in the country. Effective crime prevention, detection, and conviction rely heavily on a responsive information management system. Therefore, centralizing information management in crime is proposed for the efficient sharing of crucial information among police stations. Initially, the system will be implemented in cities and towns and later interconnected to enable police staff to access information from all records in the state, ultimately helping to close cases faster. The system will also generate information for proactive and preventive measures to fight crime. The project will adopt a distributed architecture with a centralized database storage system, with high priority given to security and data protection mechanisms. The application is designed to handle various modules and their associated reports, produced in line with the administrative staff's applicable strategies and standards. In summary, the Crime Record Management System is a web-based application that aims to improve the management of crime records across police stations in the country. The system is designed to centralize information management, generate crucial information for crime prevention, and provide efficient and fast access to records. The project adopts a distributed architecture with centralized database storage, prioritizing data protection and security mechanisms while producing reports that align with applicable administrative strategies and standards
- Conference Article
10
- 10.1109/etfa.2018.8502603
- Sep 1, 2018
The growing need for end-to-end security in distributed communication for industrial automation as emphasized in Industrie 4.0 requires an investigation of the security features of relevant protocols. One of the security requirements is authentication and authorization of users within and across organizational boundaries. OPC UA (Open Platform Communication Unified Architecture) is a service-oriented architecture for platform independent communication in automation industry. This research work is on OPC UA to understand its security architecture's support for end-to-end communication and an implementation of a demo PKI (Public Key Infrastructure) to illustrate the same. The design and implementation of such a PKI facilitates both, offline and online validation services. This work emphasizes different concepts of PKIs used in enabling security in applications based on OPC UA standards. The information modelling provided by OPC UA has options to enable user access rights. The applicability of access level attributes in differentiating access rights between different users is demonstrated. The results of this work illustrate a single level hierarchical trust model for end-to-end communication using X509IdentityToken authentication for a user to access services provided by an OPC UA server. The demonstration of online validation for X.509 certificate using OCSP (Online Certificate Status Protocol) protocol is illustrated. The offline validation using CRL (Certificate Revocation List) is also illustrated. The X.509 certificates required for OPC UA based applications can be generated using a tool called keytool. A open source project of keytool is used to create the OPC UA specific extensions for the certificates. There are several challenges in implementing such an infrastructure for distributed systems and they are described. The scope for further research is discussed briefly.
- Research Article
11
- 10.1155/2020/8857272
- Nov 17, 2020
- Wireless Communications and Mobile Computing
Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT. For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture. On the other hand, the significant issues regarding the adaptation of NDN with IoT possess security concerns such as authentication, confidentiality, integrity, and forward secrecy. As IoT is a heterogeneous environment, it demands a different type of security, according to the environmental situation such as public key infrastructure (PKI), identity-based cryptosystem (IBC), and certificateless cryptosystem (CLC). This paper presents a new concept of CLC to IBC heterogeneous generalized signcryption for the first time to fulfil the prime security requirements of NDN-based IoT. The proposed scheme provides the security properties according to situational needs without disturbing the structural policy of NDN. Considering the resource-constrained nature of IoT, we used a lightweight type of elliptic curve called the hyperelliptic curve cryptosystem which offers the same level of security as that of bilinear pairing and an elliptic curve cryptosystem using a minimum key size. Further, we compare the proposed scheme with recently proposed identity-based as well as certificateless generalized signcryption schemes, and the results give satisfactory outputs in terms of computational and communication resources. Furthermore, we simulate the proposed scheme with Automated Validation of Internet Security Protocols and Applications (AVISPA), and the results show that our scheme is valid and safe. Additionally, we provide a practical scenario of the proposed on NDN with an IoT-based smart city.
- Research Article
- 10.7176/ceis/10-4-01
- May 1, 2019
- Computer Engineering and Intelligent Systems
The internet has changed the world in a strong way.it has traveled from the concept of parallel computing to distributed computing to grid computing and recently to cloud computing. Cloud computing is a recent trend in Information Technology that moves computing and data away from desktop and portable personal computers into large data center. The main advantage of cloud computing is the user cannot pay for infrastructure, its installation, required man power to handle such infrastructure and maintenance. Cloud computing technology is collecting success stories of savings, ease of use, ease of access and increased flexibility in controlling how resources are used at any given time to deliver computing capability. Cloud providers who can demonstrate that they protect personal information may be more truthful and therefore more attractive to potential Cloud users. The cloud service can be implemented in three different service models, such as Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review the concepts of cloud computing and different security techniques and protecting data in the cloud. Keywords : Cloud computing, Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS). DOI : 10.7176/CEIS/10-4-01 Publication date :May 31 st 2019
- Discussion
1
- 10.1186/s12939-024-02221-4
- Jul 18, 2024
- International Journal for Equity in Health
Consent bias is a type of selection bias in biomedical research where those consenting to the research differ systematically from those not consenting. It is particularly relevant in precision medicine research because the complexity of these studies prevents certain subgroups from understanding, trusting, and consenting to the research. Because consent bias distorts research findings and causes inequitable distribution of research benefits, scholars propose two types of schemes to reduce consent bias: reforming existing consent models and removing the consent requirement altogether. This study explores the possibility of waiving consent in observational studies using existing data, because they involve fewer risks to participants than clinical trials if privacy safeguards are strengthened. It suggests that data protection mechanisms such as security enhancement and data protection impact assessment should be conducted to protect data privacy of participants in observational studies without consent.
- Research Article
- 10.21552/edpl/2022/3/4
- Jan 1, 2022
- European Data Protection Law Review
This article discusses the legislative framework of data protection and health law in today’s world where the individual has become an active player in governing his health. The individual’s protection within the traditional treatment relationship between the care provider and the care receiver is subject to substantial changes amidst technological and health innovations. The traditional, clinical health setting is complemented with actors from a non-clinical background, such as commercial companies that provide healthcare deliverables. New mechanisms for data protection and safeguarding data subject’s rights are required. The European Health Data Space Regulation is a good starting point, since it enables individuals to obtain a copy of their health data, to share and rectify these. However, we observe three gaps in the individual’s data protection and his position vis-à-vis commercial companies, i.e. in the domain of legislation, governance and in the interaction between the care provider and care receiver. The individual plays a role as a patient, but also as an individual with a particular lifestyle who uses wearables and buys commercial DNA tests. The individual’s monitoring of his own health with devices does not necessarily fall within the scope of existing European and national legislation on data protection and health. Keywords: European Health Data Space | fundamental rights | individual and informational self-determination | technological innovations
- Research Article
- 10.18421/tem134-76
- Nov 27, 2024
- TEM Journal
AI integration in digital assets and data protection is revolutionizing asset management. Proper AI applications can enhance security, but regulation must balance innovation and misuse, requiring a thorough understanding of technology. Data protection safeguards sensitive data from loss, alteration, or corruption, ensuring compliance with legal and regulatory obligations. It involves business information procedures and data protection mechanisms, particularly in the financial industry. Restricting access to digital asset data is crucial. This paper systematically reviews the recent role of AI in data protection for digital asset systems. Recent studies have reported enhanced algorithms for data protection in digital assets, focusing on transactions, markets, surveillance, and infrastructure assets. Robust algorithms in the digital asset market improve data protection and address issues with traditional crowdfunding. Token financing is a new strategy aimed at solving these issues. However, startups often lack knowledge about risk when choosing new token financing options. In the future, AI may be able to predict potential threats or vulnerabilities to digital assets through data protection trends and patterns. This would allow proactive data protection measures rather than just reactive ones. It will enhance digital asset systems' functionality and accuracy.
- Research Article
7
- 10.9790/0661-01020106
- Jan 1, 2013
- IOSR Journal of Computer Engineering
Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. In the cloud computing system, both application software and databases are moved to the large data centers, where the data should not be secure in the hands of providers. IT organizations have expressed concerns about the various security aspects that exist with the widespread implementation of cloud computing. These types of concerns originate from the fact that data is stored remotely from the customer's location. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper describes an enhancement for the already existing data security model in cloud environment. The proposed data security model provides user authentication and data protection. It also ensures fast recovery of data. Keyword - AES Algorithm, Byzantine fault tolerance, Data Security Model, Distributed Denial of Service (DDoS)
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.