Search results for "cloud server"
showing 3 items of 3 documents
Timing and Side Channel Attacks
2015
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza a…
Sensor Node Network for Remote Moisture Measurement in Timber Based on Bluetooth Low Energy and Web-Based Monitoring System
2021
This paper proposes an IoT system based on wireless BLE connectivity to monitor the moisture content of wood, using a compact and low-cost moisture device that relies on a resistance measurement method valid for an ultra-wide range of resistance values. This device is digitally controlled with a BLE-incorporated micro-controller characterized by its small size and low power consumption, providing long-life battery. The proposed system consists of two main parts: first, the BLE moisture device including the moisture content measurement and wireless capability (BLE)
Traceable hierarchical attribute-based authentication for the cloud
2015
When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …