Search results for "Encryption"
showing 10 items of 94 documents
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
2017
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
Optical-data storage-readout technique based on fractal encrypting masks
2009
We propose the use of fractal structured diffractive masks as keys in secure storage-readout systems. A joint transform correlator based on a photorefractive crystal in the Fourier domain is implemented to perform encryption and decryption. We discuss the advantages of encrypting information using this kind of deterministic keys in comparison to conventional random phase masks. Preliminary experimental results are presented to demonstrate the effectiveness of the proposed system.
Volumetric Bias Correction
2007
This paper presents a method to suppress the bias artifact, also known as RF-inhomogeneity, in Magnetic Resonance Imaging (MRI). This artifact produces illumination variations due to magnetic field fluctuations of the device. In the latest years many works have been devoted to face this problem. In this work we present the 3D version of a new approach to bias correction, which is called Exponential Entropy Driven Homomorphic Unsharp Masking (E2D-HUM). This technique has been already presented by some of the authors for the 2D case only. The description of the whole method is detailed, and some experimental results are reported.
An Encrypted Traffic Classification Framework Based on Convolutional Neural Networks and Stacked Autoencoders
2020
In recent years, deep learning-based encrypted traffic classification has proven to be effective; especially, using neural networks to extract features from raw traffic to classify encrypted traffic. However, most of the neural networks need a fixed-sized input, so that the raw traffic need to be trimmed. This will cause the loss of some information; for example, we do not know the number of packets in a session. To solve these problems, a framework, which implements both a convolutional neural network (CNN) and a stacked autoencoder (SAE), is proposed in this paper. This framework uses a CNN to extract high-level features from raw network traffic and uses an SAE to encode the 26 statistica…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.
Optical security and encryption with totally incoherent light
2001
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…